Analysis
-
max time kernel
183s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 23:54
Behavioral task
behavioral1
Sample
4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe
Resource
win10v2004-20220812-en
General
-
Target
4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe
-
Size
301KB
-
MD5
561064157ccb97bfa2de52d32ea3be80
-
SHA1
a96bb46b4b9aceeb7d79d106d515ff7a72b09c0e
-
SHA256
4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437
-
SHA512
141d286b4f01f6318cad70ea80cd92cf1b7aa6614cbc69a107fcfc96befb2eff06f0c3d8f673386e5e8277efe31f9e2f9302a9c481e517b5bc0ca3efc0f120d0
-
SSDEEP
6144:4EUXdLwtKDBcwkBYK5Tz77uCYXilJbg5O5/9W:4EQ5BoYK5/7+XST5l
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000d000000022deb-134.dat aspack_v212_v242 behavioral2/files/0x000d000000022deb-135.dat aspack_v212_v242 behavioral2/files/0x0007000000022e2a-140.dat aspack_v212_v242 behavioral2/files/0x0007000000022e2a-141.dat aspack_v212_v242 behavioral2/files/0x0006000000022e31-145.dat aspack_v212_v242 behavioral2/files/0x0006000000022e31-146.dat aspack_v212_v242 behavioral2/files/0x0006000000022e32-151.dat aspack_v212_v242 behavioral2/files/0x0006000000022e32-152.dat aspack_v212_v242 behavioral2/files/0x0006000000022e34-156.dat aspack_v212_v242 behavioral2/files/0x0006000000022e34-157.dat aspack_v212_v242 behavioral2/files/0x0006000000022e35-161.dat aspack_v212_v242 behavioral2/files/0x0006000000022e35-162.dat aspack_v212_v242 behavioral2/files/0x0006000000022e36-166.dat aspack_v212_v242 behavioral2/files/0x0006000000022e36-167.dat aspack_v212_v242 behavioral2/files/0x0006000000022e37-171.dat aspack_v212_v242 behavioral2/files/0x0006000000022e37-172.dat aspack_v212_v242 behavioral2/files/0x0006000000022e39-176.dat aspack_v212_v242 behavioral2/files/0x0006000000022e39-177.dat aspack_v212_v242 behavioral2/files/0x0006000000022e3d-182.dat aspack_v212_v242 behavioral2/files/0x0006000000022e3d-183.dat aspack_v212_v242 behavioral2/files/0x0006000000022e41-187.dat aspack_v212_v242 behavioral2/files/0x0006000000022e41-188.dat aspack_v212_v242 behavioral2/files/0x0006000000022e42-192.dat aspack_v212_v242 behavioral2/files/0x0011000000016741-193.dat aspack_v212_v242 behavioral2/files/0x0011000000016741-196.dat aspack_v212_v242 behavioral2/files/0x0006000000022e42-195.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 3464 16980d64.exe -
Sets DLL path for service in the registry 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 16980d64.exe -
resource yara_rule behavioral2/memory/64-132-0x0000000000400000-0x000000000054F000-memory.dmp upx behavioral2/files/0x000d000000022deb-134.dat upx behavioral2/files/0x000d000000022deb-135.dat upx behavioral2/memory/3464-136-0x0000000000780000-0x00000000007CD000-memory.dmp upx behavioral2/memory/3464-137-0x0000000000780000-0x00000000007CD000-memory.dmp upx behavioral2/memory/3464-138-0x0000000000780000-0x00000000007CD000-memory.dmp upx behavioral2/files/0x0007000000022e2a-140.dat upx behavioral2/files/0x0007000000022e2a-141.dat upx behavioral2/memory/4164-143-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/4164-142-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/4164-144-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/files/0x0006000000022e31-145.dat upx behavioral2/files/0x0006000000022e31-146.dat upx behavioral2/memory/5020-147-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/5020-148-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/5020-149-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/files/0x0006000000022e32-151.dat upx behavioral2/memory/3748-154-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/3748-153-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/files/0x0006000000022e32-152.dat upx behavioral2/memory/3748-155-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/files/0x0006000000022e34-156.dat upx behavioral2/files/0x0006000000022e34-157.dat upx behavioral2/memory/5068-158-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/5068-159-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/5068-160-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/files/0x0006000000022e35-161.dat upx behavioral2/files/0x0006000000022e35-162.dat upx behavioral2/memory/460-164-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/460-163-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/460-165-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/files/0x0006000000022e36-166.dat upx behavioral2/files/0x0006000000022e36-167.dat upx behavioral2/memory/2116-168-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/2116-169-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/memory/2116-170-0x0000000074F60000-0x0000000074FAD000-memory.dmp upx behavioral2/files/0x0006000000022e37-171.dat upx behavioral2/files/0x0006000000022e37-172.dat upx behavioral2/memory/3276-173-0x0000000074EE0000-0x0000000074F2D000-memory.dmp upx behavioral2/memory/3276-174-0x0000000074EE0000-0x0000000074F2D000-memory.dmp upx behavioral2/memory/3276-175-0x0000000074EE0000-0x0000000074F2D000-memory.dmp upx behavioral2/files/0x0006000000022e39-176.dat upx behavioral2/files/0x0006000000022e39-177.dat upx behavioral2/memory/4232-179-0x0000000074210000-0x000000007425D000-memory.dmp upx behavioral2/memory/4232-178-0x0000000074210000-0x000000007425D000-memory.dmp upx behavioral2/memory/4232-180-0x0000000074210000-0x000000007425D000-memory.dmp upx behavioral2/memory/64-181-0x0000000000400000-0x000000000054F000-memory.dmp upx behavioral2/files/0x0006000000022e3d-182.dat upx behavioral2/memory/2308-185-0x0000000075200000-0x000000007524D000-memory.dmp upx behavioral2/memory/2308-184-0x0000000075200000-0x000000007524D000-memory.dmp upx behavioral2/files/0x0006000000022e3d-183.dat upx behavioral2/memory/2308-186-0x0000000075200000-0x000000007524D000-memory.dmp upx behavioral2/files/0x0006000000022e41-187.dat upx behavioral2/files/0x0006000000022e41-188.dat upx behavioral2/memory/4548-189-0x0000000075200000-0x000000007524D000-memory.dmp upx behavioral2/memory/4548-190-0x0000000075200000-0x000000007524D000-memory.dmp upx behavioral2/memory/4548-191-0x0000000075200000-0x000000007524D000-memory.dmp upx behavioral2/memory/3464-194-0x0000000000780000-0x00000000007CD000-memory.dmp upx behavioral2/files/0x0006000000022e42-192.dat upx behavioral2/files/0x0011000000016741-193.dat upx behavioral2/memory/4396-198-0x00000000752B0000-0x00000000752FD000-memory.dmp upx behavioral2/memory/4396-200-0x00000000752B0000-0x00000000752FD000-memory.dmp upx behavioral2/memory/4396-202-0x00000000752B0000-0x00000000752FD000-memory.dmp upx behavioral2/memory/3376-201-0x00000000751E0000-0x000000007522D000-memory.dmp upx -
Loads dropped DLL 12 IoCs
pid Process 4164 svchost.exe 5020 svchost.exe 3748 svchost.exe 5068 svchost.exe 460 svchost.exe 2116 svchost.exe 3276 svchost.exe 4232 svchost.exe 2308 svchost.exe 4548 svchost.exe 4396 svchost.exe 3376 svchost.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ias.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\SRService.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\Nla.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll 16980d64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3464 16980d64.exe 3464 16980d64.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 64 wrote to memory of 3464 64 4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe 80 PID 64 wrote to memory of 3464 64 4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe 80 PID 64 wrote to memory of 3464 64 4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe"C:\Users\Admin\AppData\Local\Temp\4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\16980d64.exeC:\16980d64.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:4164
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
PID:5020
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla1⤵
- Loads dropped DLL
PID:3748
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc1⤵
- Loads dropped DLL
PID:5068
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation1⤵
- Loads dropped DLL
PID:460
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent1⤵
- Loads dropped DLL
PID:2116
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService1⤵
- Loads dropped DLL
PID:3276
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp1⤵
- Loads dropped DLL
PID:4232
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours1⤵
- Loads dropped DLL
PID:2308
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit1⤵
- Loads dropped DLL
PID:4548
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc1⤵
- Loads dropped DLL
PID:4396
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr1⤵
- Loads dropped DLL
PID:3376
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD5b0e56629b4f276273259f414ba362099
SHA1d5dfd49e47026877ca5d37d2bcc75a491cfc36ff
SHA256610f108dad9d94533144355db11bdf92752c8b19c576cf3a9e3913ad56b79bbe
SHA512e716f218d64940768ff8d979ea5d949f37719de8ad0a67296f432e3a440f743cbe254c5bed7f452ad972836c9a5799638b41c05e476cf7a58c4be9f27b9f2969
-
Filesize
237KB
MD5b0e56629b4f276273259f414ba362099
SHA1d5dfd49e47026877ca5d37d2bcc75a491cfc36ff
SHA256610f108dad9d94533144355db11bdf92752c8b19c576cf3a9e3913ad56b79bbe
SHA512e716f218d64940768ff8d979ea5d949f37719de8ad0a67296f432e3a440f743cbe254c5bed7f452ad972836c9a5799638b41c05e476cf7a58c4be9f27b9f2969
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e