Analysis
-
max time kernel
152s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 14:37
Static task
static1
Behavioral task
behavioral1
Sample
bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe
Resource
win10v2004-20220812-en
General
-
Target
bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe
-
Size
82KB
-
MD5
e8e6622c0c138aa05e41ab5bde02db58
-
SHA1
196ae20a721f3d30e2bbc2d6e86e15e4c208766d
-
SHA256
bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78
-
SHA512
7cab8712ea685ae0581f531445000fed9688bfd9f7a8aecc92f13e7397292b973685f92d721336ad073ba8b0dcc903473049c9476e439804b256a86cdcc1cdcc
-
SSDEEP
1536:gW2XxJ+1IT+7SDZIvyDEsq0Hcl16bwpLojUoZwRZJNLmTqWRWaS:gW+J+1IT+cqylD8l1ewpcjUZDNmrI
Malware Config
Signatures
-
Gh0st RAT payload 19 IoCs
resource yara_rule behavioral2/files/0x0006000000022e1f-133.dat family_gh0strat behavioral2/files/0x0006000000022e1f-134.dat family_gh0strat behavioral2/memory/4212-135-0x0000000000400000-0x0000000000446000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022e20-136.dat family_gh0strat behavioral2/files/0x0006000000022e20-137.dat family_gh0strat behavioral2/files/0x0006000000022e22-138.dat family_gh0strat behavioral2/files/0x0006000000022e22-139.dat family_gh0strat behavioral2/files/0x0006000000022e23-140.dat family_gh0strat behavioral2/files/0x0006000000022e23-141.dat family_gh0strat behavioral2/files/0x0011000000016741-142.dat family_gh0strat behavioral2/files/0x0011000000016741-143.dat family_gh0strat behavioral2/files/0x000200000001e2c6-144.dat family_gh0strat behavioral2/files/0x000200000001e2c6-145.dat family_gh0strat behavioral2/files/0x0006000000022e27-146.dat family_gh0strat behavioral2/files/0x0006000000022e27-147.dat family_gh0strat behavioral2/files/0x000300000000071d-148.dat family_gh0strat behavioral2/files/0x000300000000071d-149.dat family_gh0strat behavioral2/files/0x000300000000071f-150.dat family_gh0strat behavioral2/files/0x000300000000071f-151.dat family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\nla\Parameters\ServiceDll = "C:\\Windows\\system32\\ntnla.dll" bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\ntntmssvc.dll" bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\srservice\Parameters\ServiceDll = "C:\\Windows\\system32\\ntsrservice.dll" bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\ntirmon.dll" bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ias\Parameters\ServiceDll = "C:\\Windows\\system32\\ntias.dll" bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\nwcworkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\ntnwcworkstation.dll" bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\ntwmi.dll" bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wmdmpmsp\Parameters\ServiceDll = "C:\\Windows\\system32\\ntwmdmpmsp.dll" bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\fastuserswitchingcompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\ntfastuserswitchingcompatibility.dll" bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe -
Loads dropped DLL 9 IoCs
pid Process 1356 svchost.exe 4824 svchost.exe 4364 svchost.exe 4356 svchost.exe 2372 svchost.exe 2668 svchost.exe 3832 svchost.exe 4176 svchost.exe 4228 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 6 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe File opened for modification \??\PhysicalDrive0 svchost.exe File opened for modification \??\PhysicalDrive0 svchost.exe File opened for modification \??\PhysicalDrive0 svchost.exe File opened for modification \??\PhysicalDrive0 svchost.exe File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 30 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntias.dll bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification C:\Windows\SysWOW64\ntntmssvc.dll bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification C:\Windows\SysWOW64\bda338ff.del bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification C:\Windows\SysWOW64\ntwmdmpmsp.dll bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification C:\Windows\SysWOW64\a8c20fb6.del bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification C:\Windows\SysWOW64\ntsrservice.dll bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification C:\Windows\SysWOW64\a4363793.del bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification C:\Windows\SysWOW64\d2f5ca0e.del bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification C:\Windows\SysWOW64\ntnla.dll bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification \??\c:\windows\SysWOW64\d7b7e7a8.key svchost.exe File opened for modification C:\Windows\SysWOW64\4ac26bd1.del bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification \??\c:\windows\SysWOW64\d7b7e7a8.key svchost.exe File opened for modification \??\c:\windows\SysWOW64\d7b7e7a8.key svchost.exe File opened for modification C:\Windows\SysWOW64\ntfastuserswitchingcompatibility.dll bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification C:\Windows\SysWOW64\dad53dd.del bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification \??\c:\windows\SysWOW64\d7b7e7a8.key svchost.exe File opened for modification \??\c:\windows\SysWOW64\bjlog svchost.exe File opened for modification C:\Windows\SysWOW64\35172304.del bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification C:\Windows\SysWOW64\ntwmi.dll bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification \??\c:\windows\SysWOW64\bjlog svchost.exe File opened for modification \??\c:\windows\SysWOW64\bjlog svchost.exe File opened for modification C:\Windows\SysWOW64\9b56e972.del bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification C:\Windows\SysWOW64\4ef54a5d.del bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification \??\c:\windows\SysWOW64\d7b7e7a8.key svchost.exe File opened for modification \??\c:\windows\SysWOW64\bjlog svchost.exe File opened for modification \??\c:\windows\SysWOW64\d7b7e7a8.key svchost.exe File opened for modification C:\Windows\SysWOW64\ntnwcworkstation.dll bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification C:\Windows\SysWOW64\ntirmon.dll bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe File opened for modification \??\c:\windows\SysWOW64\bjlog svchost.exe File opened for modification \??\c:\windows\SysWOW64\bjlog svchost.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4212 bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe 4212 bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeBackupPrivilege 1356 svchost.exe Token: SeSecurityPrivilege 1356 svchost.exe Token: SeSecurityPrivilege 1356 svchost.exe Token: SeBackupPrivilege 1356 svchost.exe Token: SeSecurityPrivilege 1356 svchost.exe Token: SeBackupPrivilege 1356 svchost.exe Token: SeSecurityPrivilege 1356 svchost.exe Token: SeBackupPrivilege 4824 svchost.exe Token: SeSecurityPrivilege 4824 svchost.exe Token: SeSecurityPrivilege 4824 svchost.exe Token: SeBackupPrivilege 4824 svchost.exe Token: SeSecurityPrivilege 4824 svchost.exe Token: SeBackupPrivilege 4824 svchost.exe Token: SeSecurityPrivilege 4824 svchost.exe Token: SeBackupPrivilege 4364 svchost.exe Token: SeSecurityPrivilege 4364 svchost.exe Token: SeSecurityPrivilege 4364 svchost.exe Token: SeBackupPrivilege 4364 svchost.exe Token: SeSecurityPrivilege 4364 svchost.exe Token: SeBackupPrivilege 4364 svchost.exe Token: SeSecurityPrivilege 4364 svchost.exe Token: SeBackupPrivilege 4356 svchost.exe Token: SeSecurityPrivilege 4356 svchost.exe Token: SeSecurityPrivilege 4356 svchost.exe Token: SeBackupPrivilege 4356 svchost.exe Token: SeSecurityPrivilege 4356 svchost.exe Token: SeBackupPrivilege 2372 svchost.exe Token: SeSecurityPrivilege 2372 svchost.exe Token: SeBackupPrivilege 4356 svchost.exe Token: SeSecurityPrivilege 4356 svchost.exe Token: SeSecurityPrivilege 2372 svchost.exe Token: SeBackupPrivilege 2372 svchost.exe Token: SeSecurityPrivilege 2372 svchost.exe Token: SeBackupPrivilege 2372 svchost.exe Token: SeSecurityPrivilege 2372 svchost.exe Token: SeBackupPrivilege 2668 svchost.exe Token: SeSecurityPrivilege 2668 svchost.exe Token: SeSecurityPrivilege 2668 svchost.exe Token: SeBackupPrivilege 2668 svchost.exe Token: SeSecurityPrivilege 2668 svchost.exe Token: SeBackupPrivilege 2668 svchost.exe Token: SeSecurityPrivilege 2668 svchost.exe Token: SeBackupPrivilege 3832 svchost.exe Token: SeSecurityPrivilege 3832 svchost.exe Token: SeSecurityPrivilege 3832 svchost.exe Token: SeBackupPrivilege 3832 svchost.exe Token: SeSecurityPrivilege 3832 svchost.exe Token: SeBackupPrivilege 3832 svchost.exe Token: SeSecurityPrivilege 3832 svchost.exe Token: SeBackupPrivilege 4176 svchost.exe Token: SeSecurityPrivilege 4176 svchost.exe Token: SeSecurityPrivilege 4176 svchost.exe Token: SeBackupPrivilege 4176 svchost.exe Token: SeSecurityPrivilege 4176 svchost.exe Token: SeBackupPrivilege 4176 svchost.exe Token: SeSecurityPrivilege 4176 svchost.exe Token: SeBackupPrivilege 4228 svchost.exe Token: SeSecurityPrivilege 4228 svchost.exe Token: SeSecurityPrivilege 4228 svchost.exe Token: SeBackupPrivilege 4228 svchost.exe Token: SeSecurityPrivilege 4228 svchost.exe Token: SeBackupPrivilege 4228 svchost.exe Token: SeSecurityPrivilege 4228 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe"C:\Users\Admin\AppData\Local\Temp\bdc8610804f8b5da9e999ee2b2623d2cfbf16d1d4e57fee4a0db49b9e4485d78.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s ias1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s irmon1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s nla1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s ntmssvc1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s nwcworkstation1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s srservice1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s wmi1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s wmdmpmsp1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3
-
Filesize
148KB
MD5fd44e3853c37335fd1932be7eb5eda2f
SHA1575a2a15e335331851755c07a2bf9ee82da97c90
SHA256b308b82e9fbe43d50cc6e909292fa8d7f2c48c6156873a4fc3ebc3350b133f1e
SHA512094e39de8a3696e7631bd34603f0f0278b31a0ce06239254dac86421f842959ec16a9b66fd7242db24c9b30ab1b6e8f1cc814eee31f30ec7d2b67a7cce7aa3e3