Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-06-2023 09:12
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
1.5MB
-
MD5
09f16ecc21bd2d570fd6c6411128b714
-
SHA1
71dd57498b1989e7c61e1c4865f306e5d5e222f2
-
SHA256
0f6b398bf5f91af3ec82ad6a7417ec3dd71f7f220409d5c327b63a4c7334e844
-
SHA512
2b89d3c3e6722da0c7acfb8468aebfe112fadda93f71708e48035b9bb0ea35120a0eb1d04c80c4d2c4a2004f866f71d8a072f1f8ebc567d2813b243ac21488e1
-
SSDEEP
49152:KBrY2fc7XyDjhZ0j5Jl34KZbGiJyXoogg:ArncjyDNajHZbGi4
Malware Config
Extracted
raccoon
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
UClient.exeUClient_new.exeUClient.exepid process 1636 UClient.exe 1984 UClient_new.exe 2040 UClient.exe -
Loads dropped DLL 16 IoCs
Processes:
tmp.exeUClient.exeUClient_new.exeUClient.exepid process 1744 tmp.exe 1744 tmp.exe 1744 tmp.exe 1744 tmp.exe 1636 UClient.exe 1636 UClient.exe 1636 UClient.exe 1636 UClient.exe 1636 UClient.exe 1636 UClient.exe 1984 UClient_new.exe 1984 UClient_new.exe 1984 UClient_new.exe 1984 UClient_new.exe 2040 UClient.exe 2040 UClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
UClient.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run\UClient = "C:\\Users\\Admin\\Desktop\\UClient.exe /s" UClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 17 IoCs
Processes:
UClient.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\uclient\DefaultIcon\ = "C:\\Users\\Admin\\Desktop\\UClient.exe" UClient.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\uclient\shell\open\command UClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\.esc\ = "uclient" UClient.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\.esc\DefaultIcon UClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\.escr\ = "uclient" UClient.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\uclient UClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\uclient\URL Protocol = "戀" UClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\.esc\DefaultIcon\ = "C:\\Users\\Admin\\Desktop\\UClient.exe" UClient.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\.escr UClient.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\uclient\shell\open UClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\uclient\shell\open\command\ = "C:\\Users\\Admin\\Desktop\\UClient.exe \"%1\"" UClient.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\.escr\DefaultIcon UClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\.escr\DefaultIcon\ = "C:\\Users\\Admin\\Desktop\\UClient.exe" UClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\uclient\ = "URL:uclient protocol handler" UClient.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\uclient\DefaultIcon UClient.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\uclient\shell UClient.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\.esc UClient.exe -
Processes:
UClient.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 UClient.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 UClient.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e UClient.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
tmp.exeUClient.exeUClient_new.exeUClient.exepid process 1744 tmp.exe 1636 UClient.exe 1984 UClient_new.exe 1984 UClient_new.exe 1984 UClient_new.exe 1984 UClient_new.exe 2040 UClient.exe 2040 UClient.exe 2040 UClient.exe 2040 UClient.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
UClient.exeUClient.exepid process 1636 UClient.exe 1636 UClient.exe 2040 UClient.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
UClient.exeUClient.exepid process 1636 UClient.exe 1636 UClient.exe 2040 UClient.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
tmp.exeUClient.exeUClient_new.exedescription pid process target process PID 1744 wrote to memory of 1636 1744 tmp.exe UClient.exe PID 1744 wrote to memory of 1636 1744 tmp.exe UClient.exe PID 1744 wrote to memory of 1636 1744 tmp.exe UClient.exe PID 1744 wrote to memory of 1636 1744 tmp.exe UClient.exe PID 1636 wrote to memory of 1984 1636 UClient.exe UClient_new.exe PID 1636 wrote to memory of 1984 1636 UClient.exe UClient_new.exe PID 1636 wrote to memory of 1984 1636 UClient.exe UClient_new.exe PID 1636 wrote to memory of 1984 1636 UClient.exe UClient_new.exe PID 1984 wrote to memory of 2040 1984 UClient_new.exe UClient.exe PID 1984 wrote to memory of 2040 1984 UClient_new.exe UClient.exe PID 1984 wrote to memory of 2040 1984 UClient_new.exe UClient.exe PID 1984 wrote to memory of 2040 1984 UClient_new.exe UClient.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\Desktop\UClient.exe"C:\Users\Admin\Desktop\UClient.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\uclient\temp\UClient_new.exe"C:\Users\Admin\AppData\Local\uclient\temp\UClient_new.exe" /d C:\Users\Admin\Desktop\UClient.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\Desktop\UClient.exe"C:\Users\Admin\Desktop\UClient.exe" /t 19844⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2040
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a49dd1a211fabce0f9302792127200d
SHA187b7eddc1299086e179b507a0bf2dd051a4e14d5
SHA25613c9b13f44d1bb0489d744302bbdd15adf7aea655d53f072189feed6f8e722b7
SHA5122a7d568a67ec523b6544259efab338d6f7be998032af35a768e123c2939bf810783684d95e082610023d4cf906703ca59fd5b9e83331fb487210dded183c523a
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
4B
MD51b36ea1c9b7a1c3ad668b8bb5df7963f
SHA1d0ee345e31f83883d76b54edd9964410adbd191b
SHA2564dea5c7cb70f50322ec9d734aa4aa078be9227c05251e18991c596f387552370
SHA5124bec3153d5ed9d21e831a83767a63fb41ae6e51694df7534c8ef8e82d44eeb965dbab80069a57a93548b58449b72eadad7074a61681f3b64e0cce096c141b41e
-
Filesize
4B
MD54c144c47ecba6f8318128703ca9e2601
SHA1e4e36b42fb2f69eedbf971c15d8a672dd4bc36aa
SHA256df34d853f2f2f1f14b92359f695426dcefc150b3f3a886c05c045b37baa2ee99
SHA512348e60b589093ed4185b2cfcb17c4a2bbf857952b3b2745f2f2ff6b0637424407a7b68d17a9698fa74eb6849ed3a98f4adb5f7eb98a38ae8e6789c8fc0eb0a31
-
Filesize
12KB
MD5443d1a681ca636cacb8ae507aac71c17
SHA1683dfaeccc8581e704b49b58c49dcce2100a93b5
SHA25670b982cc116aeb0a6d2d34f1f6aec8814f32e97338d5e2528a5587781f2e010c
SHA512654777997c8848ce8e35280ce16d27841428b604f4efc9eb397c35cc04065b76e489448bbf19e22fcb9c574b11ab16b2c790bb1ee1cf60748e1d87e62a55fc68
-
Filesize
2KB
MD56db98d8941688666b94980c6e70d0daa
SHA15a40c83d784bc85f2fe0c0d5c87ab11a07b6d706
SHA256c97449a49080b09c347d5932f3642e242c6bb626161223a89fc01abc9a28e341
SHA51238a15166518ee4a0aa63f67454d8ba42eca543c440bd85e24ec77d12e46107c228188e01f5a8e2db176e2ba421037a70db7554d0e7518e99a4315f4384615cde
-
Filesize
5KB
MD528dacfbb40b6a0660306c0b870f24e80
SHA1719628e552c00883d52a958e594551705f7a79a6
SHA2568f03d756afc7de740fdcad6737cbce2b17880cad3112e45193238ed78f35f927
SHA5129a085f5a60df0a190424101f516edd780ab542f305bd981fefea8557dca190cec8f2e159feec53b9a033f15ef659387a7494c57157f77d3797fd3f6524e7ca61
-
Filesize
15B
MD516ee1f8ca34fc082903e32fce6025244
SHA19552628f52690d025b6f49011971eecc4b1b58a7
SHA25681ad6a1a0fb68aac9c5066dbc3e9f8e8fcac4cb8b634935043cdc58f914dd133
SHA512bb15cba4c1b4b2339fb1fe94a9d805c0bd02d413e2d0a9da5522295610da21bbb7c3ccbc6044b84e5ddb465434c1cde24c9a8cdcbc1fb09c787e32d3c2e6a902
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
508B
MD55e37bcf315df658a2cb63a84a57051c5
SHA151ef7e4d20d2d7940bd385e56eecbf1dce1d21a5
SHA256424e09eb11dd370902f0d9938a27a70eeee054a8e93e36d47d4fe4ae951267bc
SHA5124acf80bcd577a5df38a0df5d380c76be175afa71c74ba6824a37f2ccba0bc87a7575273a65d00b0dc22eb17b9b92d5cb51b2bff0f0b80a6758ff767625ee7748
-
Filesize
510B
MD50d92fc75d819bd59fb3360029d0ee962
SHA1b3acf6576241dca9275625d37ebda534386183b8
SHA25640ec66ac283bff82d2c375384fa84ba94ce725802c5aa40f0eefab3315692d02
SHA512aad5c4dc6bd074e828effdb41720f6f19b49aefdc7bc7d70515dbf79c49857a0af3d07b855a0ac23e88a7629c8bf5f5dacf234f2ad993d29511a74d5152899c7
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
1.5MB
MD509f16ecc21bd2d570fd6c6411128b714
SHA171dd57498b1989e7c61e1c4865f306e5d5e222f2
SHA2560f6b398bf5f91af3ec82ad6a7417ec3dd71f7f220409d5c327b63a4c7334e844
SHA5122b89d3c3e6722da0c7acfb8468aebfe112fadda93f71708e48035b9bb0ea35120a0eb1d04c80c4d2c4a2004f866f71d8a072f1f8ebc567d2813b243ac21488e1
-
Filesize
1.5MB
MD509f16ecc21bd2d570fd6c6411128b714
SHA171dd57498b1989e7c61e1c4865f306e5d5e222f2
SHA2560f6b398bf5f91af3ec82ad6a7417ec3dd71f7f220409d5c327b63a4c7334e844
SHA5122b89d3c3e6722da0c7acfb8468aebfe112fadda93f71708e48035b9bb0ea35120a0eb1d04c80c4d2c4a2004f866f71d8a072f1f8ebc567d2813b243ac21488e1
-
Filesize
1.5MB
MD509f16ecc21bd2d570fd6c6411128b714
SHA171dd57498b1989e7c61e1c4865f306e5d5e222f2
SHA2560f6b398bf5f91af3ec82ad6a7417ec3dd71f7f220409d5c327b63a4c7334e844
SHA5122b89d3c3e6722da0c7acfb8468aebfe112fadda93f71708e48035b9bb0ea35120a0eb1d04c80c4d2c4a2004f866f71d8a072f1f8ebc567d2813b243ac21488e1
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
6.6MB
MD535e7c4b4062e78cd42451c4bb4d78176
SHA14bb7f98325714354a29a2ded751ded67d8ba718e
SHA256dc723e1fb4c3c89da65c762127b59f5740a332fdd697b419c3f2cdb64cde207f
SHA5123fd0d906e021681dc6e5fc1f407b9f813ccecef94cd9b67c5839d9a5f2442657627c1113aede49a4870afc49bc1cc97c130728978f33fc76d75d4f957a5a1118
-
Filesize
1.5MB
MD509f16ecc21bd2d570fd6c6411128b714
SHA171dd57498b1989e7c61e1c4865f306e5d5e222f2
SHA2560f6b398bf5f91af3ec82ad6a7417ec3dd71f7f220409d5c327b63a4c7334e844
SHA5122b89d3c3e6722da0c7acfb8468aebfe112fadda93f71708e48035b9bb0ea35120a0eb1d04c80c4d2c4a2004f866f71d8a072f1f8ebc567d2813b243ac21488e1
-
Filesize
1.5MB
MD509f16ecc21bd2d570fd6c6411128b714
SHA171dd57498b1989e7c61e1c4865f306e5d5e222f2
SHA2560f6b398bf5f91af3ec82ad6a7417ec3dd71f7f220409d5c327b63a4c7334e844
SHA5122b89d3c3e6722da0c7acfb8468aebfe112fadda93f71708e48035b9bb0ea35120a0eb1d04c80c4d2c4a2004f866f71d8a072f1f8ebc567d2813b243ac21488e1
-
Filesize
1.5MB
MD509f16ecc21bd2d570fd6c6411128b714
SHA171dd57498b1989e7c61e1c4865f306e5d5e222f2
SHA2560f6b398bf5f91af3ec82ad6a7417ec3dd71f7f220409d5c327b63a4c7334e844
SHA5122b89d3c3e6722da0c7acfb8468aebfe112fadda93f71708e48035b9bb0ea35120a0eb1d04c80c4d2c4a2004f866f71d8a072f1f8ebc567d2813b243ac21488e1
-
Filesize
1.5MB
MD509f16ecc21bd2d570fd6c6411128b714
SHA171dd57498b1989e7c61e1c4865f306e5d5e222f2
SHA2560f6b398bf5f91af3ec82ad6a7417ec3dd71f7f220409d5c327b63a4c7334e844
SHA5122b89d3c3e6722da0c7acfb8468aebfe112fadda93f71708e48035b9bb0ea35120a0eb1d04c80c4d2c4a2004f866f71d8a072f1f8ebc567d2813b243ac21488e1
-
Filesize
1.5MB
MD509f16ecc21bd2d570fd6c6411128b714
SHA171dd57498b1989e7c61e1c4865f306e5d5e222f2
SHA2560f6b398bf5f91af3ec82ad6a7417ec3dd71f7f220409d5c327b63a4c7334e844
SHA5122b89d3c3e6722da0c7acfb8468aebfe112fadda93f71708e48035b9bb0ea35120a0eb1d04c80c4d2c4a2004f866f71d8a072f1f8ebc567d2813b243ac21488e1
-
Filesize
1.5MB
MD509f16ecc21bd2d570fd6c6411128b714
SHA171dd57498b1989e7c61e1c4865f306e5d5e222f2
SHA2560f6b398bf5f91af3ec82ad6a7417ec3dd71f7f220409d5c327b63a4c7334e844
SHA5122b89d3c3e6722da0c7acfb8468aebfe112fadda93f71708e48035b9bb0ea35120a0eb1d04c80c4d2c4a2004f866f71d8a072f1f8ebc567d2813b243ac21488e1