Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 07:35
Behavioral task
behavioral1
Sample
413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe
Resource
win10v2004-20230915-en
General
-
Target
413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe
-
Size
271KB
-
MD5
1a745c946198f16fdcf3c902de26341b
-
SHA1
b8ac4346dc294cdb8defdfdcd8169a8308f614c6
-
SHA256
413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82
-
SHA512
9bb81b59b63fbfc788f0df2cf3c3e56a92ef6bc714c4a12ce162d4eccd0c40307a75286338b1ad10b66a27d3563c53ca01a3a58572110e9c496fb06a780abf14
-
SSDEEP
6144:yl51orRJXlDixHkUXe34cEOkCybEaQRXr9HNdvOa:KqXUHkUXe3GOkx2LIa
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3172 created 612 3172 Explorer.EXE 12 -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\HQ3X2p.sys diskperf.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation 413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe -
Executes dropped EXE 2 IoCs
pid Process 3780 f125fa58 2740 diskperf.exe -
resource yara_rule behavioral2/memory/4364-0-0x0000000000850000-0x00000000008D9000-memory.dmp upx behavioral2/files/0x0008000000023249-2.dat upx behavioral2/memory/3780-3-0x0000000000FB0000-0x0000000001039000-memory.dmp upx behavioral2/files/0x0008000000023249-4.dat upx behavioral2/memory/4364-24-0x0000000000850000-0x00000000008D9000-memory.dmp upx behavioral2/memory/3780-27-0x0000000000FB0000-0x0000000001039000-memory.dmp upx behavioral2/memory/4364-37-0x0000000000850000-0x00000000008D9000-memory.dmp upx behavioral2/memory/3780-57-0x0000000000FB0000-0x0000000001039000-memory.dmp upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Drops file in System32 directory 26 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C diskperf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData f125fa58 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E f125fa58 File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 diskperf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 f125fa58 File created C:\Windows\system32\ \Windows\System32\hrIbN4.sys diskperf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E f125fa58 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A f125fa58 File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173 diskperf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 f125fa58 File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_ADB601E2C381343DA1163E5F08582475 diskperf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content f125fa58 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DED9969D7ED2C6E555C5C9254A43EDE4 f125fa58 File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B diskperf.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B diskperf.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173 diskperf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies f125fa58 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache f125fa58 File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C diskperf.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_ADB601E2C381343DA1163E5F08582475 diskperf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft f125fa58 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A f125fa58 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DED9969D7ED2C6E555C5C9254A43EDE4 f125fa58 File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 diskperf.exe File created C:\Windows\SysWOW64\f125fa58 413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE f125fa58 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\diskperf.exe Explorer.EXE File opened for modification C:\Program Files\Common Files\diskperf.exe Explorer.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\40b708 f125fa58 File created C:\Windows\q9ZLzumdC.sys diskperf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 diskperf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 diskperf.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName diskperf.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3236 timeout.exe 2928 timeout.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix f125fa58 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ f125fa58 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" f125fa58 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing f125fa58 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" diskperf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" diskperf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" f125fa58 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" f125fa58 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" f125fa58 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" f125fa58 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" diskperf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" diskperf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" f125fa58 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix diskperf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ diskperf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" diskperf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" diskperf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing diskperf.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3780 f125fa58 3780 f125fa58 3780 f125fa58 3780 f125fa58 3780 f125fa58 3780 f125fa58 3780 f125fa58 3780 f125fa58 3780 f125fa58 3780 f125fa58 3172 Explorer.EXE 3172 Explorer.EXE 3172 Explorer.EXE 3172 Explorer.EXE 3780 f125fa58 3780 f125fa58 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3172 Explorer.EXE -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 4364 413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe Token: SeTcbPrivilege 4364 413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe Token: SeDebugPrivilege 3780 f125fa58 Token: SeTcbPrivilege 3780 f125fa58 Token: SeDebugPrivilege 3780 f125fa58 Token: SeDebugPrivilege 3172 Explorer.EXE Token: SeDebugPrivilege 3172 Explorer.EXE Token: SeIncBasePriorityPrivilege 4364 413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe Token: SeDebugPrivilege 3780 f125fa58 Token: SeDebugPrivilege 2740 diskperf.exe Token: SeDebugPrivilege 2740 diskperf.exe Token: SeDebugPrivilege 2740 diskperf.exe Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeIncBasePriorityPrivilege 3780 f125fa58 Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3172 Explorer.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3780 wrote to memory of 3172 3780 f125fa58 48 PID 3780 wrote to memory of 3172 3780 f125fa58 48 PID 3780 wrote to memory of 3172 3780 f125fa58 48 PID 3780 wrote to memory of 3172 3780 f125fa58 48 PID 3780 wrote to memory of 3172 3780 f125fa58 48 PID 3172 wrote to memory of 2740 3172 Explorer.EXE 89 PID 3172 wrote to memory of 2740 3172 Explorer.EXE 89 PID 3172 wrote to memory of 2740 3172 Explorer.EXE 89 PID 3172 wrote to memory of 2740 3172 Explorer.EXE 89 PID 3172 wrote to memory of 2740 3172 Explorer.EXE 89 PID 3172 wrote to memory of 2740 3172 Explorer.EXE 89 PID 3172 wrote to memory of 2740 3172 Explorer.EXE 89 PID 3780 wrote to memory of 612 3780 f125fa58 12 PID 3780 wrote to memory of 612 3780 f125fa58 12 PID 3780 wrote to memory of 612 3780 f125fa58 12 PID 3780 wrote to memory of 612 3780 f125fa58 12 PID 3780 wrote to memory of 612 3780 f125fa58 12 PID 4364 wrote to memory of 4120 4364 413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe 91 PID 4364 wrote to memory of 4120 4364 413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe 91 PID 4364 wrote to memory of 4120 4364 413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe 91 PID 4120 wrote to memory of 3236 4120 cmd.exe 93 PID 4120 wrote to memory of 3236 4120 cmd.exe 93 PID 4120 wrote to memory of 3236 4120 cmd.exe 93 PID 3780 wrote to memory of 3608 3780 f125fa58 94 PID 3780 wrote to memory of 3608 3780 f125fa58 94 PID 3780 wrote to memory of 3608 3780 f125fa58 94 PID 3608 wrote to memory of 2928 3608 cmd.exe 96 PID 3608 wrote to memory of 2928 3608 cmd.exe 96 PID 3608 wrote to memory of 2928 3608 cmd.exe 96
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Program Files\Common Files\diskperf.exe"C:\Program Files\Common Files\diskperf.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe"C:\Users\Admin\AppData\Local\Temp\413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\timeout.exetimeout /t 14⤵
- Delays execution with timeout.exe
PID:3236
-
-
-
-
C:\Windows\Syswow64\f125fa58C:\Windows\Syswow64\f125fa581⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Windows\Syswow64\f125fa58"2⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD57face5a6c4fa7913a7051bb8c8f9e7ed
SHA19e184f02ee2fc57e03a00f3a62a1126ea7657451
SHA256293044b6001452f9855ce34bbf26f8a5c9d44a5cd2fbe9d8ac0651398c0f5fcb
SHA5123730fd41aff94c140cad7f97c7935962527fedf4c0784a99986d739e60ace884edeadea4cedc53ea6ba758df12e87d2549531610baf1564c05b158cdcfc57b18
-
Filesize
25KB
MD57face5a6c4fa7913a7051bb8c8f9e7ed
SHA19e184f02ee2fc57e03a00f3a62a1126ea7657451
SHA256293044b6001452f9855ce34bbf26f8a5c9d44a5cd2fbe9d8ac0651398c0f5fcb
SHA5123730fd41aff94c140cad7f97c7935962527fedf4c0784a99986d739e60ace884edeadea4cedc53ea6ba758df12e87d2549531610baf1564c05b158cdcfc57b18
-
Filesize
14.8MB
MD5b1057fccc9bf7a0976c173bed8c7e2a0
SHA1fa7023b9e81f80adf10721ae995ec07ba0edd2f2
SHA2563ee17398c1784dac54e2a218aacf3e64819dab2e809040ffc261d0444e768582
SHA51204d4e64b137163ff9ffa8692495a2f91d80340ee6470c987e4413be3774ca5b344db8ea69d110642e10017e7868a086086f297441f3bc91038dee942d2b84a12
-
Filesize
11.6MB
MD55244c87dbafa1f764b258766005dea73
SHA184cb8b4fb3e0910cfecfb31b6fa54c16d940e703
SHA256077035f93ddc3ac5a8b5631d43826baf7722256eb1c4716b3c2567f07379bc40
SHA51254d64d32e73e2752cdf9a110db17ad64574eb072df0ed0dc34a7e4bc469c03aa79ef7d45465e279ef85d5fc6b33a1b750b181476cdea7ea98898ddba9aa60438
-
Filesize
271KB
MD5b9475474062c9ae681d27a7addd333a0
SHA185d0f55b5f1323030c91b717064b04e19bd394d1
SHA2569858803816d59597626197b483e6dc91dd1452fcfdfdec0c741d7cbf43603c3a
SHA512155796bc24f17390d54529bb8f054bec20287fe10864a1439553b52794c4c076a6989d24f458892ae3157457321b7ba0c09030b97f06046b9896a8ac08cc534b
-
Filesize
271KB
MD5b9475474062c9ae681d27a7addd333a0
SHA185d0f55b5f1323030c91b717064b04e19bd394d1
SHA2569858803816d59597626197b483e6dc91dd1452fcfdfdec0c741d7cbf43603c3a
SHA512155796bc24f17390d54529bb8f054bec20287fe10864a1439553b52794c4c076a6989d24f458892ae3157457321b7ba0c09030b97f06046b9896a8ac08cc534b