Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 20:40
Behavioral task
behavioral1
Sample
0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe
Resource
win10v2004-20241007-en
General
-
Target
0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe
-
Size
1.2MB
-
MD5
635b87245cb5ab0b4a6bf4bae99cefd0
-
SHA1
dffe11f4febd037201eb7bc182e65d7fc1606236
-
SHA256
0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3c
-
SHA512
d46aea739f50ba28378c6cf201b834bfa336c0260b7fc116c9b97d4b84efb0a968975a393e9843b2f359244d0ff266e485e7fb18f4eb99f7240ec6b4cb065de3
-
SSDEEP
24576:e5xolYQY64nsJ39LyjbJkQFMhmC+6GD9VLMWMa/k9wxa:pYNnsHyjtk2MYC5GDf7Iw4
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Xred family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cn.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 8 IoCs
pid Process 4420 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cn.exe 2580 icsys.icn.exe 4760 explorer.exe 3936 spoolsv.exe 1132 svchost.exe 2884 spoolsv.exe 464 Synaptics.exe 536 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3044 536 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cn.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2588 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2580 icsys.icn.exe 2580 icsys.icn.exe 4760 explorer.exe 4760 explorer.exe 4760 explorer.exe 4760 explorer.exe 4760 explorer.exe 4760 explorer.exe 4760 explorer.exe 4760 explorer.exe 1132 svchost.exe 1132 svchost.exe 1132 svchost.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 1132 svchost.exe 4760 explorer.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 1132 svchost.exe 4760 explorer.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 1132 svchost.exe 4760 explorer.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 1132 svchost.exe 4760 explorer.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 4760 explorer.exe 1132 svchost.exe 1132 svchost.exe 4760 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4760 explorer.exe 1132 svchost.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 1996 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe 1996 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe 2580 icsys.icn.exe 2580 icsys.icn.exe 4760 explorer.exe 4760 explorer.exe 3936 spoolsv.exe 3936 spoolsv.exe 1132 svchost.exe 1132 svchost.exe 2884 spoolsv.exe 2884 spoolsv.exe 4760 explorer.exe 4760 explorer.exe 2588 EXCEL.EXE 2588 EXCEL.EXE 2588 EXCEL.EXE 2588 EXCEL.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1996 wrote to memory of 4420 1996 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe 83 PID 1996 wrote to memory of 4420 1996 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe 83 PID 1996 wrote to memory of 4420 1996 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe 83 PID 1996 wrote to memory of 2580 1996 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe 84 PID 1996 wrote to memory of 2580 1996 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe 84 PID 1996 wrote to memory of 2580 1996 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe 84 PID 2580 wrote to memory of 4760 2580 icsys.icn.exe 85 PID 2580 wrote to memory of 4760 2580 icsys.icn.exe 85 PID 2580 wrote to memory of 4760 2580 icsys.icn.exe 85 PID 4760 wrote to memory of 3936 4760 explorer.exe 86 PID 4760 wrote to memory of 3936 4760 explorer.exe 86 PID 4760 wrote to memory of 3936 4760 explorer.exe 86 PID 3936 wrote to memory of 1132 3936 spoolsv.exe 87 PID 3936 wrote to memory of 1132 3936 spoolsv.exe 87 PID 3936 wrote to memory of 1132 3936 spoolsv.exe 87 PID 1132 wrote to memory of 2884 1132 svchost.exe 88 PID 1132 wrote to memory of 2884 1132 svchost.exe 88 PID 1132 wrote to memory of 2884 1132 svchost.exe 88 PID 1132 wrote to memory of 3964 1132 svchost.exe 89 PID 1132 wrote to memory of 3964 1132 svchost.exe 89 PID 1132 wrote to memory of 3964 1132 svchost.exe 89 PID 4420 wrote to memory of 464 4420 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cn.exe 91 PID 4420 wrote to memory of 464 4420 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cn.exe 91 PID 4420 wrote to memory of 464 4420 0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cn.exe 91 PID 464 wrote to memory of 536 464 Synaptics.exe 92 PID 464 wrote to memory of 536 464 Synaptics.exe 92 PID 464 wrote to memory of 536 464 Synaptics.exe 92 PID 1132 wrote to memory of 1792 1132 svchost.exe 115 PID 1132 wrote to memory of 1792 1132 svchost.exe 115 PID 1132 wrote to memory of 1792 1132 svchost.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe"C:\Users\Admin\AppData\Local\Temp\0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
\??\c:\users\admin\appdata\local\temp\0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cn.exec:\users\admin\appdata\local\temp\0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cn.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 2205⤵
- Program crash
PID:3044
-
-
-
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4760 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe5⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2884
-
-
C:\Windows\SysWOW64\at.exeat 20:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵
- System Location Discovery: System Language Discovery
PID:3964
-
-
C:\Windows\SysWOW64\at.exeat 20:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵
- System Location Discovery: System Language Discovery
PID:1792
-
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 536 -ip 5361⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD595af1aeca693bd2553270882f851d566
SHA1ecfaf37db3ba81298aec2d884284449854d034eb
SHA256e5d72e127690fa86999f1c9c6818264eaabed7624edce401e56777a36a029c7a
SHA5127cba044fe666979cd43c393ec04ef32ec416540a209a8442b845264c0801df260a29c2fcd7e1fc3de93e166e59197f7896ab77abec0595c09c4753bed9a65732
-
C:\Users\Admin\AppData\Local\Temp\0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cn.exe
Filesize973KB
MD5790032dd55b94919099af8b97670ac24
SHA1404d441c2dc47edcaff0e29a24604d19d1ca009e
SHA25627940e2d339bad9c92aa9a65fdf88ee142514758e4b951a8ae8f522069ae370c
SHA512c582db5e9d43aacd60a999db79e931c4e09d200f78ab7ffe2fc704a8ec0ecce745f2c3ae0956c50070b1630e74739aa5f5bec933ab7cb1c815b64ab2208444b3
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
206KB
MD5d6109007ddad132db4d6cbaa6c600cc6
SHA15ae8216d060b5687d1e45284a656471601164bee
SHA2565b4a5172c0d199d6c1c557781ddfdad618f8847d6312c8941e5cb4b502dee76c
SHA512139f4a179025a47787abb9604ce70496ebab2715c527900b05a96dc0d881d6887bea893f9a38a2b7f17a5b364fa0594623390995865a5b34b16f42be80e5cf92
-
Filesize
207KB
MD567155d8c1696fad746c8aa7d063981cf
SHA11dd5be4c44267e65d6b5891e346a77d61e55f460
SHA256e942b75123e362c89ee0f9be1cd7cfaffc118be6a3d8acbb02d233d4dc68b39b
SHA51255f6e01587d5682e24e371aff8ad5c87bf430aca13c86d4c0623d65b3def470bf74633f4028b8410457adec060f927788d3ef973f03bc2e64bdfb864418e9c5f
-
Filesize
207KB
MD553aae9071fefd940c6608c7edc6a56c5
SHA17f21cb6822cb6ded13255893d8da994f4c0aa7c0
SHA256349595b72ec5821648488b98922c80b92a69c9b14c5b46a12c41e41267e44b8f
SHA51268269dd50d7b184a82e959788ce8a100df04aeeda712d826acafb722792ae658632212969f32530702d2fa3348760050008c73a160d8a23917570f5674338ff7
-
Filesize
206KB
MD54a53d09e4de4fb16bfca00c0d30d1ef9
SHA14f6b23e40690ee054ff883923249511ebdc5b68f
SHA25673c7dca72f880e34983d1923611befde8b491aac3fc048451d02c16c94c131f5
SHA512922c84d4136ef2eba19725010d0b57bd6bc08b72bd71ce6c3c4e24ddb2df036128969fe64e7ad27b579dbff00cdabb67936eff2bad8c74783760444fcda295bf
-
Filesize
206KB
MD522cbff3697079649fd2441592ed56532
SHA1ca8be53efaceba8abb6df5b6f3a3a9b64094c4e3
SHA256e3ae43d6a957cc1d01e8e3a50d4846716d7620d22cf2d70e97e418436f3ee1bd
SHA512eec3cdd13361888e9cf6a2ecb6d908eca798d0087973fc26f7362beddcee96dff603b1fd3fef6ee59866c2492c9e95ba40e7f278a2dc353a000c5f2f2dbf753e