Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
17-08-2023 15:13
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
General
-
Target
tmp.exe
-
Size
1.1MB
-
MD5
700fc96585a4947fcdf27a271d40876f
-
SHA1
121edbdefb9a894ff217f20c963626ec1bd94770
-
SHA256
65a0ece86fe16402e51a637d121bddccfa0d1d026bd0cec7f7ead19c31507eaa
-
SHA512
748d5fd5421bdb51421dc9a33c2a4ca93a66d1afcdeb03a766513b81e05a337e52ad3fdacb852e8e037e7dfffdb3e6cfec3fe376d885a8c8b8da5188cd4c032e
-
SSDEEP
12288:VMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9FC9/W74Vf:VnsJ39LyjbJkQFMhmC+6GD9mW7S
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2092-74-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 5 IoCs
pid Process 2092 ._cache_tmp.exe 1696 Synaptics.exe 2692 ._cache_Synaptics.exe 1340 Terms.exe 2904 Terms.exe -
Loads dropped DLL 7 IoCs
pid Process 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 1696 Synaptics.exe 1696 Synaptics.exe 1696 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" tmp.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: ._cache_tmp.exe File opened (read-only) \??\G: ._cache_tmp.exe File opened (read-only) \??\L: ._cache_tmp.exe File opened (read-only) \??\N: ._cache_tmp.exe File opened (read-only) \??\Q: ._cache_tmp.exe File opened (read-only) \??\R: ._cache_tmp.exe File opened (read-only) \??\U: ._cache_tmp.exe File opened (read-only) \??\T: ._cache_tmp.exe File opened (read-only) \??\V: ._cache_tmp.exe File opened (read-only) \??\W: ._cache_tmp.exe File opened (read-only) \??\X: ._cache_tmp.exe File opened (read-only) \??\Z: ._cache_tmp.exe File opened (read-only) \??\E: ._cache_tmp.exe File opened (read-only) \??\I: ._cache_tmp.exe File opened (read-only) \??\K: ._cache_tmp.exe File opened (read-only) \??\M: ._cache_tmp.exe File opened (read-only) \??\H: ._cache_tmp.exe File opened (read-only) \??\J: ._cache_tmp.exe File opened (read-only) \??\O: ._cache_tmp.exe File opened (read-only) \??\P: ._cache_tmp.exe File opened (read-only) \??\S: ._cache_tmp.exe File opened (read-only) \??\Y: ._cache_tmp.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Terms.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Terms.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Terms.exe ._cache_tmp.exe File opened for modification C:\Program Files (x86)\Terms.exe ._cache_tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Terms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{811C513B-E85E-4E65-B918-2673A67EB3F2} Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{811C513B-E85E-4E65-B918-2673A67EB3F2}\WpadDecision = "0" Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Terms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{811C513B-E85E-4E65-B918-2673A67EB3F2}\0a-9a-30-c2-c0-7e Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0019000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-9a-30-c2-c0-7e\WpadDecisionTime = 90932f6f1dd1d901 Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{811C513B-E85E-4E65-B918-2673A67EB3F2}\WpadNetworkName = "Network 3" Terms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{811C513B-E85E-4E65-B918-2673A67EB3F2}\0a-9a-30-c2-c0-7e Terms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-9a-30-c2-c0-7e Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-9a-30-c2-c0-7e\WpadDecision = "0" Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0019000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-9a-30-c2-c0-7e\WpadDecisionReason = "1" Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0019000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{811C513B-E85E-4E65-B918-2673A67EB3F2}\WpadDecisionReason = "1" Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-9a-30-c2-c0-7e\WpadDecisionReason = "1" Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{811C513B-E85E-4E65-B918-2673A67EB3F2}\WpadDecision = "0" Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{811C513B-E85E-4E65-B918-2673A67EB3F2}\WpadNetworkName = "Network 3" Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{811C513B-E85E-4E65-B918-2673A67EB3F2}\WpadDecisionTime = 1073fb611dd1d901 Terms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-9a-30-c2-c0-7e Terms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Terms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Terms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{811C513B-E85E-4E65-B918-2673A67EB3F2} Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{811C513B-E85E-4E65-B918-2673A67EB3F2}\WpadDecisionTime = 90932f6f1dd1d901 Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-9a-30-c2-c0-7e\WpadDecisionTime = 1073fb611dd1d901 Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-9a-30-c2-c0-7e\WpadDecisionTime = 1073fb611dd1d901 Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-9a-30-c2-c0-7e\WpadDecision = "0" Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-9a-30-c2-c0-7e\WpadDetectedUrl Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{811C513B-E85E-4E65-B918-2673A67EB3F2}\WpadDecisionReason = "1" Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Terms.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2092 ._cache_tmp.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2092 2616 tmp.exe 28 PID 2616 wrote to memory of 2092 2616 tmp.exe 28 PID 2616 wrote to memory of 2092 2616 tmp.exe 28 PID 2616 wrote to memory of 2092 2616 tmp.exe 28 PID 2616 wrote to memory of 1696 2616 tmp.exe 29 PID 2616 wrote to memory of 1696 2616 tmp.exe 29 PID 2616 wrote to memory of 1696 2616 tmp.exe 29 PID 2616 wrote to memory of 1696 2616 tmp.exe 29 PID 1696 wrote to memory of 2692 1696 Synaptics.exe 30 PID 1696 wrote to memory of 2692 1696 Synaptics.exe 30 PID 1696 wrote to memory of 2692 1696 Synaptics.exe 30 PID 1696 wrote to memory of 2692 1696 Synaptics.exe 30 PID 1340 wrote to memory of 2904 1340 Terms.exe 36 PID 1340 wrote to memory of 2904 1340 Terms.exe 36 PID 1340 wrote to memory of 2904 1340 Terms.exe 36 PID 1340 wrote to memory of 2904 1340 Terms.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe"C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2692
-
-
-
C:\Program Files (x86)\Terms.exe"C:\Program Files (x86)\Terms.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files (x86)\Terms.exe"C:\Program Files (x86)\Terms.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD5e76dbb2f998c3ccf78e984001c9207c8
SHA19c27f473c6d8529f77fdfaac6615265d096b4f85
SHA256ac5afced6515d12cf83466ea2dc0e874c9b5491beba0837a344e0e6093febc07
SHA512ed1eea5ef6d894cb460c00a78bb8363159c6afd52d94446b48c644088d3aae0319411175112385d4e92d2f6bd5b89c03b0f6f140eb24d4b72848b8e2b1105b34
-
Filesize
352KB
MD5e76dbb2f998c3ccf78e984001c9207c8
SHA19c27f473c6d8529f77fdfaac6615265d096b4f85
SHA256ac5afced6515d12cf83466ea2dc0e874c9b5491beba0837a344e0e6093febc07
SHA512ed1eea5ef6d894cb460c00a78bb8363159c6afd52d94446b48c644088d3aae0319411175112385d4e92d2f6bd5b89c03b0f6f140eb24d4b72848b8e2b1105b34
-
Filesize
352KB
MD5e76dbb2f998c3ccf78e984001c9207c8
SHA19c27f473c6d8529f77fdfaac6615265d096b4f85
SHA256ac5afced6515d12cf83466ea2dc0e874c9b5491beba0837a344e0e6093febc07
SHA512ed1eea5ef6d894cb460c00a78bb8363159c6afd52d94446b48c644088d3aae0319411175112385d4e92d2f6bd5b89c03b0f6f140eb24d4b72848b8e2b1105b34
-
Filesize
1.1MB
MD5700fc96585a4947fcdf27a271d40876f
SHA1121edbdefb9a894ff217f20c963626ec1bd94770
SHA25665a0ece86fe16402e51a637d121bddccfa0d1d026bd0cec7f7ead19c31507eaa
SHA512748d5fd5421bdb51421dc9a33c2a4ca93a66d1afcdeb03a766513b81e05a337e52ad3fdacb852e8e037e7dfffdb3e6cfec3fe376d885a8c8b8da5188cd4c032e
-
Filesize
1.1MB
MD5700fc96585a4947fcdf27a271d40876f
SHA1121edbdefb9a894ff217f20c963626ec1bd94770
SHA25665a0ece86fe16402e51a637d121bddccfa0d1d026bd0cec7f7ead19c31507eaa
SHA512748d5fd5421bdb51421dc9a33c2a4ca93a66d1afcdeb03a766513b81e05a337e52ad3fdacb852e8e037e7dfffdb3e6cfec3fe376d885a8c8b8da5188cd4c032e
-
Filesize
1.1MB
MD5700fc96585a4947fcdf27a271d40876f
SHA1121edbdefb9a894ff217f20c963626ec1bd94770
SHA25665a0ece86fe16402e51a637d121bddccfa0d1d026bd0cec7f7ead19c31507eaa
SHA512748d5fd5421bdb51421dc9a33c2a4ca93a66d1afcdeb03a766513b81e05a337e52ad3fdacb852e8e037e7dfffdb3e6cfec3fe376d885a8c8b8da5188cd4c032e
-
Filesize
352KB
MD5e76dbb2f998c3ccf78e984001c9207c8
SHA19c27f473c6d8529f77fdfaac6615265d096b4f85
SHA256ac5afced6515d12cf83466ea2dc0e874c9b5491beba0837a344e0e6093febc07
SHA512ed1eea5ef6d894cb460c00a78bb8363159c6afd52d94446b48c644088d3aae0319411175112385d4e92d2f6bd5b89c03b0f6f140eb24d4b72848b8e2b1105b34
-
Filesize
352KB
MD5e76dbb2f998c3ccf78e984001c9207c8
SHA19c27f473c6d8529f77fdfaac6615265d096b4f85
SHA256ac5afced6515d12cf83466ea2dc0e874c9b5491beba0837a344e0e6093febc07
SHA512ed1eea5ef6d894cb460c00a78bb8363159c6afd52d94446b48c644088d3aae0319411175112385d4e92d2f6bd5b89c03b0f6f140eb24d4b72848b8e2b1105b34
-
Filesize
352KB
MD5e76dbb2f998c3ccf78e984001c9207c8
SHA19c27f473c6d8529f77fdfaac6615265d096b4f85
SHA256ac5afced6515d12cf83466ea2dc0e874c9b5491beba0837a344e0e6093febc07
SHA512ed1eea5ef6d894cb460c00a78bb8363159c6afd52d94446b48c644088d3aae0319411175112385d4e92d2f6bd5b89c03b0f6f140eb24d4b72848b8e2b1105b34
-
Filesize
352KB
MD5e76dbb2f998c3ccf78e984001c9207c8
SHA19c27f473c6d8529f77fdfaac6615265d096b4f85
SHA256ac5afced6515d12cf83466ea2dc0e874c9b5491beba0837a344e0e6093febc07
SHA512ed1eea5ef6d894cb460c00a78bb8363159c6afd52d94446b48c644088d3aae0319411175112385d4e92d2f6bd5b89c03b0f6f140eb24d4b72848b8e2b1105b34
-
Filesize
1.1MB
MD5700fc96585a4947fcdf27a271d40876f
SHA1121edbdefb9a894ff217f20c963626ec1bd94770
SHA25665a0ece86fe16402e51a637d121bddccfa0d1d026bd0cec7f7ead19c31507eaa
SHA512748d5fd5421bdb51421dc9a33c2a4ca93a66d1afcdeb03a766513b81e05a337e52ad3fdacb852e8e037e7dfffdb3e6cfec3fe376d885a8c8b8da5188cd4c032e
-
Filesize
1.1MB
MD5700fc96585a4947fcdf27a271d40876f
SHA1121edbdefb9a894ff217f20c963626ec1bd94770
SHA25665a0ece86fe16402e51a637d121bddccfa0d1d026bd0cec7f7ead19c31507eaa
SHA512748d5fd5421bdb51421dc9a33c2a4ca93a66d1afcdeb03a766513b81e05a337e52ad3fdacb852e8e037e7dfffdb3e6cfec3fe376d885a8c8b8da5188cd4c032e
-
Filesize
1.1MB
MD5700fc96585a4947fcdf27a271d40876f
SHA1121edbdefb9a894ff217f20c963626ec1bd94770
SHA25665a0ece86fe16402e51a637d121bddccfa0d1d026bd0cec7f7ead19c31507eaa
SHA512748d5fd5421bdb51421dc9a33c2a4ca93a66d1afcdeb03a766513b81e05a337e52ad3fdacb852e8e037e7dfffdb3e6cfec3fe376d885a8c8b8da5188cd4c032e
-
Filesize
352KB
MD5e76dbb2f998c3ccf78e984001c9207c8
SHA19c27f473c6d8529f77fdfaac6615265d096b4f85
SHA256ac5afced6515d12cf83466ea2dc0e874c9b5491beba0837a344e0e6093febc07
SHA512ed1eea5ef6d894cb460c00a78bb8363159c6afd52d94446b48c644088d3aae0319411175112385d4e92d2f6bd5b89c03b0f6f140eb24d4b72848b8e2b1105b34
-
Filesize
352KB
MD5e76dbb2f998c3ccf78e984001c9207c8
SHA19c27f473c6d8529f77fdfaac6615265d096b4f85
SHA256ac5afced6515d12cf83466ea2dc0e874c9b5491beba0837a344e0e6093febc07
SHA512ed1eea5ef6d894cb460c00a78bb8363159c6afd52d94446b48c644088d3aae0319411175112385d4e92d2f6bd5b89c03b0f6f140eb24d4b72848b8e2b1105b34
-
Filesize
352KB
MD5e76dbb2f998c3ccf78e984001c9207c8
SHA19c27f473c6d8529f77fdfaac6615265d096b4f85
SHA256ac5afced6515d12cf83466ea2dc0e874c9b5491beba0837a344e0e6093febc07
SHA512ed1eea5ef6d894cb460c00a78bb8363159c6afd52d94446b48c644088d3aae0319411175112385d4e92d2f6bd5b89c03b0f6f140eb24d4b72848b8e2b1105b34
-
Filesize
352KB
MD5e76dbb2f998c3ccf78e984001c9207c8
SHA19c27f473c6d8529f77fdfaac6615265d096b4f85
SHA256ac5afced6515d12cf83466ea2dc0e874c9b5491beba0837a344e0e6093febc07
SHA512ed1eea5ef6d894cb460c00a78bb8363159c6afd52d94446b48c644088d3aae0319411175112385d4e92d2f6bd5b89c03b0f6f140eb24d4b72848b8e2b1105b34