Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2023 05:17
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231130-en
General
-
Target
tmp.exe
-
Size
471KB
-
MD5
d04ed77603a9ecd1021a3cc904b77b7d
-
SHA1
1af40b938bf0827bcf4f4dba0259d7a07d5b3afd
-
SHA256
699086fe7458c741e38ee637ce391594ddb34a20f21340edb93c2818841607bc
-
SHA512
658e33e4c09325331f32ce7e84eed4f7e0460e9d1dc2cf4246ee71d083b7f617336ed72e652cfd84f665f21276580611fbd5189a950dcdca5413b001a1bd4c68
-
SSDEEP
12288:c5gKgE7sQfGewA1z0ESCCprv4spFDm9oBq6II:cOjfQfGeHB0EN8vPpFa9oB7II
Malware Config
Extracted
amadey
http://77.91.76.37
-
strings_key
c736fd5bdd26ef77013837dee2004742
-
url_paths
/g8samsA2/index.php
Extracted
amadey
4.13
http://77.91.76.37
-
install_dir
c508585d38
-
install_file
Utsysc.exe
-
strings_key
c736fd5bdd26ef77013837dee2004742
-
url_paths
/g8samsA2/index.php
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 19 4956 rundll32.exe 20 4040 rundll32.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tmp.exeUtsysc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1791582586-1997866593-3795608343-1000\Control Panel\International\Geo\Nation tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-1791582586-1997866593-3795608343-1000\Control Panel\International\Geo\Nation Utsysc.exe -
Executes dropped EXE 4 IoCs
Processes:
Utsysc.exeUtsysc.exeUtsysc.exeUtsysc.exepid process 4164 Utsysc.exe 5000 Utsysc.exe 3680 Utsysc.exe 3244 Utsysc.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 508 rundll32.exe 4956 rundll32.exe 4040 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4404 2092 WerFault.exe tmp.exe 224 2092 WerFault.exe tmp.exe 2452 2092 WerFault.exe tmp.exe 4468 2092 WerFault.exe tmp.exe 1956 2092 WerFault.exe tmp.exe 508 2092 WerFault.exe tmp.exe 1960 2092 WerFault.exe tmp.exe 4296 2092 WerFault.exe tmp.exe 2596 2092 WerFault.exe tmp.exe 3556 2092 WerFault.exe tmp.exe 2880 4164 WerFault.exe Utsysc.exe 4812 4164 WerFault.exe Utsysc.exe 2352 4164 WerFault.exe Utsysc.exe 3872 4164 WerFault.exe Utsysc.exe 2812 4164 WerFault.exe Utsysc.exe 3736 4164 WerFault.exe Utsysc.exe 2736 4164 WerFault.exe Utsysc.exe 2920 4164 WerFault.exe Utsysc.exe 3816 4164 WerFault.exe Utsysc.exe 4480 4164 WerFault.exe Utsysc.exe 2344 4164 WerFault.exe Utsysc.exe 1568 4164 WerFault.exe Utsysc.exe 4684 4164 WerFault.exe Utsysc.exe 3716 4164 WerFault.exe Utsysc.exe 1608 4164 WerFault.exe Utsysc.exe 220 4164 WerFault.exe Utsysc.exe 3920 5000 WerFault.exe Utsysc.exe 1744 4164 WerFault.exe Utsysc.exe 5116 4164 WerFault.exe Utsysc.exe 4204 3680 WerFault.exe Utsysc.exe 1528 3244 WerFault.exe Utsysc.exe 4808 4164 WerFault.exe Utsysc.exe 3140 4164 WerFault.exe Utsysc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
rundll32.exepid process 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
tmp.exepid process 2092 tmp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
tmp.exeUtsysc.exerundll32.exerundll32.exedescription pid process target process PID 2092 wrote to memory of 4164 2092 tmp.exe Utsysc.exe PID 2092 wrote to memory of 4164 2092 tmp.exe Utsysc.exe PID 2092 wrote to memory of 4164 2092 tmp.exe Utsysc.exe PID 4164 wrote to memory of 4500 4164 Utsysc.exe schtasks.exe PID 4164 wrote to memory of 4500 4164 Utsysc.exe schtasks.exe PID 4164 wrote to memory of 4500 4164 Utsysc.exe schtasks.exe PID 4164 wrote to memory of 508 4164 Utsysc.exe rundll32.exe PID 4164 wrote to memory of 508 4164 Utsysc.exe rundll32.exe PID 4164 wrote to memory of 508 4164 Utsysc.exe rundll32.exe PID 508 wrote to memory of 4956 508 rundll32.exe rundll32.exe PID 508 wrote to memory of 4956 508 rundll32.exe rundll32.exe PID 4956 wrote to memory of 4432 4956 rundll32.exe netsh.exe PID 4956 wrote to memory of 4432 4956 rundll32.exe netsh.exe PID 4956 wrote to memory of 3296 4956 rundll32.exe tar.exe PID 4956 wrote to memory of 3296 4956 rundll32.exe tar.exe PID 4164 wrote to memory of 4040 4164 Utsysc.exe rundll32.exe PID 4164 wrote to memory of 4040 4164 Utsysc.exe rundll32.exe PID 4164 wrote to memory of 4040 4164 Utsysc.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 5842⤵
- Program crash
PID:4404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 6642⤵
- Program crash
PID:224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 7442⤵
- Program crash
PID:2452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 8362⤵
- Program crash
PID:4468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 8562⤵
- Program crash
PID:1956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 8922⤵
- Program crash
PID:508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 11122⤵
- Program crash
PID:1960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 11122⤵
- Program crash
PID:4296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 12162⤵
- Program crash
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 6043⤵
- Program crash
PID:2880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 9163⤵
- Program crash
PID:4812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 9803⤵
- Program crash
PID:2352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 9243⤵
- Program crash
PID:3872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 9243⤵
- Program crash
PID:2812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 10283⤵
- Program crash
PID:3736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 10163⤵
- Program crash
PID:2736 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:4500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 9043⤵
- Program crash
PID:2920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 6643⤵
- Program crash
PID:3816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 12003⤵
- Program crash
PID:4480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 12403⤵
- Program crash
PID:2344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 12603⤵
- Program crash
PID:1568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 12963⤵
- Program crash
PID:4684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 13123⤵
- Program crash
PID:3716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 13803⤵
- Program crash
PID:1608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 14043⤵
- Program crash
PID:220 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\90f693c571f58a\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\90f693c571f58a\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:4432
-
C:\Windows\system32\tar.exetar.exe -cf "C:\Users\Admin\AppData\Local\Temp\791582586199_Desktop.tar" "C:\Users\Admin\AppData\Local\Temp\_Files_\*.*"5⤵PID:3296
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\90f693c571f58a\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 12643⤵
- Program crash
PID:1744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 10523⤵
- Program crash
PID:5116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 13123⤵
- Program crash
PID:4808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 13883⤵
- Program crash
PID:3140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 7402⤵
- Program crash
PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2092 -ip 20921⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2092 -ip 20921⤵PID:3968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2092 -ip 20921⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2092 -ip 20921⤵PID:2300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2092 -ip 20921⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2092 -ip 20921⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2092 -ip 20921⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2092 -ip 20921⤵PID:4288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2092 -ip 20921⤵PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2092 -ip 20921⤵PID:2940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4164 -ip 41641⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4164 -ip 41641⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4164 -ip 41641⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4164 -ip 41641⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4164 -ip 41641⤵PID:3664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4164 -ip 41641⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4164 -ip 41641⤵PID:1832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4164 -ip 41641⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4164 -ip 41641⤵PID:3532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4164 -ip 41641⤵PID:2980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4164 -ip 41641⤵PID:2708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4164 -ip 41641⤵PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4164 -ip 41641⤵PID:3700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4164 -ip 41641⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4164 -ip 41641⤵PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4164 -ip 41641⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exe1⤵
- Executes dropped EXE
PID:5000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 4282⤵
- Program crash
PID:3920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5000 -ip 50001⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4164 -ip 41641⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4164 -ip 41641⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exe1⤵
- Executes dropped EXE
PID:3680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 4282⤵
- Program crash
PID:4204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3680 -ip 36801⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exe1⤵
- Executes dropped EXE
PID:3244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 4282⤵
- Program crash
PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3244 -ip 32441⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4164 -ip 41641⤵PID:2452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4164 -ip 41641⤵PID:3612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5e4f423d01e6d29facb4278f75d12ee41
SHA1271d0535db20376b27d7fdc604dfa13a07711731
SHA25621358f10fbbc8aa81510ea35dd41a43831d7a1516bd6177320f84e6b8920b548
SHA512c8bc9fd6e7fc7bc7715984eeb422a837ff12ba2fc73f453d66ed69a8bb4bf18ba53e55b808dafd4c461426c12b67236c176d5a685782dcda6a8a1311c335c491
-
Filesize
1024B
MD50f343b0931126a20f133d67c2b018a3b
SHA160cacbf3d72e1e7834203da608037b1bf83b40e8
SHA2565f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef
SHA5128efb4f73c5655351c444eb109230c556d39e2c7624e9c11abc9e3fb4b9b9254218cc5085b454a9698d085cfa92198491f07a723be4574adc70617b73eb0b6461
-
Filesize
471KB
MD5d04ed77603a9ecd1021a3cc904b77b7d
SHA11af40b938bf0827bcf4f4dba0259d7a07d5b3afd
SHA256699086fe7458c741e38ee637ce391594ddb34a20f21340edb93c2818841607bc
SHA512658e33e4c09325331f32ce7e84eed4f7e0460e9d1dc2cf4246ee71d083b7f617336ed72e652cfd84f665f21276580611fbd5189a950dcdca5413b001a1bd4c68
-
Filesize
471KB
MD5d04ed77603a9ecd1021a3cc904b77b7d
SHA11af40b938bf0827bcf4f4dba0259d7a07d5b3afd
SHA256699086fe7458c741e38ee637ce391594ddb34a20f21340edb93c2818841607bc
SHA512658e33e4c09325331f32ce7e84eed4f7e0460e9d1dc2cf4246ee71d083b7f617336ed72e652cfd84f665f21276580611fbd5189a950dcdca5413b001a1bd4c68
-
Filesize
471KB
MD5d04ed77603a9ecd1021a3cc904b77b7d
SHA11af40b938bf0827bcf4f4dba0259d7a07d5b3afd
SHA256699086fe7458c741e38ee637ce391594ddb34a20f21340edb93c2818841607bc
SHA512658e33e4c09325331f32ce7e84eed4f7e0460e9d1dc2cf4246ee71d083b7f617336ed72e652cfd84f665f21276580611fbd5189a950dcdca5413b001a1bd4c68
-
Filesize
471KB
MD5d04ed77603a9ecd1021a3cc904b77b7d
SHA11af40b938bf0827bcf4f4dba0259d7a07d5b3afd
SHA256699086fe7458c741e38ee637ce391594ddb34a20f21340edb93c2818841607bc
SHA512658e33e4c09325331f32ce7e84eed4f7e0460e9d1dc2cf4246ee71d083b7f617336ed72e652cfd84f665f21276580611fbd5189a950dcdca5413b001a1bd4c68
-
Filesize
471KB
MD5d04ed77603a9ecd1021a3cc904b77b7d
SHA11af40b938bf0827bcf4f4dba0259d7a07d5b3afd
SHA256699086fe7458c741e38ee637ce391594ddb34a20f21340edb93c2818841607bc
SHA512658e33e4c09325331f32ce7e84eed4f7e0460e9d1dc2cf4246ee71d083b7f617336ed72e652cfd84f665f21276580611fbd5189a950dcdca5413b001a1bd4c68
-
Filesize
471KB
MD5d04ed77603a9ecd1021a3cc904b77b7d
SHA11af40b938bf0827bcf4f4dba0259d7a07d5b3afd
SHA256699086fe7458c741e38ee637ce391594ddb34a20f21340edb93c2818841607bc
SHA512658e33e4c09325331f32ce7e84eed4f7e0460e9d1dc2cf4246ee71d083b7f617336ed72e652cfd84f665f21276580611fbd5189a950dcdca5413b001a1bd4c68
-
Filesize
102KB
MD53727880831612b8461cf81cc4e05d2a3
SHA1cba779d2e241202cb36bc1cc508d281dde503a27
SHA2564660227f0b71547871b4f33ff2b92b55b2563138c257f0c361270587b2a420ef
SHA5128d7959c13672d5c17535aaa5056e35d515cd918d0196e61c842bd10a1664b4abc9a71977494b14f813bd6d912828d41eb01d8ca021f0666ddadec0072d6930f6
-
Filesize
102KB
MD53727880831612b8461cf81cc4e05d2a3
SHA1cba779d2e241202cb36bc1cc508d281dde503a27
SHA2564660227f0b71547871b4f33ff2b92b55b2563138c257f0c361270587b2a420ef
SHA5128d7959c13672d5c17535aaa5056e35d515cd918d0196e61c842bd10a1664b4abc9a71977494b14f813bd6d912828d41eb01d8ca021f0666ddadec0072d6930f6
-
Filesize
102KB
MD53727880831612b8461cf81cc4e05d2a3
SHA1cba779d2e241202cb36bc1cc508d281dde503a27
SHA2564660227f0b71547871b4f33ff2b92b55b2563138c257f0c361270587b2a420ef
SHA5128d7959c13672d5c17535aaa5056e35d515cd918d0196e61c842bd10a1664b4abc9a71977494b14f813bd6d912828d41eb01d8ca021f0666ddadec0072d6930f6
-
Filesize
1.2MB
MD5a17a5ab2d131cd9eefcece4f1d22e531
SHA1e418791abf05d490df0c009b8f7d79c2eea2d147
SHA256fd607c65470433fd57bad5fa9b30a46bbfc5dfd918f56327e243646c9548681e
SHA5129bf1ecaf6d711e4ce727da70a21b6e8b69fa86ed89c20e8c36907e7c8e01de821d06f77e40017f843bd0d4343ac7d258327543a7cd2639f8db47bb51016ee9fc
-
Filesize
1.2MB
MD5a17a5ab2d131cd9eefcece4f1d22e531
SHA1e418791abf05d490df0c009b8f7d79c2eea2d147
SHA256fd607c65470433fd57bad5fa9b30a46bbfc5dfd918f56327e243646c9548681e
SHA5129bf1ecaf6d711e4ce727da70a21b6e8b69fa86ed89c20e8c36907e7c8e01de821d06f77e40017f843bd0d4343ac7d258327543a7cd2639f8db47bb51016ee9fc
-
Filesize
1.2MB
MD5a17a5ab2d131cd9eefcece4f1d22e531
SHA1e418791abf05d490df0c009b8f7d79c2eea2d147
SHA256fd607c65470433fd57bad5fa9b30a46bbfc5dfd918f56327e243646c9548681e
SHA5129bf1ecaf6d711e4ce727da70a21b6e8b69fa86ed89c20e8c36907e7c8e01de821d06f77e40017f843bd0d4343ac7d258327543a7cd2639f8db47bb51016ee9fc
-
Filesize
1.2MB
MD5a17a5ab2d131cd9eefcece4f1d22e531
SHA1e418791abf05d490df0c009b8f7d79c2eea2d147
SHA256fd607c65470433fd57bad5fa9b30a46bbfc5dfd918f56327e243646c9548681e
SHA5129bf1ecaf6d711e4ce727da70a21b6e8b69fa86ed89c20e8c36907e7c8e01de821d06f77e40017f843bd0d4343ac7d258327543a7cd2639f8db47bb51016ee9fc