Resubmissions
12/10/2022, 10:16
221012-ma2qradcdp 812/10/2022, 10:12
221012-l8gykadcb6 812/10/2022, 10:07
221012-l5wybadccq 812/10/2022, 09:38
221012-ll9easdbfr 8Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 10:07
Behavioral task
behavioral1
Sample
3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe
Resource
win10v2004-20220812-en
General
-
Target
3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe
-
Size
1.1MB
-
MD5
56ac9e72644a8dae8c1968d63a26e58a
-
SHA1
d0349d04f33400541898426438d9e036d21decc5
-
SHA256
3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c
-
SHA512
d4f5c176b3e4fda2a318fde3ec3702d9bf102bd752ee42b4549b9fd6630fdcbee20de63fc7a403f60768ac7c0a7d780bc542c8d60f4e2b9eeb19a40aba49ddc1
-
SSDEEP
24576:mq5TfcdHj4fmbi2q+0MmV0VMXeyrtoT1GokHTQoCwsC+Y:mUTsamOx9RoBVoCwT
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2012 dmr_72.exe 2436 dmr_72.exe 1168 dmr_72.exe -
resource yara_rule behavioral1/memory/1632-62-0x0000000000850000-0x0000000000AC6000-memory.dmp upx behavioral1/memory/1632-67-0x0000000000850000-0x0000000000AC6000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1632 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1632 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1632 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1632 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1632-62-0x0000000000850000-0x0000000000AC6000-memory.dmp autoit_exe behavioral1/memory/1632-67-0x0000000000850000-0x0000000000AC6000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file\shell\edit\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file\shell\open\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.dat rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.dat\ = "dat_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file\shell\edit rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file\shell\open rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2312 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1952 chrome.exe 1944 chrome.exe 1944 chrome.exe 3056 chrome.exe 1944 chrome.exe 1944 chrome.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2012 dmr_72.exe Token: 33 1560 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1560 AUDIODG.EXE Token: 33 1560 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1560 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 1632 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1632 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1632 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe -
Suspicious use of SendNotifyMessage 35 IoCs
pid Process 1632 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1632 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1632 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2012 dmr_72.exe 2012 dmr_72.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2012 1632 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 28 PID 1632 wrote to memory of 2012 1632 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 28 PID 1632 wrote to memory of 2012 1632 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 28 PID 1632 wrote to memory of 2012 1632 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 28 PID 1944 wrote to memory of 824 1944 chrome.exe 30 PID 1944 wrote to memory of 824 1944 chrome.exe 30 PID 1944 wrote to memory of 824 1944 chrome.exe 30 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 596 1944 chrome.exe 31 PID 1944 wrote to memory of 1952 1944 chrome.exe 32 PID 1944 wrote to memory of 1952 1944 chrome.exe 32 PID 1944 wrote to memory of 1952 1944 chrome.exe 32 PID 1944 wrote to memory of 624 1944 chrome.exe 33 PID 1944 wrote to memory of 624 1944 chrome.exe 33 PID 1944 wrote to memory of 624 1944 chrome.exe 33 PID 1944 wrote to memory of 624 1944 chrome.exe 33 PID 1944 wrote to memory of 624 1944 chrome.exe 33 PID 1944 wrote to memory of 624 1944 chrome.exe 33 PID 1944 wrote to memory of 624 1944 chrome.exe 33 PID 1944 wrote to memory of 624 1944 chrome.exe 33 PID 1944 wrote to memory of 624 1944 chrome.exe 33 PID 1944 wrote to memory of 624 1944 chrome.exe 33 PID 1944 wrote to memory of 624 1944 chrome.exe 33 PID 1944 wrote to memory of 624 1944 chrome.exe 33 PID 1944 wrote to memory of 624 1944 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe"C:\Users\Admin\AppData\Local\Temp\3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe"C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe" -install -72189998 -chipde -e37278fe332e42d1af33e4480ad52248 - -BLUB2 -dddmsvwgesydbcun -16322⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef72a4f50,0x7fef72a4f60,0x7fef72a4f702⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1112,16447724733919543337,14249065102888926690,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1136 /prefetch:22⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1112,16447724733919543337,14249065102888926690,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1292 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1112,16447724733919543337,14249065102888926690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1756 /prefetch:82⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,16447724733919543337,14249065102888926690,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2004 /prefetch:12⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,16447724733919543337,14249065102888926690,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2024 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,16447724733919543337,14249065102888926690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1112,16447724733919543337,14249065102888926690,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3220 /prefetch:22⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,16447724733919543337,14249065102888926690,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,16447724733919543337,14249065102888926690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3500 /prefetch:82⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,16447724733919543337,14249065102888926690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3620 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,16447724733919543337,14249065102888926690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=540 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1112,16447724733919543337,14249065102888926690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3060 /prefetch:82⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1112,16447724733919543337,14249065102888926690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1124
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5201⤵
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\SetupExe(20220901134306790).log1⤵PID:3000
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\DMR\dddmsvwgesydbcun.dat1⤵
- Modifies registry class
PID:596 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\DMR\dddmsvwgesydbcun.dat2⤵
- Opens file in notepad (likely ransom note)
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe"C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe"1⤵
- Executes dropped EXE
PID:2436
-
C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe"C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe"1⤵
- Executes dropped EXE
PID:1168
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163B
MD58c934b48a05955c6cc934925f4c01e7d
SHA1b6300c8e23a440e85637a6e8f028ff25bee676d6
SHA25651be55dd44a7d2c782ef432971878a64040aec99c5ec0b53ac92d72bb2645992
SHA512199896d1482d91a24d896452b1a81b4c717a2781b0261aa7b32bd5fc38cdf84bf000d9487efa6bd799ae5b9b04019f5dd64bb174f5eec285d76aa9d8f3d1aa69
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf