Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 23:56
Static task
static1
Behavioral task
behavioral1
Sample
a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe
Resource
win7-20220812-en
General
-
Target
a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe
-
Size
187KB
-
MD5
652fe67abc4fc0f30fb5e6ea103aeebe
-
SHA1
9f61655f762ab001915cbbc8a84a324f1eead7dc
-
SHA256
a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab
-
SHA512
3cb8384684ef864cc2ebe5458c994e248e25cb02326cda14980f3ba72f9ecba353a00ac6c1d48d3fc6c8ab184a78017c2ad7b1ca8e702cbb84566d1c7557b186
-
SSDEEP
3072:St1Z9xolp4D4dMz4n4N4t4R4aEIIIIzDMY5pdRvuJOtkedrfNkq35vU:e1Z9xolxMdEIIIIzL5dgOphHU
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" peiori.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe -
Executes dropped EXE 1 IoCs
pid Process 996 peiori.exe -
resource yara_rule behavioral1/memory/968-55-0x00000000026B0000-0x000000000373E000-memory.dmp upx behavioral1/memory/968-57-0x00000000026B0000-0x000000000373E000-memory.dmp upx behavioral1/memory/968-73-0x00000000026B0000-0x000000000373E000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ peiori.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\peiori = "C:\\Users\\Admin\\peiori.exe" peiori.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\M: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\Z: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\I: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\K: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\L: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\N: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\Q: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\E: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\F: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\H: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\U: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\S: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\T: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\V: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\G: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\O: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\P: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\Y: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\R: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\W: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened (read-only) \??\X: a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe 996 peiori.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe Token: SeDebugPrivilege 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 996 peiori.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 968 wrote to memory of 1224 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 16 PID 968 wrote to memory of 1312 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 15 PID 968 wrote to memory of 1380 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 14 PID 968 wrote to memory of 996 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 27 PID 968 wrote to memory of 996 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 27 PID 968 wrote to memory of 996 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 27 PID 968 wrote to memory of 996 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 27 PID 968 wrote to memory of 1224 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 16 PID 968 wrote to memory of 1312 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 15 PID 968 wrote to memory of 1380 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 14 PID 968 wrote to memory of 996 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 27 PID 968 wrote to memory of 996 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 27 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 968 wrote to memory of 1224 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 16 PID 968 wrote to memory of 1312 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 15 PID 968 wrote to memory of 1380 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 14 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 968 wrote to memory of 1224 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 16 PID 968 wrote to memory of 1312 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 15 PID 968 wrote to memory of 1380 968 a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe 14 PID 996 wrote to memory of 968 996 peiori.exe 26 PID 996 wrote to memory of 968 996 peiori.exe 26 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe"C:\Users\Admin\AppData\Local\Temp\a471627cdd65a615ad5180ee861b0d5c231d594d385505d41709b702916165ab.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:968 -
C:\Users\Admin\peiori.exe"C:\Users\Admin\peiori.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:996
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1312
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1224
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
3Hidden Files and Directories
1Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD5b6d2e6a7debfef27062e4c7b54ea771e
SHA1cc0c28940e8dae008a5f8051153b1776386acbd7
SHA2567c2f41322c0ef253477e31298f37479e7ed0d5d81a83f25b162a72ddc680a440
SHA512537195369a9755d4eee7b9442e6e09dd7a7231f23736285ed40dcea094714b44c9ea9150c4e2917055e8f0705d8633412233c38f9537054c3e9547ba12077569
-
Filesize
187KB
MD5b6d2e6a7debfef27062e4c7b54ea771e
SHA1cc0c28940e8dae008a5f8051153b1776386acbd7
SHA2567c2f41322c0ef253477e31298f37479e7ed0d5d81a83f25b162a72ddc680a440
SHA512537195369a9755d4eee7b9442e6e09dd7a7231f23736285ed40dcea094714b44c9ea9150c4e2917055e8f0705d8633412233c38f9537054c3e9547ba12077569
-
Filesize
187KB
MD5b6d2e6a7debfef27062e4c7b54ea771e
SHA1cc0c28940e8dae008a5f8051153b1776386acbd7
SHA2567c2f41322c0ef253477e31298f37479e7ed0d5d81a83f25b162a72ddc680a440
SHA512537195369a9755d4eee7b9442e6e09dd7a7231f23736285ed40dcea094714b44c9ea9150c4e2917055e8f0705d8633412233c38f9537054c3e9547ba12077569
-
Filesize
187KB
MD5b6d2e6a7debfef27062e4c7b54ea771e
SHA1cc0c28940e8dae008a5f8051153b1776386acbd7
SHA2567c2f41322c0ef253477e31298f37479e7ed0d5d81a83f25b162a72ddc680a440
SHA512537195369a9755d4eee7b9442e6e09dd7a7231f23736285ed40dcea094714b44c9ea9150c4e2917055e8f0705d8633412233c38f9537054c3e9547ba12077569