Analysis
-
max time kernel
148s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
04-04-2022 03:43
Static task
static1
Behavioral task
behavioral1
Sample
s.exe
Resource
win7-20220331-en
General
-
Target
s.exe
-
Size
273KB
-
MD5
d9a7e822d38ef4624cb6c6d6c058bc30
-
SHA1
3f48b9031f653d55eb5c53a8c99346b0d4f1bd52
-
SHA256
adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929
-
SHA512
3084f7c27a5b453b8def1c7e8fd0f68ddcc408e57207635192451b92d0885e9ef3fafbb6c20491359a4da8cb06b35b446c11d70fa1fe0185d92d963eed5e9c5f
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Extracted
amadey
3.08
179.43.154.147/d2VxjasuwS/index.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
lchi.exeakge.exeftewk.exeftewk.exeftewk.exeftewk.exepid process 1252 lchi.exe 2012 akge.exe 1620 ftewk.exe 1544 ftewk.exe 1328 ftewk.exe 1472 ftewk.exe -
Loads dropped DLL 17 IoCs
Processes:
akge.exeftewk.exeWerFault.exeWerFault.exepid process 2012 akge.exe 2012 akge.exe 1620 ftewk.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1620 ftewk.exe 1620 ftewk.exe 1956 WerFault.exe 1956 WerFault.exe 1956 WerFault.exe 1956 WerFault.exe 1956 WerFault.exe 1956 WerFault.exe -
Drops file in System32 directory 4 IoCs
Processes:
ftewk.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\iRbaic053GE8[1].exe ftewk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat ftewk.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\share[1].exe ftewk.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\provisionshare2[1].exe ftewk.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ftewk.exedescription pid process target process PID 1620 set thread context of 1544 1620 ftewk.exe ftewk.exe PID 1620 set thread context of 1328 1620 ftewk.exe ftewk.exe PID 1620 set thread context of 1472 1620 ftewk.exe ftewk.exe -
Drops file in Windows directory 3 IoCs
Processes:
s.exelchi.exedescription ioc process File opened for modification C:\Windows\Tasks\lchi.job s.exe File created C:\Windows\Tasks\fgmftmjlicxbwqfxtvs.job lchi.exe File created C:\Windows\Tasks\lchi.job s.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1676 1544 WerFault.exe ftewk.exe 1956 1472 WerFault.exe ftewk.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 33 IoCs
Processes:
ftewk.exereg.exeakge.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ftewk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F48AE29-374B-42A3-B642-BABF6462AE88} ftewk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F48AE29-374B-42A3-B642-BABF6462AE88}\WpadDecision = "0" ftewk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-b8-88-fa-b6-63 ftewk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F48AE29-374B-42A3-B642-BABF6462AE88}\fe-b8-88-fa-b6-63 ftewk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders reg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" ftewk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ftewk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-b8-88-fa-b6-63\WpadDecision = "0" ftewk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F48AE29-374B-42A3-B642-BABF6462AE88}\WpadNetworkName = "Network 3" ftewk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F48AE29-374B-42A3-B642-BABF6462AE88}\WpadDecisionReason = "1" ftewk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F48AE29-374B-42A3-B642-BABF6462AE88}\WpadDecisionTime = e0e47250fb47d801 ftewk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" akge.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings ftewk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix ftewk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-b8-88-fa-b6-63\WpadDetectedUrl ftewk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-b8-88-fa-b6-63\WpadDecisionTime = e0e47250fb47d801 ftewk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-b8-88-fa-b6-63\WpadDecisionReason = "1" ftewk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" akge.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" ftewk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad ftewk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ftewk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ftewk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections ftewk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" ftewk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F48AE29-374B-42A3-B642-BABF6462AE88}\WpadDecisionTime = 8052a54cfb47d801 ftewk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-b8-88-fa-b6-63\WpadDecisionTime = 8052a54cfb47d801 ftewk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ftewk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" ftewk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" ftewk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Startup = "C:\\Windows\\TEMP\\9d5cca72fb\\" reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ akge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings ftewk.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
s.exepid process 772 s.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
taskeng.exeakge.exeftewk.execmd.exeftewk.exeftewk.exedescription pid process target process PID 956 wrote to memory of 1252 956 taskeng.exe lchi.exe PID 956 wrote to memory of 1252 956 taskeng.exe lchi.exe PID 956 wrote to memory of 1252 956 taskeng.exe lchi.exe PID 956 wrote to memory of 1252 956 taskeng.exe lchi.exe PID 956 wrote to memory of 2012 956 taskeng.exe akge.exe PID 956 wrote to memory of 2012 956 taskeng.exe akge.exe PID 956 wrote to memory of 2012 956 taskeng.exe akge.exe PID 956 wrote to memory of 2012 956 taskeng.exe akge.exe PID 2012 wrote to memory of 1620 2012 akge.exe ftewk.exe PID 2012 wrote to memory of 1620 2012 akge.exe ftewk.exe PID 2012 wrote to memory of 1620 2012 akge.exe ftewk.exe PID 2012 wrote to memory of 1620 2012 akge.exe ftewk.exe PID 1620 wrote to memory of 1984 1620 ftewk.exe cmd.exe PID 1620 wrote to memory of 1984 1620 ftewk.exe cmd.exe PID 1620 wrote to memory of 1984 1620 ftewk.exe cmd.exe PID 1620 wrote to memory of 1984 1620 ftewk.exe cmd.exe PID 1620 wrote to memory of 340 1620 ftewk.exe schtasks.exe PID 1620 wrote to memory of 340 1620 ftewk.exe schtasks.exe PID 1620 wrote to memory of 340 1620 ftewk.exe schtasks.exe PID 1620 wrote to memory of 340 1620 ftewk.exe schtasks.exe PID 1984 wrote to memory of 1784 1984 cmd.exe reg.exe PID 1984 wrote to memory of 1784 1984 cmd.exe reg.exe PID 1984 wrote to memory of 1784 1984 cmd.exe reg.exe PID 1984 wrote to memory of 1784 1984 cmd.exe reg.exe PID 1620 wrote to memory of 1544 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1544 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1544 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1544 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1544 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1544 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1544 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1544 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1544 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1544 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1544 1620 ftewk.exe ftewk.exe PID 1544 wrote to memory of 1676 1544 ftewk.exe WerFault.exe PID 1544 wrote to memory of 1676 1544 ftewk.exe WerFault.exe PID 1544 wrote to memory of 1676 1544 ftewk.exe WerFault.exe PID 1544 wrote to memory of 1676 1544 ftewk.exe WerFault.exe PID 1620 wrote to memory of 1328 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1328 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1328 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1328 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1328 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1328 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1328 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1328 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1328 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1472 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1472 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1472 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1472 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1472 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1472 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1472 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1472 1620 ftewk.exe ftewk.exe PID 1620 wrote to memory of 1472 1620 ftewk.exe ftewk.exe PID 1472 wrote to memory of 1956 1472 ftewk.exe WerFault.exe PID 1472 wrote to memory of 1956 1472 ftewk.exe WerFault.exe PID 1472 wrote to memory of 1956 1472 ftewk.exe WerFault.exe PID 1472 wrote to memory of 1956 1472 ftewk.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\s.exe"C:\Users\Admin\AppData\Local\Temp\s.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:772
-
C:\Windows\system32\taskeng.exetaskeng.exe {6B791916-CA18-41FB-8BB1-852C2D3C299E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\ProgramData\pxdbcx\lchi.exeC:\ProgramData\pxdbcx\lchi.exe start2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1252
-
-
C:\Windows\TEMP\akge.exeC:\Windows\TEMP\akge.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\TEMP\9d5cca72fb\ftewk.exe"C:\Windows\TEMP\9d5cca72fb\ftewk.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Windows\TEMP\9d5cca72fb\4⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Windows\TEMP\9d5cca72fb\5⤵
- Modifies data under HKEY_USERS
PID:1784
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ftewk.exe /TR "C:\Windows\TEMP\9d5cca72fb\ftewk.exe" /F4⤵
- Creates scheduled task(s)
PID:340
-
-
C:\Windows\TEMP\9d5cca72fb\ftewk.exe"C:\Windows\TEMP\9d5cca72fb\ftewk.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 1005⤵
- Loads dropped DLL
- Program crash
PID:1676
-
-
-
C:\Windows\TEMP\9d5cca72fb\ftewk.exe"C:\Windows\TEMP\9d5cca72fb\ftewk.exe"4⤵
- Executes dropped EXE
PID:1328
-
-
C:\Windows\TEMP\9d5cca72fb\ftewk.exe"C:\Windows\TEMP\9d5cca72fb\ftewk.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 1205⤵
- Loads dropped DLL
- Program crash
PID:1956
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
273KB
MD5d9a7e822d38ef4624cb6c6d6c058bc30
SHA13f48b9031f653d55eb5c53a8c99346b0d4f1bd52
SHA256adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929
SHA5123084f7c27a5b453b8def1c7e8fd0f68ddcc408e57207635192451b92d0885e9ef3fafbb6c20491359a4da8cb06b35b446c11d70fa1fe0185d92d963eed5e9c5f
-
Filesize
273KB
MD5d9a7e822d38ef4624cb6c6d6c058bc30
SHA13f48b9031f653d55eb5c53a8c99346b0d4f1bd52
SHA256adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929
SHA5123084f7c27a5b453b8def1c7e8fd0f68ddcc408e57207635192451b92d0885e9ef3fafbb6c20491359a4da8cb06b35b446c11d70fa1fe0185d92d963eed5e9c5f
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31
-
Filesize
383KB
MD556d9df4afbbaee34afb646e85fb4419d
SHA10ad215a57d93b70fa3a137060f5f5a3369d4f542
SHA25687995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c
SHA5121178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31