Analysis
-
max time kernel
302s -
max time network
315s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
23-08-2023 14:28
Behavioral task
behavioral1
Sample
New_4.8.10.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
New_4.8.10.exe
Resource
win10-20230703-en
General
-
Target
New_4.8.10.exe
-
Size
124.3MB
-
MD5
f89701701ace82ef08972d55b68e232f
-
SHA1
084888e907329c480518220990fc4a8dcd108463
-
SHA256
a896be695060cae32a70973ebba049139b27ae837e870e5faf728392b32854dd
-
SHA512
f5f9e7b1f6ae0e5983a58c91be5558feb10bb07ffa10a289580759cc1abba8c829d7f9752873c62fbb0f552119e5fc9ebe3a02cdb649919d1743ee933bc49bf1
-
SSDEEP
3145728:dRrHJ5u0UJ140kRRGtBOPMx332CVB4JeMz9MrI/:dRrHb/UJSrR8hbxPrI/
Malware Config
Extracted
gh0strat
zhodaji.com
Signatures
-
Gh0st RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4448-126-0x0000000002BB0000-0x0000000002BCD000-memory.dmp family_gh0strat behavioral2/memory/60-138-0x0000000001520000-0x000000000153D000-memory.dmp family_gh0strat behavioral2/memory/4052-146-0x0000000002BB0000-0x0000000002BCD000-memory.dmp family_gh0strat -
Processes:
resource yara_rule behavioral2/memory/3396-0-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3396-59-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3396-124-0x0000000000400000-0x00000000004C6000-memory.dmp upx -
Drops desktop.ini file(s) 1 IoCs
Processes:
Telegram.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Telegram.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
handinput.exedescription ioc process File opened (read-only) \??\L: handinput.exe File opened (read-only) \??\M: handinput.exe File opened (read-only) \??\N: handinput.exe File opened (read-only) \??\P: handinput.exe File opened (read-only) \??\R: handinput.exe File opened (read-only) \??\U: handinput.exe File opened (read-only) \??\B: handinput.exe File opened (read-only) \??\J: handinput.exe File opened (read-only) \??\T: handinput.exe File opened (read-only) \??\H: handinput.exe File opened (read-only) \??\G: handinput.exe File opened (read-only) \??\I: handinput.exe File opened (read-only) \??\K: handinput.exe File opened (read-only) \??\W: handinput.exe File opened (read-only) \??\X: handinput.exe File opened (read-only) \??\E: handinput.exe File opened (read-only) \??\Q: handinput.exe File opened (read-only) \??\S: handinput.exe File opened (read-only) \??\V: handinput.exe File opened (read-only) \??\Y: handinput.exe File opened (read-only) \??\Z: handinput.exe File opened (read-only) \??\O: handinput.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/3396-59-0x0000000000400000-0x00000000004C6000-memory.dmp autoit_exe behavioral2/memory/3396-124-0x0000000000400000-0x00000000004C6000-memory.dmp autoit_exe -
Drops file in Program Files directory 1 IoCs
Processes:
handinput.exedescription ioc process File opened for modification C:\PROGRA~3\HANDIN~1.EXE handinput.exe -
Executes dropped EXE 6 IoCs
Processes:
tsetup-x64.4.9.2.exetsetup-x64.4.9.2.tmpTelegram.exehandinput.exeAqiyq.exeAqiyq.exepid process 2552 tsetup-x64.4.9.2.exe 2604 tsetup-x64.4.9.2.tmp 700 Telegram.exe 4448 handinput.exe 60 Aqiyq.exe 4052 Aqiyq.exe -
Loads dropped DLL 7 IoCs
Processes:
handinput.exeTelegram.exeAqiyq.exeAqiyq.exepid process 4448 handinput.exe 4448 handinput.exe 700 Telegram.exe 60 Aqiyq.exe 60 Aqiyq.exe 4052 Aqiyq.exe 4052 Aqiyq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 16 IoCs
Processes:
Telegram.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tdesktop.tg\DefaultIcon Telegram.exe Key created \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tdesktop.tg\shell\open Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tdesktop.tg\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe\" -- \"%1\"" Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tg\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe\" -- \"%1\"" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tg\DefaultIcon Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tg\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe,1\"" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tg\shell Telegram.exe Key created \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tdesktop.tg Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tdesktop.tg\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe,1\"" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tdesktop.tg\shell Telegram.exe Key created \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tg Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tg\URL Protocol Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tg\ = "URL:Telegram Link" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tdesktop.tg\shell\open\command Telegram.exe Key created \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tg\shell\open Telegram.exe Key created \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\tg\shell\open\command Telegram.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Telegram.exepid process 700 Telegram.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tsetup-x64.4.9.2.tmphandinput.exepid process 2604 tsetup-x64.4.9.2.tmp 2604 tsetup-x64.4.9.2.tmp 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe 4448 handinput.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
handinput.exeAqiyq.exeAqiyq.exedescription pid process Token: SeDebugPrivilege 4448 handinput.exe Token: SeDebugPrivilege 60 Aqiyq.exe Token: SeIncBasePriorityPrivilege 4448 handinput.exe Token: SeDebugPrivilege 4052 Aqiyq.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
tsetup-x64.4.9.2.tmpTelegram.exepid process 2604 tsetup-x64.4.9.2.tmp 700 Telegram.exe 700 Telegram.exe 700 Telegram.exe 700 Telegram.exe 700 Telegram.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
Telegram.exepid process 700 Telegram.exe 700 Telegram.exe 700 Telegram.exe 700 Telegram.exe 700 Telegram.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Telegram.exepid process 700 Telegram.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
New_4.8.10.exetsetup-x64.4.9.2.exetsetup-x64.4.9.2.tmphandinput.exeAqiyq.execmd.exedescription pid process target process PID 3396 wrote to memory of 2552 3396 New_4.8.10.exe tsetup-x64.4.9.2.exe PID 3396 wrote to memory of 2552 3396 New_4.8.10.exe tsetup-x64.4.9.2.exe PID 3396 wrote to memory of 2552 3396 New_4.8.10.exe tsetup-x64.4.9.2.exe PID 2552 wrote to memory of 2604 2552 tsetup-x64.4.9.2.exe tsetup-x64.4.9.2.tmp PID 2552 wrote to memory of 2604 2552 tsetup-x64.4.9.2.exe tsetup-x64.4.9.2.tmp PID 2552 wrote to memory of 2604 2552 tsetup-x64.4.9.2.exe tsetup-x64.4.9.2.tmp PID 2604 wrote to memory of 700 2604 tsetup-x64.4.9.2.tmp Telegram.exe PID 2604 wrote to memory of 700 2604 tsetup-x64.4.9.2.tmp Telegram.exe PID 3396 wrote to memory of 4448 3396 New_4.8.10.exe handinput.exe PID 3396 wrote to memory of 4448 3396 New_4.8.10.exe handinput.exe PID 3396 wrote to memory of 4448 3396 New_4.8.10.exe handinput.exe PID 4448 wrote to memory of 3596 4448 handinput.exe cmd.exe PID 4448 wrote to memory of 3596 4448 handinput.exe cmd.exe PID 4448 wrote to memory of 3596 4448 handinput.exe cmd.exe PID 60 wrote to memory of 4052 60 Aqiyq.exe Aqiyq.exe PID 60 wrote to memory of 4052 60 Aqiyq.exe Aqiyq.exe PID 60 wrote to memory of 4052 60 Aqiyq.exe Aqiyq.exe PID 3596 wrote to memory of 4396 3596 cmd.exe PING.EXE PID 3596 wrote to memory of 4396 3596 cmd.exe PING.EXE PID 3596 wrote to memory of 4396 3596 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\New_4.8.10.exe"C:\Users\Admin\AppData\Local\Temp\New_4.8.10.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\ProgramData\tsetup-x64.4.9.2.exe"C:\ProgramData\tsetup-x64.4.9.2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\is-OJPBL.tmp\tsetup-x64.4.9.2.tmp"C:\Users\Admin\AppData\Local\Temp\is-OJPBL.tmp\tsetup-x64.4.9.2.tmp" /SL5="$30234,40524263,814592,C:\ProgramData\tsetup-x64.4.9.2.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\Telegram Desktop\Telegram.exe"C:\Users\Admin\AppData\Roaming\Telegram Desktop\Telegram.exe"4⤵
- Drops desktop.ini file(s)
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:700 -
C:\ProgramData\handinput.exe"C:\ProgramData\handinput.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\PROGRA~3\HANDIN~1.EXE > nul3⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:4396
-
C:\ProgramData\Aqiyq.exeC:\ProgramData\Aqiyq.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:60 -
C:\ProgramData\Aqiyq.exeC:\ProgramData\Aqiyq.exe -acsi2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
834KB
MD5a7bb376117fd97810fa4b41a46d3ab97
SHA114ef3d161a262270c2db1696f06c9a4067da1984
SHA25609930bfc1962f0b0d500fc1cb67d528f21b11d6d911f1fa3c251399483728b80
SHA512a4a0ae8ce7c6b9a57f04a4a9a450e243b04743717d4860421538e47879e48561d37d02c1b7a0dd682c5e1eaa8bb2a98bd72e58cfe5a5b47b79c710832fd60b23
-
Filesize
834KB
MD5a7bb376117fd97810fa4b41a46d3ab97
SHA114ef3d161a262270c2db1696f06c9a4067da1984
SHA25609930bfc1962f0b0d500fc1cb67d528f21b11d6d911f1fa3c251399483728b80
SHA512a4a0ae8ce7c6b9a57f04a4a9a450e243b04743717d4860421538e47879e48561d37d02c1b7a0dd682c5e1eaa8bb2a98bd72e58cfe5a5b47b79c710832fd60b23
-
Filesize
834KB
MD5a7bb376117fd97810fa4b41a46d3ab97
SHA114ef3d161a262270c2db1696f06c9a4067da1984
SHA25609930bfc1962f0b0d500fc1cb67d528f21b11d6d911f1fa3c251399483728b80
SHA512a4a0ae8ce7c6b9a57f04a4a9a450e243b04743717d4860421538e47879e48561d37d02c1b7a0dd682c5e1eaa8bb2a98bd72e58cfe5a5b47b79c710832fd60b23
-
Filesize
834KB
MD5a7bb376117fd97810fa4b41a46d3ab97
SHA114ef3d161a262270c2db1696f06c9a4067da1984
SHA25609930bfc1962f0b0d500fc1cb67d528f21b11d6d911f1fa3c251399483728b80
SHA512a4a0ae8ce7c6b9a57f04a4a9a450e243b04743717d4860421538e47879e48561d37d02c1b7a0dd682c5e1eaa8bb2a98bd72e58cfe5a5b47b79c710832fd60b23
-
Filesize
112KB
MD506fbabe3121f537287e6f834e6a1d44e
SHA18ed8a90f0de4203133a9432e61f3d2191bbe4008
SHA2563a0bf79af3a94c98d8ab121d9e2faa1d7f6639ecbef3369d68fa9a88f4bbe11f
SHA512d142dc8cc89f86c1a1bacaa94e78f030159c72d681cc9ae387e87c21e975e839d1cc6f2d07246ba599d3e9c8af77a775b2accbf0bd18185d4619d80d7da9136e
-
Filesize
74KB
MD5a075828073369628bcca8a80fa225744
SHA12d576b316860c141d81ba9916d5915aceb336c7e
SHA256dbc5559ca8d99f045c5511f56a2c4dd156d2672d189935e242284a835c0d7f92
SHA512f92bc90a1d75268f2961e8a83268afc1efbf1381c884742658bca135367104b148fdbb8c0d643daa10063a98e032bcd7d4da50daebf4fa96e203814030a2c993
-
Filesize
83.2MB
MD5eb86e41abd837c01151298eaef1ae4d3
SHA151e9b5afdd681ed7d9c893780cfc881119b90234
SHA256587a48a6ab153356f5cd94c47c817413047ed2e04636a4e90d693d8f6d325f14
SHA5127568223cde9a13bf8945673009869638909ffdfb8b2bdfb5a2e3d3a9b53e5c93f8a5c581d442aee6458cff9b6ac32087849c186d8d397a9eecc1f482d3cda892
-
Filesize
83.2MB
MD5eb86e41abd837c01151298eaef1ae4d3
SHA151e9b5afdd681ed7d9c893780cfc881119b90234
SHA256587a48a6ab153356f5cd94c47c817413047ed2e04636a4e90d693d8f6d325f14
SHA5127568223cde9a13bf8945673009869638909ffdfb8b2bdfb5a2e3d3a9b53e5c93f8a5c581d442aee6458cff9b6ac32087849c186d8d397a9eecc1f482d3cda892
-
Filesize
834KB
MD5a7bb376117fd97810fa4b41a46d3ab97
SHA114ef3d161a262270c2db1696f06c9a4067da1984
SHA25609930bfc1962f0b0d500fc1cb67d528f21b11d6d911f1fa3c251399483728b80
SHA512a4a0ae8ce7c6b9a57f04a4a9a450e243b04743717d4860421538e47879e48561d37d02c1b7a0dd682c5e1eaa8bb2a98bd72e58cfe5a5b47b79c710832fd60b23
-
Filesize
834KB
MD5a7bb376117fd97810fa4b41a46d3ab97
SHA114ef3d161a262270c2db1696f06c9a4067da1984
SHA25609930bfc1962f0b0d500fc1cb67d528f21b11d6d911f1fa3c251399483728b80
SHA512a4a0ae8ce7c6b9a57f04a4a9a450e243b04743717d4860421538e47879e48561d37d02c1b7a0dd682c5e1eaa8bb2a98bd72e58cfe5a5b47b79c710832fd60b23
-
Filesize
39.5MB
MD5ea3b525e8235810679f604b4cb504cb3
SHA18f238faf46acfaa4b170cd2babf8222f12c24828
SHA2563087d90cf63d1cf2d40a5c19def7aa166024e66a6b8f20ff9cd28527edd5a74c
SHA5120ea5ce2c1e54515cb752f8ec8f2217311f13695b84c3efe1d5104464a9ad64d015f56cfd9360bc46569e3eb64bddfabb55f7d26d5ded9e0fee67c28750b0f982
-
Filesize
39.5MB
MD5ea3b525e8235810679f604b4cb504cb3
SHA18f238faf46acfaa4b170cd2babf8222f12c24828
SHA2563087d90cf63d1cf2d40a5c19def7aa166024e66a6b8f20ff9cd28527edd5a74c
SHA5120ea5ce2c1e54515cb752f8ec8f2217311f13695b84c3efe1d5104464a9ad64d015f56cfd9360bc46569e3eb64bddfabb55f7d26d5ded9e0fee67c28750b0f982
-
Filesize
39.5MB
MD5ea3b525e8235810679f604b4cb504cb3
SHA18f238faf46acfaa4b170cd2babf8222f12c24828
SHA2563087d90cf63d1cf2d40a5c19def7aa166024e66a6b8f20ff9cd28527edd5a74c
SHA5120ea5ce2c1e54515cb752f8ec8f2217311f13695b84c3efe1d5104464a9ad64d015f56cfd9360bc46569e3eb64bddfabb55f7d26d5ded9e0fee67c28750b0f982
-
Filesize
3.0MB
MD5b0a8085decfb065f44561789f4be1b92
SHA15f3abb84bb78f3d447c999a99983b93b41c3adcb
SHA256ae2d3dd7b7682a11f57d3fe637a6481017810450a67ab9a608bd37114e20f510
SHA5124fbfc613112ba439217f7133214d4b7381c390286aaccacbcb484ab4c3280fd413f6d4ef2273b2a904ef996ffca898f071f0e97ff7056265c605ae8eedd6150a
-
Filesize
3.0MB
MD5b0a8085decfb065f44561789f4be1b92
SHA15f3abb84bb78f3d447c999a99983b93b41c3adcb
SHA256ae2d3dd7b7682a11f57d3fe637a6481017810450a67ab9a608bd37114e20f510
SHA5124fbfc613112ba439217f7133214d4b7381c390286aaccacbcb484ab4c3280fd413f6d4ef2273b2a904ef996ffca898f071f0e97ff7056265c605ae8eedd6150a
-
Filesize
130.1MB
MD53df5bcea0ca91ab9fc317bcc6d9ea15f
SHA1843a46a3a2495ec3b25eac11ae24b4c4988e7b36
SHA2564e5cfb0d2ad36e4bd55b02cbad768b979f712d780ffde9b055f0fcabb1919ff4
SHA512490f4840a83ba49295abd14c815973822af0de18ab34f525318a6075c3cba23fcfcd56d006e9d13df91fa32569d0f740d183d7d9c8a764a69f54d70760a58911
-
Filesize
130.1MB
MD53df5bcea0ca91ab9fc317bcc6d9ea15f
SHA1843a46a3a2495ec3b25eac11ae24b4c4988e7b36
SHA2564e5cfb0d2ad36e4bd55b02cbad768b979f712d780ffde9b055f0fcabb1919ff4
SHA512490f4840a83ba49295abd14c815973822af0de18ab34f525318a6075c3cba23fcfcd56d006e9d13df91fa32569d0f740d183d7d9c8a764a69f54d70760a58911
-
Filesize
130.1MB
MD53df5bcea0ca91ab9fc317bcc6d9ea15f
SHA1843a46a3a2495ec3b25eac11ae24b4c4988e7b36
SHA2564e5cfb0d2ad36e4bd55b02cbad768b979f712d780ffde9b055f0fcabb1919ff4
SHA512490f4840a83ba49295abd14c815973822af0de18ab34f525318a6075c3cba23fcfcd56d006e9d13df91fa32569d0f740d183d7d9c8a764a69f54d70760a58911
-
Filesize
4.7MB
MD562a89e7867d853fee9ad07b7c9d64379
SHA1944a53602492187308352103d80ff27af1093abf
SHA256d412909f1b597045b856caecedfc677eb4708af00e5b70788a01fa6af49c09d9
SHA5127f66bf278222bf1079a3695ad55086ccc7d8b05d7db4f9a5bcbfe4ac8d82bc1a618b1c6dc675da61d47f48fce2b0670ce6f66db63e79e232604304cfc629d6d0
-
Filesize
83.2MB
MD5eb86e41abd837c01151298eaef1ae4d3
SHA151e9b5afdd681ed7d9c893780cfc881119b90234
SHA256587a48a6ab153356f5cd94c47c817413047ed2e04636a4e90d693d8f6d325f14
SHA5127568223cde9a13bf8945673009869638909ffdfb8b2bdfb5a2e3d3a9b53e5c93f8a5c581d442aee6458cff9b6ac32087849c186d8d397a9eecc1f482d3cda892
-
Filesize
83.2MB
MD5eb86e41abd837c01151298eaef1ae4d3
SHA151e9b5afdd681ed7d9c893780cfc881119b90234
SHA256587a48a6ab153356f5cd94c47c817413047ed2e04636a4e90d693d8f6d325f14
SHA5127568223cde9a13bf8945673009869638909ffdfb8b2bdfb5a2e3d3a9b53e5c93f8a5c581d442aee6458cff9b6ac32087849c186d8d397a9eecc1f482d3cda892
-
Filesize
83.2MB
MD5eb86e41abd837c01151298eaef1ae4d3
SHA151e9b5afdd681ed7d9c893780cfc881119b90234
SHA256587a48a6ab153356f5cd94c47c817413047ed2e04636a4e90d693d8f6d325f14
SHA5127568223cde9a13bf8945673009869638909ffdfb8b2bdfb5a2e3d3a9b53e5c93f8a5c581d442aee6458cff9b6ac32087849c186d8d397a9eecc1f482d3cda892
-
Filesize
74KB
MD5a075828073369628bcca8a80fa225744
SHA12d576b316860c141d81ba9916d5915aceb336c7e
SHA256dbc5559ca8d99f045c5511f56a2c4dd156d2672d189935e242284a835c0d7f92
SHA512f92bc90a1d75268f2961e8a83268afc1efbf1381c884742658bca135367104b148fdbb8c0d643daa10063a98e032bcd7d4da50daebf4fa96e203814030a2c993
-
Filesize
74KB
MD5a075828073369628bcca8a80fa225744
SHA12d576b316860c141d81ba9916d5915aceb336c7e
SHA256dbc5559ca8d99f045c5511f56a2c4dd156d2672d189935e242284a835c0d7f92
SHA512f92bc90a1d75268f2961e8a83268afc1efbf1381c884742658bca135367104b148fdbb8c0d643daa10063a98e032bcd7d4da50daebf4fa96e203814030a2c993
-
Filesize
74KB
MD5a075828073369628bcca8a80fa225744
SHA12d576b316860c141d81ba9916d5915aceb336c7e
SHA256dbc5559ca8d99f045c5511f56a2c4dd156d2672d189935e242284a835c0d7f92
SHA512f92bc90a1d75268f2961e8a83268afc1efbf1381c884742658bca135367104b148fdbb8c0d643daa10063a98e032bcd7d4da50daebf4fa96e203814030a2c993
-
Filesize
4.7MB
MD562a89e7867d853fee9ad07b7c9d64379
SHA1944a53602492187308352103d80ff27af1093abf
SHA256d412909f1b597045b856caecedfc677eb4708af00e5b70788a01fa6af49c09d9
SHA5127f66bf278222bf1079a3695ad55086ccc7d8b05d7db4f9a5bcbfe4ac8d82bc1a618b1c6dc675da61d47f48fce2b0670ce6f66db63e79e232604304cfc629d6d0