Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
190s -
max time network
236s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2022, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7.exe
Resource
win10v2004-20220812-en
General
-
Target
dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7.exe
-
Size
159KB
-
MD5
4407da91f9af0f128648fa32fa9da745
-
SHA1
2ccac9b88748731000f0d06938f4e70500a8dd9e
-
SHA256
dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
-
SHA512
94c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
SSDEEP
3072:znamTa+1zwLv6j2zPPgcUVJ0LskrwT9cUO:znpTa+1zMeuQVT9cUO
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\userinit.exe" userinit.exe -
Executes dropped EXE 38 IoCs
pid Process 4360 userinit.exe 2040 system.exe 1756 system.exe 1656 system.exe 2808 system.exe 1472 system.exe 3576 system.exe 3704 system.exe 4384 system.exe 4888 system.exe 4504 system.exe 3400 system.exe 4424 system.exe 3620 system.exe 996 system.exe 2528 system.exe 4460 system.exe 2664 system.exe 2088 system.exe 3324 system.exe 4436 system.exe 2752 system.exe 1020 system.exe 3976 system.exe 2796 system.exe 4060 system.exe 2308 system.exe 536 system.exe 4304 system.exe 2636 system.exe 1268 system.exe 260 system.exe 1708 system.exe 3264 system.exe 3628 system.exe 3692 system.exe 3484 system.exe 1988 system.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.exe userinit.exe File opened for modification C:\Windows\SysWOW64\system.exe userinit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\kdcoms.dll userinit.exe File created C:\Windows\userinit.exe dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7.exe File opened for modification C:\Windows\userinit.exe dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5096 dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7.exe 5096 dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7.exe 4360 userinit.exe 4360 userinit.exe 4360 userinit.exe 4360 userinit.exe 2040 system.exe 2040 system.exe 4360 userinit.exe 4360 userinit.exe 1756 system.exe 1756 system.exe 4360 userinit.exe 4360 userinit.exe 1656 system.exe 1656 system.exe 4360 userinit.exe 4360 userinit.exe 2808 system.exe 2808 system.exe 4360 userinit.exe 4360 userinit.exe 1472 system.exe 1472 system.exe 4360 userinit.exe 4360 userinit.exe 4360 userinit.exe 4360 userinit.exe 3576 system.exe 3576 system.exe 3704 system.exe 3704 system.exe 4360 userinit.exe 4360 userinit.exe 4384 system.exe 4384 system.exe 4360 userinit.exe 4360 userinit.exe 4360 userinit.exe 4360 userinit.exe 4504 system.exe 4888 system.exe 4888 system.exe 4504 system.exe 4360 userinit.exe 4360 userinit.exe 3400 system.exe 3400 system.exe 4360 userinit.exe 4360 userinit.exe 4424 system.exe 4424 system.exe 4360 userinit.exe 4360 userinit.exe 3620 system.exe 3620 system.exe 4360 userinit.exe 4360 userinit.exe 4360 userinit.exe 4360 userinit.exe 2528 system.exe 996 system.exe 2528 system.exe 996 system.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4360 userinit.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 5096 dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7.exe 5096 dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7.exe 4360 userinit.exe 4360 userinit.exe 2040 system.exe 2040 system.exe 1756 system.exe 1756 system.exe 1656 system.exe 1656 system.exe 2808 system.exe 2808 system.exe 1472 system.exe 1472 system.exe 3576 system.exe 3704 system.exe 3576 system.exe 3704 system.exe 4384 system.exe 4384 system.exe 4888 system.exe 4504 system.exe 4504 system.exe 4888 system.exe 3400 system.exe 3400 system.exe 4424 system.exe 4424 system.exe 3620 system.exe 3620 system.exe 996 system.exe 2528 system.exe 996 system.exe 2528 system.exe 4460 system.exe 2664 system.exe 4460 system.exe 2664 system.exe 2088 system.exe 2088 system.exe 3324 system.exe 3324 system.exe 4436 system.exe 4436 system.exe 2752 system.exe 2752 system.exe 1020 system.exe 1020 system.exe 3976 system.exe 3976 system.exe 2796 system.exe 2796 system.exe 4060 system.exe 4060 system.exe 2308 system.exe 2308 system.exe 536 system.exe 536 system.exe 4304 system.exe 4304 system.exe 2636 system.exe 2636 system.exe 1268 system.exe 1268 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5096 wrote to memory of 4360 5096 dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7.exe 81 PID 5096 wrote to memory of 4360 5096 dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7.exe 81 PID 5096 wrote to memory of 4360 5096 dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7.exe 81 PID 4360 wrote to memory of 2040 4360 userinit.exe 82 PID 4360 wrote to memory of 2040 4360 userinit.exe 82 PID 4360 wrote to memory of 2040 4360 userinit.exe 82 PID 4360 wrote to memory of 1756 4360 userinit.exe 83 PID 4360 wrote to memory of 1756 4360 userinit.exe 83 PID 4360 wrote to memory of 1756 4360 userinit.exe 83 PID 4360 wrote to memory of 1656 4360 userinit.exe 84 PID 4360 wrote to memory of 1656 4360 userinit.exe 84 PID 4360 wrote to memory of 1656 4360 userinit.exe 84 PID 4360 wrote to memory of 2808 4360 userinit.exe 85 PID 4360 wrote to memory of 2808 4360 userinit.exe 85 PID 4360 wrote to memory of 2808 4360 userinit.exe 85 PID 4360 wrote to memory of 1472 4360 userinit.exe 86 PID 4360 wrote to memory of 1472 4360 userinit.exe 86 PID 4360 wrote to memory of 1472 4360 userinit.exe 86 PID 4360 wrote to memory of 3576 4360 userinit.exe 87 PID 4360 wrote to memory of 3576 4360 userinit.exe 87 PID 4360 wrote to memory of 3576 4360 userinit.exe 87 PID 4360 wrote to memory of 3704 4360 userinit.exe 88 PID 4360 wrote to memory of 3704 4360 userinit.exe 88 PID 4360 wrote to memory of 3704 4360 userinit.exe 88 PID 4360 wrote to memory of 4384 4360 userinit.exe 89 PID 4360 wrote to memory of 4384 4360 userinit.exe 89 PID 4360 wrote to memory of 4384 4360 userinit.exe 89 PID 4360 wrote to memory of 4888 4360 userinit.exe 90 PID 4360 wrote to memory of 4888 4360 userinit.exe 90 PID 4360 wrote to memory of 4888 4360 userinit.exe 90 PID 4360 wrote to memory of 4504 4360 userinit.exe 91 PID 4360 wrote to memory of 4504 4360 userinit.exe 91 PID 4360 wrote to memory of 4504 4360 userinit.exe 91 PID 4360 wrote to memory of 3400 4360 userinit.exe 92 PID 4360 wrote to memory of 3400 4360 userinit.exe 92 PID 4360 wrote to memory of 3400 4360 userinit.exe 92 PID 4360 wrote to memory of 4424 4360 userinit.exe 95 PID 4360 wrote to memory of 4424 4360 userinit.exe 95 PID 4360 wrote to memory of 4424 4360 userinit.exe 95 PID 4360 wrote to memory of 3620 4360 userinit.exe 96 PID 4360 wrote to memory of 3620 4360 userinit.exe 96 PID 4360 wrote to memory of 3620 4360 userinit.exe 96 PID 4360 wrote to memory of 996 4360 userinit.exe 98 PID 4360 wrote to memory of 996 4360 userinit.exe 98 PID 4360 wrote to memory of 996 4360 userinit.exe 98 PID 4360 wrote to memory of 2528 4360 userinit.exe 99 PID 4360 wrote to memory of 2528 4360 userinit.exe 99 PID 4360 wrote to memory of 2528 4360 userinit.exe 99 PID 4360 wrote to memory of 4460 4360 userinit.exe 100 PID 4360 wrote to memory of 4460 4360 userinit.exe 100 PID 4360 wrote to memory of 4460 4360 userinit.exe 100 PID 4360 wrote to memory of 2664 4360 userinit.exe 101 PID 4360 wrote to memory of 2664 4360 userinit.exe 101 PID 4360 wrote to memory of 2664 4360 userinit.exe 101 PID 4360 wrote to memory of 2088 4360 userinit.exe 102 PID 4360 wrote to memory of 2088 4360 userinit.exe 102 PID 4360 wrote to memory of 2088 4360 userinit.exe 102 PID 4360 wrote to memory of 3324 4360 userinit.exe 104 PID 4360 wrote to memory of 3324 4360 userinit.exe 104 PID 4360 wrote to memory of 3324 4360 userinit.exe 104 PID 4360 wrote to memory of 4436 4360 userinit.exe 105 PID 4360 wrote to memory of 4436 4360 userinit.exe 105 PID 4360 wrote to memory of 4436 4360 userinit.exe 105 PID 4360 wrote to memory of 2752 4360 userinit.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7.exe"C:\Users\Admin\AppData\Local\Temp\dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\userinit.exeC:\Windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1656
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1472
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3576
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3704
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4384
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4888
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4504
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3400
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4424
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3620
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:996
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2528
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4460
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2664
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3324
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4436
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1020
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3976
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4060
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2308
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:536
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4304
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1268
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:260
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1708
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3264
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3628
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3692
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3484
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082
-
Filesize
159KB
MD54407da91f9af0f128648fa32fa9da745
SHA12ccac9b88748731000f0d06938f4e70500a8dd9e
SHA256dc06b6e8dca59f713983227d566d9edd20167aaa152fe80015c0bf7cd51e0cd7
SHA51294c748829e8f7df9e7dd7ed38a4757a64a21968686cf5a76bc5cab937b18634470e6ecc38b2441b98262907667a287535996c48e224f5aa6a93146481df0d082