Analysis
-
max time kernel
9s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 11:15
Behavioral task
behavioral1
Sample
f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe
Resource
win10v2004-20220901-en
General
-
Target
f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe
-
Size
234KB
-
MD5
6d89acab904ecc3c5bcc43a0f41b82ee
-
SHA1
5194c510450be6531c9cf05dd467af97383f4ba2
-
SHA256
f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf
-
SHA512
8dc854ed9cb78a3c498a358b8ae93fb726c8af99a094e872555561ed3d8739363258884ba1f28b9f9137d0fddb819b28a2a703116424040b9799700a0ef387f9
-
SSDEEP
6144:2xV8dI3bxRETtXaz/OJepymej5viyT5O/q9DUGEyoSj:2n8dI3b7ETtKKepymejF5aeDUGNoSj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1236 SkipeTurns.exe 1300 SkipeTurns.exe 624 SkipeTurns.exe -
resource yara_rule behavioral1/memory/844-57-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/844-59-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/844-60-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/844-67-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/844-65-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/1912-69-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1912-64-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1912-70-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1912-74-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1912-75-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1128-76-0x0000000000400000-0x00000000004DF000-memory.dmp upx behavioral1/memory/844-77-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/files/0x000500000000b2d2-83.dat upx behavioral1/files/0x000500000000b2d2-84.dat upx behavioral1/files/0x000500000000b2d2-85.dat upx behavioral1/files/0x000500000000b2d2-87.dat upx behavioral1/files/0x000500000000b2d2-86.dat upx behavioral1/files/0x000500000000b2d2-89.dat upx behavioral1/files/0x000500000000b2d2-92.dat upx behavioral1/files/0x000500000000b2d2-99.dat upx behavioral1/files/0x000500000000b2d2-109.dat upx behavioral1/memory/1028-112-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral1/memory/1236-124-0x0000000000400000-0x00000000004DF000-memory.dmp upx behavioral1/memory/1300-125-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/1300-126-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/624-127-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/844-132-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/1912-133-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/624-135-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1912 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 1912 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 1912 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 1912 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 1912 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1128 set thread context of 844 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 27 PID 1128 set thread context of 1912 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 28 PID 1236 set thread context of 1300 1236 SkipeTurns.exe 32 PID 1236 set thread context of 624 1236 SkipeTurns.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 576 ipconfig.exe 1480 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 1912 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 1236 SkipeTurns.exe 624 SkipeTurns.exe 1300 SkipeTurns.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1128 wrote to memory of 844 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 27 PID 1128 wrote to memory of 844 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 27 PID 1128 wrote to memory of 844 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 27 PID 1128 wrote to memory of 844 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 27 PID 1128 wrote to memory of 844 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 27 PID 1128 wrote to memory of 844 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 27 PID 1128 wrote to memory of 844 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 27 PID 1128 wrote to memory of 844 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 27 PID 1128 wrote to memory of 1912 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 28 PID 1128 wrote to memory of 1912 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 28 PID 1128 wrote to memory of 1912 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 28 PID 1128 wrote to memory of 1912 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 28 PID 1128 wrote to memory of 1912 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 28 PID 1128 wrote to memory of 1912 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 28 PID 1128 wrote to memory of 1912 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 28 PID 1128 wrote to memory of 1912 1128 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 28 PID 844 wrote to memory of 576 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 29 PID 844 wrote to memory of 576 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 29 PID 844 wrote to memory of 576 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 29 PID 844 wrote to memory of 576 844 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 29 PID 1912 wrote to memory of 1236 1912 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 31 PID 1912 wrote to memory of 1236 1912 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 31 PID 1912 wrote to memory of 1236 1912 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 31 PID 1912 wrote to memory of 1236 1912 f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe 31 PID 1236 wrote to memory of 1300 1236 SkipeTurns.exe 32 PID 1236 wrote to memory of 1300 1236 SkipeTurns.exe 32 PID 1236 wrote to memory of 1300 1236 SkipeTurns.exe 32 PID 1236 wrote to memory of 1300 1236 SkipeTurns.exe 32 PID 1236 wrote to memory of 1300 1236 SkipeTurns.exe 32 PID 1236 wrote to memory of 1300 1236 SkipeTurns.exe 32 PID 1236 wrote to memory of 1300 1236 SkipeTurns.exe 32 PID 1236 wrote to memory of 1300 1236 SkipeTurns.exe 32 PID 1236 wrote to memory of 624 1236 SkipeTurns.exe 33 PID 1236 wrote to memory of 624 1236 SkipeTurns.exe 33 PID 1236 wrote to memory of 624 1236 SkipeTurns.exe 33 PID 1236 wrote to memory of 624 1236 SkipeTurns.exe 33 PID 1236 wrote to memory of 624 1236 SkipeTurns.exe 33 PID 1236 wrote to memory of 624 1236 SkipeTurns.exe 33 PID 1236 wrote to memory of 624 1236 SkipeTurns.exe 33 PID 1236 wrote to memory of 624 1236 SkipeTurns.exe 33 PID 1236 wrote to memory of 1028 1236 SkipeTurns.exe 34 PID 1236 wrote to memory of 1028 1236 SkipeTurns.exe 34 PID 1236 wrote to memory of 1028 1236 SkipeTurns.exe 34 PID 1236 wrote to memory of 1028 1236 SkipeTurns.exe 34 PID 1236 wrote to memory of 1028 1236 SkipeTurns.exe 34 PID 1300 wrote to memory of 1480 1300 SkipeTurns.exe 35 PID 1300 wrote to memory of 1480 1300 SkipeTurns.exe 35 PID 1300 wrote to memory of 1480 1300 SkipeTurns.exe 35 PID 1300 wrote to memory of 1480 1300 SkipeTurns.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe"C:\Users\Admin\AppData\Local\Temp\f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe"C:\Users\Admin\AppData\Local\Temp\f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:576
-
-
-
C:\Users\Admin\AppData\Local\Temp\f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe"C:\Users\Admin\AppData\Local\Temp\f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Roaming\SkipeTurns.exe"C:\Users\Admin\AppData\Roaming\SkipeTurns.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Roaming\SkipeTurns.exe"C:\Users\Admin\AppData\Roaming\SkipeTurns.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew5⤵
- Gathers network information
PID:1480
-
-
-
C:\Users\Admin\AppData\Roaming\SkipeTurns.exe"C:\Users\Admin\AppData\Roaming\SkipeTurns.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:624 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\XLPUB.bat" "5⤵PID:1212
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SkipeTurns" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SkipeTurns.exe" /f6⤵PID:1660
-
-
-
-
C:\Users\Admin\AppData\Roaming\SkipeTurns.exe"C:\Users\Admin\AppData\Roaming\SkipeTurns.exe"4⤵PID:1028
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142B
MD57aab82a958be0bdc325ec075c874ca64
SHA1f4ab3d6776f6ffc569a878a003df9a4f0a331eb6
SHA256446e766a1c4c57cf38c3b70b1152a5c1216cc86388fefe5d7d39522458436144
SHA5121737e41a539341737e4fc5c22f13c10b34e5054b2e1b44e604490c4faaf943442c596581fb28b0c967935cfd92c5fd4e7331fb72ae2d4f6ef1b8acc64b46f240
-
Filesize
234KB
MD542e153780b564f85e1e2e38d9cfc7484
SHA173bd52dcf6573fe147ea9219163f537cc187c0ad
SHA2568a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b
SHA51252a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296
-
Filesize
234KB
MD542e153780b564f85e1e2e38d9cfc7484
SHA173bd52dcf6573fe147ea9219163f537cc187c0ad
SHA2568a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b
SHA51252a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296
-
Filesize
234KB
MD542e153780b564f85e1e2e38d9cfc7484
SHA173bd52dcf6573fe147ea9219163f537cc187c0ad
SHA2568a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b
SHA51252a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296
-
Filesize
234KB
MD542e153780b564f85e1e2e38d9cfc7484
SHA173bd52dcf6573fe147ea9219163f537cc187c0ad
SHA2568a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b
SHA51252a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296
-
Filesize
234KB
MD542e153780b564f85e1e2e38d9cfc7484
SHA173bd52dcf6573fe147ea9219163f537cc187c0ad
SHA2568a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b
SHA51252a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296
-
Filesize
234KB
MD542e153780b564f85e1e2e38d9cfc7484
SHA173bd52dcf6573fe147ea9219163f537cc187c0ad
SHA2568a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b
SHA51252a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296
-
Filesize
234KB
MD542e153780b564f85e1e2e38d9cfc7484
SHA173bd52dcf6573fe147ea9219163f537cc187c0ad
SHA2568a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b
SHA51252a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296
-
Filesize
234KB
MD542e153780b564f85e1e2e38d9cfc7484
SHA173bd52dcf6573fe147ea9219163f537cc187c0ad
SHA2568a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b
SHA51252a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296
-
Filesize
234KB
MD542e153780b564f85e1e2e38d9cfc7484
SHA173bd52dcf6573fe147ea9219163f537cc187c0ad
SHA2568a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b
SHA51252a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296