Analysis
-
max time kernel
119s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2023 23:49
Static task
static1
Behavioral task
behavioral1
Sample
f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe
Resource
win7-20231023-en
General
-
Target
f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe
-
Size
393KB
-
MD5
f46f73d5fa369883f2f0f7f1da7c646f
-
SHA1
3d32694d4f2ab002fda7610117ea3e14fbe983ed
-
SHA256
f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213
-
SHA512
836fed4872fd5e08fe814f538dbc55e70c378297ef585dcc7bc763223300a6edd42d7671deb9844a010c195e784f30a9d2eea93acf4ca76df6f811e75e40fa1a
-
SSDEEP
6144:WKNLSD2LqJGz0ZAdH2r/di2Pwd2olDDdpfM4Z:9WDumABC/Nwd2opdp
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Utsysc.exef4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation Utsysc.exe Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe -
Executes dropped EXE 1 IoCs
Processes:
Utsysc.exepid process 2984 Utsysc.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exepid process 2752 rundll32.exe 4152 rundll32.exe 2968 rundll32.exe 1316 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 976 632 WerFault.exe f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe 1608 632 WerFault.exe f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe 4268 632 WerFault.exe f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe 1328 632 WerFault.exe f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe 4152 632 WerFault.exe f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe 4812 632 WerFault.exe f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe 1800 632 WerFault.exe f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe 3140 632 WerFault.exe f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe 4492 632 WerFault.exe f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe 4844 632 WerFault.exe f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe 2356 2984 WerFault.exe Utsysc.exe 1724 2984 WerFault.exe Utsysc.exe 2780 2984 WerFault.exe Utsysc.exe 3464 2984 WerFault.exe Utsysc.exe 908 2984 WerFault.exe Utsysc.exe 1780 2984 WerFault.exe Utsysc.exe 5108 2984 WerFault.exe Utsysc.exe 4608 2984 WerFault.exe Utsysc.exe 944 2984 WerFault.exe Utsysc.exe 3556 2984 WerFault.exe Utsysc.exe 4996 2984 WerFault.exe Utsysc.exe 4284 2984 WerFault.exe Utsysc.exe 4748 2984 WerFault.exe Utsysc.exe 2320 2984 WerFault.exe Utsysc.exe 2504 2984 WerFault.exe Utsysc.exe 1720 2984 WerFault.exe Utsysc.exe 1940 2984 WerFault.exe Utsysc.exe 3824 2984 WerFault.exe Utsysc.exe 4160 2984 WerFault.exe Utsysc.exe 3856 1620 WerFault.exe Utsysc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exepid process 632 f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exeUtsysc.exerundll32.exerundll32.exedescription pid process target process PID 632 wrote to memory of 2984 632 f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe Utsysc.exe PID 632 wrote to memory of 2984 632 f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe Utsysc.exe PID 632 wrote to memory of 2984 632 f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe Utsysc.exe PID 2984 wrote to memory of 4728 2984 Utsysc.exe schtasks.exe PID 2984 wrote to memory of 4728 2984 Utsysc.exe schtasks.exe PID 2984 wrote to memory of 4728 2984 Utsysc.exe schtasks.exe PID 2984 wrote to memory of 2752 2984 Utsysc.exe rundll32.exe PID 2984 wrote to memory of 2752 2984 Utsysc.exe rundll32.exe PID 2984 wrote to memory of 2752 2984 Utsysc.exe rundll32.exe PID 2752 wrote to memory of 4152 2752 rundll32.exe rundll32.exe PID 2752 wrote to memory of 4152 2752 rundll32.exe rundll32.exe PID 2984 wrote to memory of 2968 2984 Utsysc.exe rundll32.exe PID 2984 wrote to memory of 2968 2984 Utsysc.exe rundll32.exe PID 2984 wrote to memory of 2968 2984 Utsysc.exe rundll32.exe PID 2968 wrote to memory of 1316 2968 rundll32.exe rundll32.exe PID 2968 wrote to memory of 1316 2968 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe"C:\Users\Admin\AppData\Local\Temp\f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 5842⤵
- Program crash
PID:976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 6602⤵
- Program crash
PID:1608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 7482⤵
- Program crash
PID:4268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 8562⤵
- Program crash
PID:1328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 8642⤵
- Program crash
PID:4152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 8642⤵
- Program crash
PID:4812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 11162⤵
- Program crash
PID:1800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 11082⤵
- Program crash
PID:3140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 12202⤵
- Program crash
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 6083⤵
- Program crash
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 7443⤵
- Program crash
PID:1724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 9883⤵
- Program crash
PID:2780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 10083⤵
- Program crash
PID:3464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 10163⤵
- Program crash
PID:908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 10163⤵
- Program crash
PID:1780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 10563⤵
- Program crash
PID:5108 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:4728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 9123⤵
- Program crash
PID:4608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 6363⤵
- Program crash
PID:944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 12803⤵
- Program crash
PID:3556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 13123⤵
- Program crash
PID:4996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 12643⤵
- Program crash
PID:4284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 12883⤵
- Program crash
PID:4748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 12923⤵
- Program crash
PID:2320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 10163⤵
- Program crash
PID:2504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 14083⤵
- Program crash
PID:1720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 14043⤵
- Program crash
PID:1940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 15523⤵
- Program crash
PID:3824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 16163⤵
- Program crash
PID:4160 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵
- Loads dropped DLL
PID:4152 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵
- Loads dropped DLL
PID:1316 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵PID:1796
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵PID:804
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵PID:976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 12602⤵
- Program crash
PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 632 -ip 6321⤵PID:3564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 632 -ip 6321⤵PID:2280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 632 -ip 6321⤵PID:2436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 632 -ip 6321⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 632 -ip 6321⤵PID:496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 632 -ip 6321⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 632 -ip 6321⤵PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 632 -ip 6321⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 632 -ip 6321⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 632 -ip 6321⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2984 -ip 29841⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2984 -ip 29841⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2984 -ip 29841⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2984 -ip 29841⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2984 -ip 29841⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 2984 -ip 29841⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2984 -ip 29841⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2984 -ip 29841⤵PID:2676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2984 -ip 29841⤵PID:1604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2984 -ip 29841⤵PID:2708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2984 -ip 29841⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 2984 -ip 29841⤵PID:3832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2984 -ip 29841⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2984 -ip 29841⤵PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2984 -ip 29841⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2984 -ip 29841⤵PID:4172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 2984 -ip 29841⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2984 -ip 29841⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2984 -ip 29841⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe1⤵PID:1620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 4322⤵
- Program crash
PID:3856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1620 -ip 16201⤵PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD55daa93c6f2be4748c6acde8a3e743539
SHA12ceb9b6afc9b98b479faf6c487ec7c3dfc2a5f24
SHA25656c45334b4ebdc094d36922d6cfc58baf4b445a130351dde5634dcfcae3ef703
SHA51221690bc207694dea2e269335bb1583faf2f1646d9bbe8b49b37ca03f8fb0dc99b0dc53b100635ab1cd8ca897bcf35afd171cd92fd0b6aff6f633e7a820ec4c8b
-
Filesize
393KB
MD5f46f73d5fa369883f2f0f7f1da7c646f
SHA13d32694d4f2ab002fda7610117ea3e14fbe983ed
SHA256f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213
SHA512836fed4872fd5e08fe814f538dbc55e70c378297ef585dcc7bc763223300a6edd42d7671deb9844a010c195e784f30a9d2eea93acf4ca76df6f811e75e40fa1a
-
Filesize
393KB
MD5f46f73d5fa369883f2f0f7f1da7c646f
SHA13d32694d4f2ab002fda7610117ea3e14fbe983ed
SHA256f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213
SHA512836fed4872fd5e08fe814f538dbc55e70c378297ef585dcc7bc763223300a6edd42d7671deb9844a010c195e784f30a9d2eea93acf4ca76df6f811e75e40fa1a
-
Filesize
393KB
MD5f46f73d5fa369883f2f0f7f1da7c646f
SHA13d32694d4f2ab002fda7610117ea3e14fbe983ed
SHA256f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213
SHA512836fed4872fd5e08fe814f538dbc55e70c378297ef585dcc7bc763223300a6edd42d7671deb9844a010c195e784f30a9d2eea93acf4ca76df6f811e75e40fa1a
-
Filesize
393KB
MD5f46f73d5fa369883f2f0f7f1da7c646f
SHA13d32694d4f2ab002fda7610117ea3e14fbe983ed
SHA256f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213
SHA512836fed4872fd5e08fe814f538dbc55e70c378297ef585dcc7bc763223300a6edd42d7671deb9844a010c195e784f30a9d2eea93acf4ca76df6f811e75e40fa1a
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63