Analysis
-
max time kernel
259s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
25-08-2023 14:50
Static task
static1
Behavioral task
behavioral1
Sample
sougoupinyin.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
sougoupinyin.exe
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
sougoupinyin.exe
Resource
win10v2004-20230703-en
General
-
Target
sougoupinyin.exe
-
Size
125.6MB
-
MD5
ed226d3d12b00b0affe58e84e23920cd
-
SHA1
f8010d64281c3dbc26f75599f11d0073aab0fc1d
-
SHA256
fc5175f13eb4eb25f4caa92c186605bd72523e1dec7363a0d54a678dfe387fe0
-
SHA512
4acb1486a910e30bf7ac59d6fc82622000c55321eab8e5ca3b376c3ca7ea6435d53b3e1df2ecaf0702d087dd003d12ee90108ee329b361ba775d9eed246cdfb5
-
SSDEEP
3145728:X6Odyqv0eg18Rx0OYWebzLKQIjJYCX6EYsU1ocWTRKop315h2:X6OQ4s8Rx0OpkKQILwicWNKop3nh2
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
Processes:
MsiExec.exeMsiExec.exeMsiExec.exepid process 2908 MsiExec.exe 888 MsiExec.exe 888 MsiExec.exe 888 MsiExec.exe 888 MsiExec.exe 824 MsiExec.exe 824 MsiExec.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exesougoupinyin.exemsiexec.exedescription ioc process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: sougoupinyin.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\V: sougoupinyin.exe File opened (read-only) \??\Z: sougoupinyin.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\O: sougoupinyin.exe File opened (read-only) \??\L: sougoupinyin.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: sougoupinyin.exe File opened (read-only) \??\G: sougoupinyin.exe File opened (read-only) \??\M: sougoupinyin.exe File opened (read-only) \??\P: sougoupinyin.exe File opened (read-only) \??\B: sougoupinyin.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: sougoupinyin.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\U: sougoupinyin.exe File opened (read-only) \??\X: sougoupinyin.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: sougoupinyin.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: sougoupinyin.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: sougoupinyin.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Q: sougoupinyin.exe File opened (read-only) \??\T: sougoupinyin.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: sougoupinyin.exe File opened (read-only) \??\W: sougoupinyin.exe File opened (read-only) \??\Y: sougoupinyin.exe -
Drops file in Windows directory 10 IoCs
Processes:
DrvInst.exemsiexec.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f77c60d.msi msiexec.exe File opened for modification C:\Windows\Installer\f77c60d.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIC8AD.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\Installer\MSIC764.tmp msiexec.exe File created C:\Windows\Installer\f77c60e.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIE736.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 43 IoCs
Processes:
DrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
msiexec.exepid process 2384 msiexec.exe 2384 msiexec.exe 2384 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exesougoupinyin.exedescription pid process Token: SeRestorePrivilege 2384 msiexec.exe Token: SeTakeOwnershipPrivilege 2384 msiexec.exe Token: SeSecurityPrivilege 2384 msiexec.exe Token: SeCreateTokenPrivilege 2640 sougoupinyin.exe Token: SeAssignPrimaryTokenPrivilege 2640 sougoupinyin.exe Token: SeLockMemoryPrivilege 2640 sougoupinyin.exe Token: SeIncreaseQuotaPrivilege 2640 sougoupinyin.exe Token: SeMachineAccountPrivilege 2640 sougoupinyin.exe Token: SeTcbPrivilege 2640 sougoupinyin.exe Token: SeSecurityPrivilege 2640 sougoupinyin.exe Token: SeTakeOwnershipPrivilege 2640 sougoupinyin.exe Token: SeLoadDriverPrivilege 2640 sougoupinyin.exe Token: SeSystemProfilePrivilege 2640 sougoupinyin.exe Token: SeSystemtimePrivilege 2640 sougoupinyin.exe Token: SeProfSingleProcessPrivilege 2640 sougoupinyin.exe Token: SeIncBasePriorityPrivilege 2640 sougoupinyin.exe Token: SeCreatePagefilePrivilege 2640 sougoupinyin.exe Token: SeCreatePermanentPrivilege 2640 sougoupinyin.exe Token: SeBackupPrivilege 2640 sougoupinyin.exe Token: SeRestorePrivilege 2640 sougoupinyin.exe Token: SeShutdownPrivilege 2640 sougoupinyin.exe Token: SeDebugPrivilege 2640 sougoupinyin.exe Token: SeAuditPrivilege 2640 sougoupinyin.exe Token: SeSystemEnvironmentPrivilege 2640 sougoupinyin.exe Token: SeChangeNotifyPrivilege 2640 sougoupinyin.exe Token: SeRemoteShutdownPrivilege 2640 sougoupinyin.exe Token: SeUndockPrivilege 2640 sougoupinyin.exe Token: SeSyncAgentPrivilege 2640 sougoupinyin.exe Token: SeEnableDelegationPrivilege 2640 sougoupinyin.exe Token: SeManageVolumePrivilege 2640 sougoupinyin.exe Token: SeImpersonatePrivilege 2640 sougoupinyin.exe Token: SeCreateGlobalPrivilege 2640 sougoupinyin.exe Token: SeCreateTokenPrivilege 2640 sougoupinyin.exe Token: SeAssignPrimaryTokenPrivilege 2640 sougoupinyin.exe Token: SeLockMemoryPrivilege 2640 sougoupinyin.exe Token: SeIncreaseQuotaPrivilege 2640 sougoupinyin.exe Token: SeMachineAccountPrivilege 2640 sougoupinyin.exe Token: SeTcbPrivilege 2640 sougoupinyin.exe Token: SeSecurityPrivilege 2640 sougoupinyin.exe Token: SeTakeOwnershipPrivilege 2640 sougoupinyin.exe Token: SeLoadDriverPrivilege 2640 sougoupinyin.exe Token: SeSystemProfilePrivilege 2640 sougoupinyin.exe Token: SeSystemtimePrivilege 2640 sougoupinyin.exe Token: SeProfSingleProcessPrivilege 2640 sougoupinyin.exe Token: SeIncBasePriorityPrivilege 2640 sougoupinyin.exe Token: SeCreatePagefilePrivilege 2640 sougoupinyin.exe Token: SeCreatePermanentPrivilege 2640 sougoupinyin.exe Token: SeBackupPrivilege 2640 sougoupinyin.exe Token: SeRestorePrivilege 2640 sougoupinyin.exe Token: SeShutdownPrivilege 2640 sougoupinyin.exe Token: SeDebugPrivilege 2640 sougoupinyin.exe Token: SeAuditPrivilege 2640 sougoupinyin.exe Token: SeSystemEnvironmentPrivilege 2640 sougoupinyin.exe Token: SeChangeNotifyPrivilege 2640 sougoupinyin.exe Token: SeRemoteShutdownPrivilege 2640 sougoupinyin.exe Token: SeUndockPrivilege 2640 sougoupinyin.exe Token: SeSyncAgentPrivilege 2640 sougoupinyin.exe Token: SeEnableDelegationPrivilege 2640 sougoupinyin.exe Token: SeManageVolumePrivilege 2640 sougoupinyin.exe Token: SeImpersonatePrivilege 2640 sougoupinyin.exe Token: SeCreateGlobalPrivilege 2640 sougoupinyin.exe Token: SeCreateTokenPrivilege 2640 sougoupinyin.exe Token: SeAssignPrimaryTokenPrivilege 2640 sougoupinyin.exe Token: SeLockMemoryPrivilege 2640 sougoupinyin.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
sougoupinyin.exemsiexec.exepid process 2640 sougoupinyin.exe 2852 msiexec.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
msiexec.exesougoupinyin.exedescription pid process target process PID 2384 wrote to memory of 2908 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 2908 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 2908 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 2908 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 2908 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 2908 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 2908 2384 msiexec.exe MsiExec.exe PID 2640 wrote to memory of 2852 2640 sougoupinyin.exe msiexec.exe PID 2640 wrote to memory of 2852 2640 sougoupinyin.exe msiexec.exe PID 2640 wrote to memory of 2852 2640 sougoupinyin.exe msiexec.exe PID 2640 wrote to memory of 2852 2640 sougoupinyin.exe msiexec.exe PID 2640 wrote to memory of 2852 2640 sougoupinyin.exe msiexec.exe PID 2640 wrote to memory of 2852 2640 sougoupinyin.exe msiexec.exe PID 2640 wrote to memory of 2852 2640 sougoupinyin.exe msiexec.exe PID 2384 wrote to memory of 888 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 888 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 888 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 888 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 888 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 888 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 888 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 824 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 824 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 824 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 824 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 824 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 824 2384 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 824 2384 msiexec.exe MsiExec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sougoupinyin.exe"C:\Users\Admin\AppData\Local\Temp\sougoupinyin.exe"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\sg\搜狗输入法金秋 1.30.0\install\搜狗输入法金秋.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\sougoupinyin.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1692715646 "2⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:2852
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F853C1A36E3285A0B6E929818C3CDDDB C2⤵
- Loads dropped DLL
PID:2908 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DCA863180EB24D520ED08933E1DE4720 C2⤵
- Loads dropped DLL
PID:888 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7846C22417D24E42A44ABA7DBAF503662⤵
- Loads dropped DLL
PID:824
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1148
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000053C" "0000000000000548"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
1.4MB
MD5f8e758f3699334bbd2ab66f7b734753f
SHA105ff84726d0390596c4158329b3e322f3844f1d8
SHA2565b849c5f5ba277c128a7dfe0b6f00c0113de5bdfe2111f1cd2011e31be97d944
SHA51285e0dae26ad0696afcbffdd236ad182f3aa2c24f5b4ff0e837fc734c8f5b759b30677e95de994588f75c2a0e4e29e71adcfde48fdefc48d763a843c7793bf0f8
-
Filesize
1.4MB
MD5f8e758f3699334bbd2ab66f7b734753f
SHA105ff84726d0390596c4158329b3e322f3844f1d8
SHA2565b849c5f5ba277c128a7dfe0b6f00c0113de5bdfe2111f1cd2011e31be97d944
SHA51285e0dae26ad0696afcbffdd236ad182f3aa2c24f5b4ff0e837fc734c8f5b759b30677e95de994588f75c2a0e4e29e71adcfde48fdefc48d763a843c7793bf0f8
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
597KB
MD5999c6b224a8215a8ffe9792c82d93754
SHA19aa98fd47aa4472a9d44c1d41233d9c767deee4c
SHA2562e15823e8384eb7a15cb5daae61ebb031f3928bc511e74115d950afa98ef9572
SHA5127438d35e7263b8b9918c163beafeb18bc35cab7b8577487e24089517016b85e8e13817f13caee011bb1e4ed35af28d3a91e99950c24a2566c0b6453092fa1347
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
597KB
MD5999c6b224a8215a8ffe9792c82d93754
SHA19aa98fd47aa4472a9d44c1d41233d9c767deee4c
SHA2562e15823e8384eb7a15cb5daae61ebb031f3928bc511e74115d950afa98ef9572
SHA5127438d35e7263b8b9918c163beafeb18bc35cab7b8577487e24089517016b85e8e13817f13caee011bb1e4ed35af28d3a91e99950c24a2566c0b6453092fa1347