Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 08:36
Static task
static1
Behavioral task
behavioral1
Sample
593820d8c00307cde29ff131e5f887e7eeea3bea2d9df134f26a10c4894ee522.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
593820d8c00307cde29ff131e5f887e7eeea3bea2d9df134f26a10c4894ee522.exe
Resource
win10v2004-20230915-en
General
-
Target
593820d8c00307cde29ff131e5f887e7eeea3bea2d9df134f26a10c4894ee522.exe
-
Size
11.9MB
-
MD5
393ea47dab7016746afb9140136f83e1
-
SHA1
c3f2b130fdc79c62885fcee0bc1b3643d5e4fcd6
-
SHA256
593820d8c00307cde29ff131e5f887e7eeea3bea2d9df134f26a10c4894ee522
-
SHA512
a9071b16f2ddad61918d99194390a2b2a6f1ed0501ff139ead29cc5b4cbcdc2d9347be28000a6b18232cb62483127c2a0a6042c5d9f212674ed7baa6afbc94e1
-
SSDEEP
196608:o51pYycY9qmZQVqOwRMsEasmc9BDaltbPsfu2K6JlsRK87:gksRQVrwxhc9snTaJSRX7
Malware Config
Signatures
-
Downloads MZ/PE file
-
resource yara_rule behavioral2/files/0x000900000002325c-2.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation 593820d8c00307cde29ff131e5f887e7eeea3bea2d9df134f26a10c4894ee522.exe -
Executes dropped EXE 1 IoCs
pid Process 5004 MapoUpdater.exe -
Loads dropped DLL 2 IoCs
pid Process 2612 593820d8c00307cde29ff131e5f887e7eeea3bea2d9df134f26a10c4894ee522.exe 2612 593820d8c00307cde29ff131e5f887e7eeea3bea2d9df134f26a10c4894ee522.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4404 msedge.exe 4404 msedge.exe 3952 identity_helper.exe 3952 identity_helper.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2612 593820d8c00307cde29ff131e5f887e7eeea3bea2d9df134f26a10c4894ee522.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2612 wrote to memory of 5004 2612 593820d8c00307cde29ff131e5f887e7eeea3bea2d9df134f26a10c4894ee522.exe 92 PID 2612 wrote to memory of 5004 2612 593820d8c00307cde29ff131e5f887e7eeea3bea2d9df134f26a10c4894ee522.exe 92 PID 2612 wrote to memory of 5004 2612 593820d8c00307cde29ff131e5f887e7eeea3bea2d9df134f26a10c4894ee522.exe 92 PID 5004 wrote to memory of 4404 5004 MapoUpdater.exe 96 PID 5004 wrote to memory of 4404 5004 MapoUpdater.exe 96 PID 4404 wrote to memory of 2856 4404 msedge.exe 97 PID 4404 wrote to memory of 2856 4404 msedge.exe 97 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4304 4404 msedge.exe 99 PID 4404 wrote to memory of 4612 4404 msedge.exe 98 PID 4404 wrote to memory of 4612 4404 msedge.exe 98 PID 4404 wrote to memory of 3184 4404 msedge.exe 100 PID 4404 wrote to memory of 3184 4404 msedge.exe 100 PID 4404 wrote to memory of 3184 4404 msedge.exe 100 PID 4404 wrote to memory of 3184 4404 msedge.exe 100 PID 4404 wrote to memory of 3184 4404 msedge.exe 100 PID 4404 wrote to memory of 3184 4404 msedge.exe 100 PID 4404 wrote to memory of 3184 4404 msedge.exe 100 PID 4404 wrote to memory of 3184 4404 msedge.exe 100 PID 4404 wrote to memory of 3184 4404 msedge.exe 100 PID 4404 wrote to memory of 3184 4404 msedge.exe 100 PID 4404 wrote to memory of 3184 4404 msedge.exe 100 PID 4404 wrote to memory of 3184 4404 msedge.exe 100 PID 4404 wrote to memory of 3184 4404 msedge.exe 100 PID 4404 wrote to memory of 3184 4404 msedge.exe 100 PID 4404 wrote to memory of 3184 4404 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\593820d8c00307cde29ff131e5f887e7eeea3bea2d9df134f26a10c4894ee522.exe"C:\Users\Admin\AppData\Local\Temp\593820d8c00307cde29ff131e5f887e7eeea3bea2d9df134f26a10c4894ee522.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\MapoUpdater.exe"C:\Users\Admin\AppData\Local\Temp\MapoUpdater.exe" "http://softupdate1.maposafe.com/uploads/7937410/2125674/自动上货1008.zip" "C:\Users\Admin\AppData\Local\Temp" "DM自动上货.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://softupdate1.maposafe.com/uploads/7937410/2125674/????1008.zip3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd28c46f8,0x7ffcd28c4708,0x7ffcd28c47184⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,13410585798857064497,13718530622714495468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,13410585798857064497,13718530622714495468,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:24⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,13410585798857064497,13718530622714495468,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:84⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,13410585798857064497,13718530622714495468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:14⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,13410585798857064497,13718530622714495468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:14⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,13410585798857064497,13718530622714495468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 /prefetch:84⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,13410585798857064497,13718530622714495468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,13410585798857064497,13718530622714495468,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:14⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,13410585798857064497,13718530622714495468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:14⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,13410585798857064497,13718530622714495468,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:14⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,13410585798857064497,13718530622714495468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:14⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,13410585798857064497,13718530622714495468,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3112 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f95638730ec51abd55794c140ca826c9
SHA177c415e2599fbdfe16530c2ab533fd6b193e82ef
SHA256106137874d86d602d1f4af7dac605f3470ec7a5d69b644b99d502bb38925bbd3
SHA5120eb01b446d876886066783242381d214a01e2d282729a69b890ae2b6d74d0e1325a6bd4671738ebe3b6ecadc22ceb00f42348bad18d2352896ed3344cc29f78a
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5da68c51c619750dfbb7f98d290094e0d
SHA13e2d8a5efa6a2289fb2f1bd9210e164235b7e80c
SHA256695cf4e243a3e88ab8bd16dc4e557ba3fd109ad037faa1d15a42ab92e167fee7
SHA51272446dd4a20d08abbb4c9ee1196a3af73bfb4d16568a6f5977e847e952763cf6d8dd47d71683a8330261165e1f2e88f0c3e9544aeafaa6903dcbe75f311327d4
-
Filesize
5KB
MD53d3193fe35cf8566d2344c10db467032
SHA1fa9badc97bd35d50839a2177e49d8fc2d879bf6d
SHA2560bf847f8b6a2d4a445fe9dd46fa4cdce7051210b115f4ac3ed9517a6bb84f1b0
SHA512d78686c1d72f989f1fbcbbb50e7b3a10389bda4bfe5add89216a5115ebc937b00935b96f401dce0d57ef76283cc3ed79cf3960d8717619e9b7a5c66114a59b9d
-
Filesize
24KB
MD54a078fb8a7c67594a6c2aa724e2ac684
SHA192bc5b49985c8588c60f6f85c50a516fae0332f4
SHA256c225fb924400745c1cd7b56fffaee71dce06613c91fbbb9aa247401ccb49e1ee
SHA512188270df5243186d00ca8cc457f8ab7f7b2cd6368d987c3673f9c8944a4be6687b30daf8715429bd1b335391118d0ce840e3cb919ff4138c6273b286fb57b2b6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD574898a8796e5668071851eebe2925d74
SHA1e58c8fcdb689312a0a625106b5abb3524c334d21
SHA256eae7e3bafdc968b964dda0cb1abc658b0ba72ec221cf7c09b688d04a352ab970
SHA512fd9f2ca4535e0553bcaeee3263a4b0b173660dc4ac6c0643fe0e493ca394124457e93d2017c894438810d82df51665617edba917195a418beeb73a87f586185d
-
Filesize
2.6MB
MD514a4d83af50c93b1e5049e299e2ae93e
SHA18d47d7fe0e7e289c0d1d1a778ff713e8b976160e
SHA256211bcaf4a5e850653e40a37d63f27479503d793053f801fd9d9a3238c463746b
SHA512f02828c3a03c316396b3a1036799b38ca6d764d4dad430a9460a7253ccad98cb9a4f4fc15a1ee1cbc80cf2105c6e104dda41d5455c7c2378c9dc71de17fe2727
-
Filesize
6.1MB
MD5d7beff9a0702ee3433e352920a158306
SHA1c659cd53a89b3ba8449b8040bc1b03f0fbafaeb6
SHA25612a3ecd17726e69fec15fca91d3e14cfe0657a3ee90bb3ff13ee10b4535b881f
SHA5127779d789056f345c2ca1a8f0dbbda860cedd64a8867255fa92786ab6a3789ff75acb771b2be75faa74408b5c9166e474f31424f0d34f1dccc59d5be9efcf65f1
-
Filesize
207KB
MD5f97e23f564ca5f502d4b53531e716be9
SHA1acb4dc18860f2cfc4962162ace6c60ead0f61b11
SHA2567f2ad90965c8f294f7f564cb044a50a1a1dd8e2a75df013776fac11d90926ed7
SHA5126c6b8c63e1f9395bc54d6d80335ca7d952420c0dae96ef1118171e15949836f07b3733280c3dc9b971e427869db8b26b2bded1a244f7c118a73281ef31cb45ae
-
Filesize
207KB
MD5f97e23f564ca5f502d4b53531e716be9
SHA1acb4dc18860f2cfc4962162ace6c60ead0f61b11
SHA2567f2ad90965c8f294f7f564cb044a50a1a1dd8e2a75df013776fac11d90926ed7
SHA5126c6b8c63e1f9395bc54d6d80335ca7d952420c0dae96ef1118171e15949836f07b3733280c3dc9b971e427869db8b26b2bded1a244f7c118a73281ef31cb45ae
-
Filesize
207KB
MD5f97e23f564ca5f502d4b53531e716be9
SHA1acb4dc18860f2cfc4962162ace6c60ead0f61b11
SHA2567f2ad90965c8f294f7f564cb044a50a1a1dd8e2a75df013776fac11d90926ed7
SHA5126c6b8c63e1f9395bc54d6d80335ca7d952420c0dae96ef1118171e15949836f07b3733280c3dc9b971e427869db8b26b2bded1a244f7c118a73281ef31cb45ae