Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
67fd9590f6f751765cf3f2a12c5ff93c568efafd27f97dd7dd457c0364ca8bb3.exe
Resource
win7-20240221-en
General
-
Target
67fd9590f6f751765cf3f2a12c5ff93c568efafd27f97dd7dd457c0364ca8bb3.exe
-
Size
1.5MB
-
MD5
4a337d1924bd9d9315f0a9198d340463
-
SHA1
98a93ad0f02784a6346de8e1a186e3ac9a3e6560
-
SHA256
67fd9590f6f751765cf3f2a12c5ff93c568efafd27f97dd7dd457c0364ca8bb3
-
SHA512
0d5c6e13c787805deec271c56231250630cbd93ba3706e6165d96121bf30c416340ac6b5a2a9a1fdd2686e8d4fe8abc048e3a05842cc2f510315326c1c019c81
-
SSDEEP
12288:w2TTduSZpUdxB30GHrVxGnXQSaWt+DNISOgv3isiyWcIi:9TTduSZpUR0GHrVQ1aW4mSOgv3isi
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
pid Process 4980 alg.exe 4268 DiagnosticsHub.StandardCollector.Service.exe 2716 fxssvc.exe 1004 elevation_service.exe 5028 elevation_service.exe 2156 maintenanceservice.exe 2964 OSE.EXE 2904 msdtc.exe 988 PerceptionSimulationService.exe 1876 perfhost.exe 1120 locator.exe 5016 SensorDataService.exe 1764 snmptrap.exe 2296 spectrum.exe 716 ssh-agent.exe 4236 TieringEngineService.exe 216 AgentService.exe 3032 vds.exe 2876 vssvc.exe 3816 wbengine.exe 4200 WmiApSrv.exe 4724 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 30 IoCs
description ioc Process File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\System32\vds.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\System32\msdtc.exe elevation_service.exe File opened for modification C:\Windows\system32\SearchIndexer.exe elevation_service.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 67fd9590f6f751765cf3f2a12c5ff93c568efafd27f97dd7dd457c0364ca8bb3.exe File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe 67fd9590f6f751765cf3f2a12c5ff93c568efafd27f97dd7dd457c0364ca8bb3.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\b122c36bb3e2edcd.bin DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\System32\SensorDataService.exe elevation_service.exe File opened for modification C:\Windows\System32\alg.exe 67fd9590f6f751765cf3f2a12c5ff93c568efafd27f97dd7dd457c0364ca8bb3.exe File opened for modification C:\Windows\system32\dllhost.exe 67fd9590f6f751765cf3f2a12c5ff93c568efafd27f97dd7dd457c0364ca8bb3.exe File opened for modification C:\Windows\system32\fxssvc.exe 67fd9590f6f751765cf3f2a12c5ff93c568efafd27f97dd7dd457c0364ca8bb3.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe elevation_service.exe File opened for modification C:\Windows\System32\snmptrap.exe elevation_service.exe File opened for modification C:\Windows\system32\spectrum.exe elevation_service.exe File opened for modification C:\Windows\SysWow64\perfhost.exe elevation_service.exe File opened for modification C:\Windows\system32\locator.exe elevation_service.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe elevation_service.exe File opened for modification C:\Windows\system32\TieringEngineService.exe elevation_service.exe File opened for modification C:\Windows\system32\AgentService.exe elevation_service.exe File opened for modification C:\Windows\system32\vssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\wbengine.exe elevation_service.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe elevation_service.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe elevation_service.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe elevation_service.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 67fd9590f6f751765cf3f2a12c5ff93c568efafd27f97dd7dd457c0364ca8bb3.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4268 DiagnosticsHub.StandardCollector.Service.exe 4268 DiagnosticsHub.StandardCollector.Service.exe 4268 DiagnosticsHub.StandardCollector.Service.exe 4268 DiagnosticsHub.StandardCollector.Service.exe 4268 DiagnosticsHub.StandardCollector.Service.exe 4268 DiagnosticsHub.StandardCollector.Service.exe 4268 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 680 Process not Found 680 Process not Found -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1848 67fd9590f6f751765cf3f2a12c5ff93c568efafd27f97dd7dd457c0364ca8bb3.exe Token: SeAuditPrivilege 2716 fxssvc.exe Token: SeDebugPrivilege 4268 DiagnosticsHub.StandardCollector.Service.exe Token: SeTakeOwnershipPrivilege 1004 elevation_service.exe Token: SeRestorePrivilege 4236 TieringEngineService.exe Token: SeManageVolumePrivilege 4236 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 216 AgentService.exe Token: SeBackupPrivilege 2876 vssvc.exe Token: SeRestorePrivilege 2876 vssvc.exe Token: SeAuditPrivilege 2876 vssvc.exe Token: SeBackupPrivilege 3816 wbengine.exe Token: SeRestorePrivilege 3816 wbengine.exe Token: SeSecurityPrivilege 3816 wbengine.exe Token: 33 4724 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4724 SearchIndexer.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\67fd9590f6f751765cf3f2a12c5ff93c568efafd27f97dd7dd457c0364ca8bb3.exe"C:\Users\Admin\AppData\Local\Temp\67fd9590f6f751765cf3f2a12c5ff93c568efafd27f97dd7dd457c0364ca8bb3.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:4980
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4212
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"1⤵
- Executes dropped EXE
PID:5028
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2156
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2268 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:380
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2904
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:988
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:1876
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:1120
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:5016
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:1764
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2296
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:716
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:1484
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:3032
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:4200
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4724 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵PID:4852
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 7842⤵PID:1548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5a207f848639b59c374784bd6803bd6c6
SHA1e66117139c1065335335857a5515cbb04c10f720
SHA256bbb897fb1f073d8abf5eda30b9be7f1a1c0abab553b06adb99afafdf16ca4daf
SHA512b0343efbbee109d594b8aa33c317226525d02ee305316acaf194099bb26afe430f2c19f43f7f805268999cf710adcde2a91522e4c80487c65e58a7c34d9027c3
-
Filesize
1.6MB
MD55ef322145a6529f0deb3c58575c89d09
SHA1102d2969c511a708ab3d24eeedec8f8dfc8061ab
SHA256c933e7213313afb557ce47d1e3b528ae1da0790360f6fda4af9e6b6d5f022ca9
SHA5127afaed8b61f058ed1402162d335cd4ef71ce426d391a3226f77b9a7dd1414088b45a2e28c0b030b4f87d47e89e1a11bf6a4033cb45138072871352e176a35c30
-
Filesize
2.0MB
MD533d9e4291e9232018fee820b95edcf2d
SHA13c13ee17450c50eafa1a22c9c4a2a03611570014
SHA25606971d62deb52b4f1899a5dcbff888a5dbe339dc6580272176d161016f2b8748
SHA5124e35db4c8c226d4e6ee7ac8bf4b6c9f519ae09a8f892768a73522917d80efbee96dd05d5371cf268e119340b7395c2bd3a2640b7886053dc82ee2ce126cb442f
-
Filesize
1.5MB
MD529541477ba983557dffd78e769befdd2
SHA1caf4d0d39e51e2c1c87664e48430acca32ccf940
SHA256f12e451d0113c440a4aeb1201784469a4573398a7b290f11b289ea685308afb3
SHA512ebe2d0a2c542321d2254991acb77c50a176459d0fae50d21e731e89e6149ff83bf9a6530092bea2186be6f5e926f5da9fa1420176bdcad32c0349bdae8a96c00
-
Filesize
1.2MB
MD5240ea69f82407d2560e83a94b2da5bbd
SHA1c88c43cbe21e838703f8063ccf21298208bcdd7f
SHA25692df617885ff8c29f1c4e63ab88042aac6e4c8ce1d55741786ccac51d85f0c70
SHA512cee3c29e7920480a3a2bbc5fe39e7c152b616b2d6c7b80c59e4cfd91f12e42d55e8c6f6b3e7be9600e58add14e454271c6aec545230f31ed80967fd339997b82
-
Filesize
1.4MB
MD594e7b40103818de4f9ac87cab5ce2ac1
SHA14c0f9ce56d898eb2bdf7cc8d0cb2a59ec2b2c954
SHA2565314ac9a91ae2a2d2d59a692e1868674754407f55c01df0b419f0cb3d4e8850e
SHA512db1361270577210e0c670f187d12c1fcbefb61dca06e8213402a5011a9bff7e2d04b6a98d18f116af0a9f855df381c1f6661779f878862ee20453f4f36984a67
-
Filesize
1.7MB
MD5fda2acd296cf89a027e6592cf5c7b5ad
SHA1152e5f90d506658385609d0829e5e32f2b4ba83f
SHA2567c051e7bc27d6995c4c9e99b66d6318a38198fd8c04177f544c9df1aaa31b4cb
SHA512ad34d64d7d80bd5d4aff8703e9c42a20c317db69982cf5f2cbf049e05c9820694af5f5059158de1a111588d6a8770151e767f9b6575f25fc1269f8aa25373ab3
-
Filesize
4.6MB
MD568b9538e61a722a2c593318095571a42
SHA1cd9156e7bda524fda744d197a59fafc1773b55a0
SHA256f547b58855f996c42dacde1afe29e9668e81bef1222834ea56207f957571e4c0
SHA51208e51de57cffc87d5d6260cd7b2669ecc2ea279bb0604f4983212c48f1f01721616b84d026f850edcd282fd909768e8571d766c4d63c09c9de7a8f354fd494e1
-
Filesize
1.8MB
MD5d694482dd1dfbd141ab6816228820ad0
SHA1c9c5ecd7ccac51013b70034ffdc314b580a52d5c
SHA256ab4ee221afaa5117bf633dc8b657c95b1a1c5f1f600a7eaa6ba9aabf33a0e8a8
SHA5127d362ab8cc04bab22e072d225767fa3d6fcf67bdfd7cb2fbf51229d0afbba455709e418d94f0de1eec15c17cbf9f3b2334e6a660e7757f960ab51ef4fd4372df
-
Filesize
24.0MB
MD5f3dac07519c2bbf2b59f606bd7f0682f
SHA10d30b6a3db3d936cff920ae4dc960e3e8799ecc2
SHA2569e4455a301c40890ab48353e89b229ec6ceb8e671378734f101f392d9e1c1475
SHA5123c1501040bbba25f2bb7eef2f111da101ee8a31592b441044e03dc4c4f4ca200a303bf4421dd70d437a8ea31230797ea6fbafdb9831fb98556b7f1af48d2ed83
-
Filesize
2.7MB
MD527f93cfe9c140905e9405523816825b3
SHA1ab72e089c00819e09460acd62072a6894b59cec4
SHA256df6fd80478868773c7bd3d03c8ddb5f6d9d868a650195d5fa8d4fbb93efa220e
SHA5123c5d32304a279b0a880193df443a88f073f41651d792698228d6f1e5456db0461e2bbc06ac72067dbc3be6f729bb94d09d76ab246d8a841bbc59d203382a8ff0
-
Filesize
1.1MB
MD55e91c631d15414c3a30e32faff89fb57
SHA18b3d89cfe4bb49c8167c2dfca2fbf57825ec63ff
SHA25662d68a743961a0675c33bd2aed544c060e6be42a9079d78242b6fdaf65645f99
SHA51218af1b8cd2ee52976620f2059e4c93737445e32007053aa0a98149d08ff887c1b59ab8a6dee164a0f812f929a0abc9977425e476cd7c32f9195f30e5e3116ca7
-
Filesize
1.7MB
MD51e8572629dd6bbfdf1b82c30e3d79fe2
SHA1c1ec87d8f388b25611a9922f9164d7d6db803643
SHA25693d77bfb1b4b21c3cccbdf102e08e81f08018101c00118e77d9550dc503ef795
SHA5120d7ab5c25464a14a9786e1de399dcdbcc963a4ee16645f526791bbd1d4f93283652e4b3d064badcdee02026a6298b88db6915016bab4f2e1c5e2876bef014f8f
-
Filesize
1.5MB
MD56fc6bde1d2549de1a1c2e49afa118db3
SHA1a1c4a5125c2fb0142f1a2c3c0ce94e7a3103731e
SHA256d03d54d93978938caaf6c2ec47ac37f41eb6073e8f1181e23d0b2d40536c50c9
SHA5122347e23c5b1ac377f0d8f3ad4c655fbc03dc9ffa52c9e9288d4aa041b6fc74719c2a6eebf7d04e07c024903eb44b6d35e571d55197182c6a26b8e882b8118abb
-
Filesize
4.8MB
MD5aeff89ed3dfe9c035543e010d07e4a11
SHA1cd154e2a2e90e417897b2f0f22c19fdf3b16aed2
SHA256c836701c3591432aa338ba1b99ed1c05259dec06613bed08db01d3b31c49f615
SHA512c888e8b7d1bf20bb55a20f57fd87bbb32dd5db1c0957a0061dbf7e34d1c95a34e59aa65727acea88d874b991292160cf9f1496c35652618adb684a3ecde59f37
-
Filesize
4.8MB
MD564609288e8ebea9bbf11b3adaa71790d
SHA179a06fdf8a41dbb0f65b8a821149d7f0e324a9b2
SHA2561dfedbc9c128d089fa07621dc2c27b4839860550fc176273b2a5102b022bb988
SHA512fecd03d623303d8d503c73ff15267b771202443412a76a624ff38846d02c9827e2fb7e33984b857432b4eec1d70dd82b67ff008ade1627fb75db6c1279c27178
-
Filesize
2.2MB
MD5510ea2f8a8d806df0382fb8e75784dc5
SHA15526e70a6d94dd5948f1c947226b9397b67501f0
SHA2563385f49b7b8b702a0ba216d101418ffc59b3c745bdac41dcd17c44a8fb82f20f
SHA512dc2eb5fb9218417066bd17602bfa8c9b794db8c2c414f7a60b8c15da79d20192d7448e81795a3ece494583562abca49b5f3791adec13899fca1e13462ba70c2f
-
Filesize
2.1MB
MD52bba47c794ef94216852d33d78c779df
SHA1e2be94f0a1127ab5ca02d42dc6f813c60caa570b
SHA256fbaea882d76f50e522dff4e5077553b602f8755ffb86f850677d3db1b3fc1ff0
SHA512deb100b07b3138eb67a2722c8ab00d47616c1927e0e4b50aae49d68e9bf8be5827a91d3a22edda22f7540aaacbd5613b9bc9745dedb6a6f7d3e85c898c0a437a
-
Filesize
1.8MB
MD507f50dc865a35fafb91036fea632629d
SHA1dd0eb9299d90aeb3efc83a19fafaa61345c80e4a
SHA256c4eb4475b0a32a16b3fe943e53760a9ff4fabc59e52382c927bd88e63bc70020
SHA51253540fb05d2c751ec70b32145f2ccbd7da419992cb7d1051b4b513cde8e5bedfb649f1cffa6ff59e2b7c99522bfa3442fc5dfeadc58b5747346d7d781822edbd
-
Filesize
1.5MB
MD5f255b61b2330915d79135c3051adaaf9
SHA13be12b3b44eea2c38ed7d979c6b93d3f465e2948
SHA2560c1846205e89ec26d5fbdd716aa56c11c61032349c0a8552fcb8ad6ad8bd3cfb
SHA5125a6ab14c8555b2d42b5724ed3f9fff10835bdc78df69293ef4312a318d5c620c8562ce4fe310135e0baf4e087defb4f8430e2a1062782542b9aaae646ca70a84
-
Filesize
1.4MB
MD5ecd6885f8b9c9157391fad092b33b4c2
SHA117adf5c27e293140dcbff0bea059c307f99dcc84
SHA2560fc95c1c4480b009e2b61102b1496037213c18758226b009c18909edcc53dc43
SHA51235a3c69fbafdecc53c263aa14eb87ce75ce2c351c7cc389dec38f809f5b4c6dc16f10b34d9e4891228493982c2b64c9592a42788a920a8678885e86459f1cab2
-
Filesize
1.4MB
MD50fb0c8d20dfeee5027810d0b4bb3cd04
SHA153f9a08b24f2031250ee5ca3e6f7b51a4ecd502c
SHA256740258a654b307f570687b73e7c6c9b98bfb7ddf19d1bd97c68efe8d1971c7e6
SHA51237962f4663ab540877bddbb537d15a94d2766d7a3422c4406067dc59ced4eb7d10d6d0a08cc15ae489de62668a91f884b901c8d4ce528ea6800cf06c7d7083ac
-
Filesize
1.4MB
MD5b4a9f092af4b1712f4b33a86cb8521dc
SHA16029cb7b885a66a0384d802c63ff2d4b6221ca6c
SHA2569b313115edb7a7775e30ca97918c5f6678c041bf24ce467201ee9fd253f2e622
SHA51299cecd6caff11a6a1c43084b5d53db3e854d9ee271d8ba18c5d6632f145c11344ea89ee12b0487bc3f27f991cfafc3c785a0799017df23e717c1b9b171154ce7
-
Filesize
1.5MB
MD554400604af571bac4743de2737685d88
SHA1e5acc46dd5e63755f8c84072f5d9ebf559ccd6cb
SHA2563c06a29f1d3843bcdd4018d706f17da3d981d9f51ced2b955ce509ec778a924f
SHA512b1d3932ac17b9ceb4cff33916999c3b80f554c42a6eec3188bbcb4d8b088bf1ded2d60d2ef7d431436d94a819f019e10f87a5b91684f33e6e656522fa0d91289
-
Filesize
1.4MB
MD5380bdd351dd6f0f32ac15dcb10a92e18
SHA19696f8570769db658bbd3f103d1b38d0d5b4a800
SHA2566b90f13caf03ded2ce3832a8972bc61881a0e0bee48e15116211c07bf62d107d
SHA51220e4ce51765ef2ce8bf9fe33c7ff19f1b5bcb8e74bfdc764f8c582cc94f198ebf64b369c2b013008fe4683c0264dc57b317a2b000339975949ec365917075597
-
Filesize
1.4MB
MD5a964502f51d2c08f3a6c16450abd579b
SHA179fdd294e2f81ff40a469c284343fb6ba46e67fa
SHA25618ff3ea9d6589b6a1ecf2715da981dad3f43a71af7a8da8345d3b4487a87635e
SHA512d433557c2c33aea65917225bdd876a9598961d93e7d3d4b8f5837e4c5e7e2980a1b3d872c0796dca1418aaf09b856e7832dc23dc801517dfb5ca587dcb53eb76
-
Filesize
1.4MB
MD52a7c0ab62a364d463f5edde599319b59
SHA1f6ccc28d87afffc6673e5de6f821fdd7096f40b6
SHA25605e02fbc0574ea4405d9161c991f81c364858eed2089190fd2518e05ae87eaf9
SHA5123b333eea0f0f5dd651f46342feb380533b3d1021515c7e57b56afc05483f070312dec513419584416025a2a2032778bdb13fb6b025944ea3c2ddefa21897b2a5
-
Filesize
1.7MB
MD501d01e0b43cdd9b33bca5e9561508ce1
SHA185a4ac933e6974609cc042df86b4dc8205aa1744
SHA256117cfa3c4c8ed8f840e53f2f0294542b23716c670e0391fd96a5438975612d05
SHA512aacab782b6b90949ed9e090259c7631b94d976b8740d2c053bea1c276922c5c0dffe8860412457a19f06326a5f5a7e34d516fcb6f400eeeca31018dd758c0d21
-
Filesize
1.4MB
MD5da1fb26d0934241f24932afd702730f9
SHA15e6a48c0088c6e5e7c2311401b95a198860f09ea
SHA25630163bbe8cc9e3e6b9df132f963d3753079235cf489058379e2344ffdb1a5440
SHA512046fe33b87532776a4ee8a9fc100cf2538f06ba8621fb862bb1b9326892711ef182ce3428db6bc639f512f2792efee3136b9a174a809b7116f253685a612954c
-
Filesize
1.4MB
MD5a3e804d118b352991602ca630eed6dec
SHA17260c73acffdab381a4e55e18fabb9bf8953974e
SHA256d8380a6f75af615ebf9919e484a753fddc5839237e7e10609d6825057219c51c
SHA512efc898f8de383e5c4f5f11435d7464886139a62b47e4e6767050a65df972c5b4f66f2ff7e0a647126f2356b3a7c8bc813fb4c090d8326da942b85124715f61ae
-
Filesize
1.6MB
MD53d013735eba380d50d953f20d6b9a3ef
SHA1ae736849e5ecb0301ba3f49cf72eece0262423c0
SHA256bef81e741df9c128a2831d405e2a24452428cb5e9af255985548a7ebb9b28a9b
SHA5128fa2c4f97e1558293ddcfe4e227c3055699e7d54671a870d8d4de13f7d4cfccaaa2471ba84bc92b375b09cc040c10ea307c241c2c0dcb8b0cb8823a61cd5966b
-
Filesize
1.4MB
MD5a4e048657a27e80f0bb9c74bb958a5ef
SHA1cf19881d94c76088ed37edf3b7e9c95d738fadd3
SHA25679042d8a808d351b936542f3ee24fdd3dc88fbc09b528467030c35b04f290a16
SHA512d9e001bb46e130654c505e8eb65cec2d5c8e1b59917ee88541433dff71bde78e4e78619b799292d6dc6a893bce06b7ad2adee1b1377293d40abbe657ca4f70ec
-
Filesize
1.4MB
MD5b6e46e17f910b4da0c05de7af1de67df
SHA1ec4846a14554308b84e2101ee36b3f3e82f3a7de
SHA25628045eb1000ea55c93909e077af02d97be401c92796ea2354c90601053f4d1e5
SHA5128410d65aeb1b0c0471dadde28557a185128af4c2a23c5ba0980e56ad561b98216c169e9212f122e464c4725c024419bb8aee32f08f2fe9d6c62f3f46d7724eb7
-
Filesize
1.6MB
MD5aa2990ab27e7b29f4394b0f9eb0fade9
SHA1c1de8432e5ed9a56ad80f18794382c81a1afc457
SHA2567cc568d87b226f3d00c506d6e02e85f4e2ff26b52338e003111e36e37a922b7c
SHA512b69b698d56bd38fad830b846a9aa0b31975c1e8bd3b653baae5d049bf1ab0d5cefff08ded17317f5da9bb52488add263008394384d6de2d8d3a2fa3c5b31eb5a
-
Filesize
1.7MB
MD5fa37f6587c109e098ede27ebb8a960ee
SHA19dd2deebf1ceca00d79aac6a7a44ed85533c60fc
SHA2562473935d3e20fb3c84eee28d189f0b6879db5d522851c4c163f6023d15aa810f
SHA512e723343607fe8b574110624905541468846b5c869d1893ca21b34c85ee4e0e4fed2346b52af15eb73228bf2a94eb7a94624e1f7a61d3d23c370b889fc874b1fd
-
Filesize
1.9MB
MD5a1965a75443ac8a1e5e36702fb2cab5a
SHA126a77c84d7fa854a8c733fc6ede4a0480bc2b3b6
SHA256f48ea99bc1df3d944b320987a3878bef2da33bc3bd3b9b5403d8d9acbe0c77cd
SHA512f63908d6359ceda1201df4eeb29efbf6e223c217d4fb1444804a05990f4801a4fdcd97ba12ff43702df35c88e27c5123faeeab106c70cbce2fae1bb958c8ff15
-
Filesize
1.4MB
MD5e46fbfb3a4a7115c993e72727fe34604
SHA165a04690d7b38636a25d50d197f9f1bd68955a7e
SHA256579df66a896c19d330fb64bd9c57916a879f5861ac37e9f7ac3ad58e40c7dae6
SHA51298b496bc55eb70f2045962c82f5299d6ca058124574159c50cdf1bd176dc1f162e7dbbebaf7c5ef922feb85c5a1e6759a6e20fee059d15c0a95efa3c82750a4b
-
Filesize
1.4MB
MD5b0c5c1602150f767f7992ed145804b6b
SHA15cb12bff8c32fabd73a8ef08445747e65cc9e261
SHA256491d84701451ffb9e6f061ef8e6cd4158cb498ac3e2e8d7e34b5d1ce484bbf31
SHA512f361066a1864eec73b3fc2fcae317bfd97851b190407cb05c5e028da88613c7239c6b9e7a239fe32b5b75c6e6955f02829603ee4c835f841d75c79c96b1f1336
-
Filesize
1.4MB
MD5900790226253cad9b937b4f7c2002b47
SHA13992b57c180653d79d74c3c31df801595c354d1d
SHA256c08ff16aae5174b8e3e0e78f2800765cec423aa4eae7ee67c9ed36f54a286a75
SHA512a0a7e7bffee4b50ad01f1035d1040c1a97937b86b4ad4ea592df88a820da51c5447e40db0c837af6922e339e28e7e904616ed9491e24f7119385e20affd03535
-
Filesize
1.4MB
MD5de387fe5729f0d5eb7b8888bcbe870c5
SHA110c93da139c3368d4b92f5b5a6fe8f7f67917d03
SHA256166c681d85c26487d8fac381b825f3c2d49d6c65c266351a9ba4f97c2c791e01
SHA512d135814020bae5b772f432fbb684ad2bfcb3940b3c270824fee6c05fb96ec798b2d214f0862ba900aff6248b21348a840f8174025e14bfa9f44aed2234f1ce8e
-
Filesize
1.6MB
MD57a72070a4eefd9b0efc2dd8d27f731e8
SHA107b3f739ec710721b24cdc7b0bbafb29b34de1e1
SHA256825a55434fb056a9251f858818007050f39913cce7ac330123e68296be39aed5
SHA512127f56c1432e6c154dd4f91130519ef927aa8d8b69b8a0d5449fb747bbfe45fb9ca0d2266088962301e837a00c102b5f4b1829a40ff63ecbab37dc787bb6dff6
-
Filesize
1.4MB
MD55ec18e1f44aba7611b63f875d66dfd85
SHA1c92305d2e456914956732aded21724170e357ed5
SHA256a06d7388f00230a3760222be98023648ecc4fddff3be5901208f68e4c45ac4dd
SHA512537f6af2fa35ed2c579ee9ca9f27ddef5ebdee83d8ed1a1dc5d78e1f52249b8e1a04992feff45d553d46cf57440a7cb6326294ef4602fb5c3c60d479b5d55e29
-
Filesize
1.7MB
MD53beec153ea16c5a4b7328c6a5e0ee9d6
SHA1f8c9674a4d0edc4f35f80b3a405620828bed4bdb
SHA256a17195bfcffc4ae408d81b32d0cc373a9d4cf251a2e82de1681e13606a6c7170
SHA512ae1ea23a8b5eef8b11867eaa983cabc90a2150b860daf14cde6e80011ecc4a8c006139d9f80d1c229b63347b96290b24da0b39c6c34048169e80a210c9bf9494
-
Filesize
1.5MB
MD5da1f6092eab7583dc4e6af5a268a4ef6
SHA18fea3c7daa0035ed2c8309c76f089e1953b8f83c
SHA256a5e0963617006b8c25bdde205bdad9abd9e8bf99bb60ea3ae52a1eed2ae34a91
SHA5123fae32ce51f0d2b98a4cbe0ca6b3a9a53021d01cfb8d4dc9b0f66012943ee15b8abd9f538c39227d29ddef5abd9a48b35408e981a6240d2ffd6e0a7546abcbe0
-
Filesize
1.2MB
MD5a137f4d40a582c6c47976a951aa84874
SHA1d9bc81c9d20efb1dd2a9518782c390a59eeb383d
SHA256f8a4e56ff2bb74d52ece83b3855c35457ebfccf7f6583428724ed062b36615b8
SHA512e87f4b160edf3fd70ba641720061235f09140ba5222a3bf4f40cd308af1cd8a433980d153960f239a0b46db12c4f2573dc0f7c69a0f1c753f0343d3178f579b4
-
Filesize
1.4MB
MD5e1cd69c8f34cbd3da20ed3579b09e84b
SHA1ef47b07b19e074a39a9d8eaf54d831b7a454f7d6
SHA2560de8b8b9b3560441166f923273e8c97afdfb0be4df37c123605a8d2272800a22
SHA51255c443f1173e0b919b9f06a2c1c14db04494ca29b023734df411df6097a733f5377168e36e9f2e50c41ca5a36faf7da576ffb648f0941aa3c5edfe60024ec746
-
Filesize
1.8MB
MD553719927de0948ddc1a6cf198806d3f6
SHA10c5cec29d1d46096cb46648404603aa2eb2fca43
SHA256ef19dad4979c1833e6611ea1003e73d629ada9b4d6c1d78c33e7ba9a101957ac
SHA51257c942d99246ea843d6eeabe8320392dc51427136f731975b6c91afefc5bcaeb03d08229de211598336c5f19afb6f97a2a26269272473f1eacd46ca14840690e
-
Filesize
1.5MB
MD58a35fde436804f64ae0e50a65bc9a7e9
SHA1d9b6cfe78223926d788b8721c29b1152fd2bf533
SHA2567db3a1556e12a7db30c5da1bb5c4f057fedb6e2a1d6dc1ea8627963dc4090d4f
SHA51208eed1206d6ca57b05d555d1e51fc7a387753e512828460889809d89960d83155fe3ddb9c8739d3173a4c414dcf9b8da58027ae7574ecba11522685f50ba28c0
-
Filesize
1.4MB
MD52e6c922c6d6077f956dd6c7cfbf296c8
SHA16806b67f8d936b10dea2f98908d47102d6f5c137
SHA2563de8cd1565521d2299949cdaa9e7874f13e68addce647780bcf071e6cc5f3506
SHA512ca1152bcf1912265b8568bf168372c316c888f5fd867fce2fce5a269b7a4a0564c17995a54a82511c3f06394ac5f95ae33a374358b628ea9f377d05cf90d3aca
-
Filesize
1.8MB
MD5c04a420ab74e4ef5e6f78df60c7618c9
SHA1dbf2e25bf6879f3835c70420c02298eca5d7f33a
SHA256b67fa2d51b3833ec28edf04f36b6329b1ef55b7ef40a9d7442613014c2ca223c
SHA51259363b4bc56625cea859be3565851a31f536c63110ed47fd9d4e2393578f2796effca9ce1e33fdabc8756afaeeef57f96170cd4fe1d27d48cf529db4c634b553
-
Filesize
1.4MB
MD5ad519430e768d18d88da12e451dddbc1
SHA1a2122ddfea4e6f859313b7a0bcebc490a4c76116
SHA2568c646ba275704e75de23178a9501e369af79828a4c36769520be94531ddd0dc2
SHA512ccfa3f1d9cb9fe686b0dd3b91af1c0c76e491791987b599d9f2be5200a33c0e564c1869bc3c469523e32a41d1a84e6b3386f06c30c214846d7568a31404c2bec
-
Filesize
1.7MB
MD52a922374ff28870b609b06a2cafa28c3
SHA1bcdb5474b3f0e58ce59e33055e9078eb4479ec67
SHA25683a7ae68a01ada1408f9935e32b42dd0022a7b63d5a844fca23a2b52f1552b08
SHA512dee586f7721f1e2b48b77b0695ac6d15a010c6b6e22ba0177b2a00eb18f0d2ae114bef9d20d66f457a3df230d180689c7d6e0d713debd7507adac21e3bd6d577
-
Filesize
2.0MB
MD53b5e3cc44610416efb71424a2afaf50d
SHA14efad40fc44b2eb982df80f0b0774dfb2911158b
SHA256d3a629a320a2deed8f9f05d7a542d006befc48a04d248d90977e1c0d9315d37d
SHA51246388b91ca64191a111a78e29f66ed68c031ad6fb455fb1f21805a8da686c1bc488fb7de8a656cebbe8b87b09111879b7d8e111807145b1f6153396dd6b0104e
-
Filesize
1.5MB
MD57fb639068950c2a03488dc4984bc2b4f
SHA12f365d7727c16258abc9434c247beec53ee054f3
SHA25666a7fb761d164e6c332904a87574e093dc813f6f79999b9585d7f9f10a36990a
SHA512c2352ec708423b65a59ec1d6fd10360f986d49553c7731faabc433854f03e5d46bc632eefc97c086355bfec32dd78e857773c9b192c827860c445da0011755fb
-
Filesize
1.6MB
MD54cb0600b239c738a3b26040c0031d44a
SHA1cbf64b1ea9fd6444d47969f387c4b5defcb5ef22
SHA2561c152f3154300e62b36df115f02d06c2b53cdfaeb970b6fcc9317c75cd927f8b
SHA51268ce994cf18646bedb2efa3067febe956644cde45f57336b9ae479a85ea1c377654d053b2e921c2e87498058a9c10937cf449f4339b0ccc2a4cd899ca1c1ba71
-
Filesize
1.4MB
MD59f476a24e48016c72a7e449647a4bf15
SHA14493f1f14e8b4c72c1029a47f74ca8763b2a0a42
SHA2562b9a000a6c79cdde3e031778c88df2b820d0e0afc837444c57d03788f5de0e36
SHA512840b63c7aeb611fdc499a6e86c4eaef2bdbe9ff4b7f2e734cd4121d2094227f9c908a4e021b2479d285d802dc1cbe18a2b33a14d980e29bd7e2cbc14015446bb
-
Filesize
1.3MB
MD5f5ff2234b5db2f4acea8540d397aef14
SHA1ec4239df7f674349f8a7802a5041aafe40b25cd1
SHA2562d4978dfeb1a27f3ae558b0ae8eab0cff00c7a588253196245bd0c8b694bbfae
SHA5126b4867bdf275984a8c3b364f726754fed14acf55018ceef0d594b1cebf4630b2a438eb0a1097fe70f89c048aa5d7ea1fd3c6fc34855776195a71e89a835d4ea4
-
Filesize
1.6MB
MD522b56995c1be94e91f46f4b74ba41a7e
SHA1901b88bba64cd8c2d5a71ff5365e48730ee09dcf
SHA2563fb6a773be576e970721a0ea322fe3c0ce7fe3db929e182b4e3f32a1e977a6ef
SHA512244b8f3345bc0ce1464989033d509f84f915dbd92f50ea3c1933028aa7319de0c7238a6532fce09dac5722a32f0b2e8f15599f8157dddbc7421f5e9c9e8b046a
-
Filesize
2.1MB
MD53e14c21909ef98112792d50f66ded421
SHA1f1d74e0fc2a31ca350d22dfd6d5559a02b66ce08
SHA2564639cc5412a36408ba843501789e37fe5b2bc3f1255569913779d70880b5d825
SHA512271ce5b7c96851c5d9075b16f93fd6122b71d7d8bd9cb62c4facf7c6a5e05141d5b5a85c9a187ca8791709fec3fe186f75744fc098a0820d34050ae0f728bf22
-
Filesize
1.3MB
MD56efe776a6d973afd7df0d74b5ad0ad87
SHA1a9c01d36f9084bdd5ef81f59f6d76189f2f8aa78
SHA256a10f751962e0388fcffff7d1b1d26312558a8b5868499aa63b790dc182bd6454
SHA5122441a36a191614139981aa87fc8d3c0f0cbb4c8666bf983ab503874247f9070ed35345fb0723a9a576acb078048fa28efc7fe4d50a88fd1387ef2586b3ae954d
-
Filesize
5.6MB
MD58c95d10fbe65b91e1698bc5c66b4a93d
SHA1150a2c7c381ec5859285346ffd0e0088ce882af6
SHA2569fa4399aa60c45dcf431bc8c55f0ee2779290c8578b361c0117cd145eb725982
SHA512601e53ce1e2b8336d1e888848f063f2a6af25e727115fde5795019203cb3cf84e7fbb46855ec6ed5f2477119a886fe78af5d08c2d4cd2af2d11ff3a07990f54a