Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65.exe
Resource
win10v2004-20220812-en
General
-
Target
56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65.exe
-
Size
888KB
-
MD5
82905e631dc8e92da27c9b3c26213e45
-
SHA1
5b37324345cf632f0be21121f161d6981196a0bf
-
SHA256
56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
-
SHA512
f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
SSDEEP
24576:aIUGcduY9YRO3ryEfibxktMoNzy13PsSt:LaRNB+m+0yNPzt
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\userinit.exe" userinit.exe -
Executes dropped EXE 47 IoCs
pid Process 3416 userinit.exe 4240 system.exe 5020 system.exe 5056 system.exe 4800 system.exe 1912 system.exe 4360 system.exe 3852 system.exe 4344 system.exe 4948 system.exe 4404 system.exe 3396 system.exe 5088 system.exe 5072 system.exe 4688 system.exe 64 system.exe 1644 system.exe 1260 system.exe 3196 system.exe 3832 system.exe 788 system.exe 2256 system.exe 4904 system.exe 4072 system.exe 4476 system.exe 5044 system.exe 3908 system.exe 5048 system.exe 2464 system.exe 496 system.exe 1352 system.exe 4504 system.exe 2744 system.exe 2204 system.exe 3160 system.exe 4852 system.exe 3112 system.exe 1184 system.exe 1120 system.exe 4360 system.exe 1484 system.exe 4328 system.exe 4032 system.exe 2412 system.exe 4712 system.exe 1124 system.exe 3248 system.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.exe userinit.exe File opened for modification C:\Windows\SysWOW64\system.exe userinit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\userinit.exe 56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65.exe File opened for modification C:\Windows\userinit.exe 56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65.exe File created C:\Windows\kdcoms.dll userinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4232 56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65.exe 4232 56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65.exe 3416 userinit.exe 3416 userinit.exe 3416 userinit.exe 3416 userinit.exe 4240 system.exe 4240 system.exe 3416 userinit.exe 3416 userinit.exe 5020 system.exe 5020 system.exe 3416 userinit.exe 3416 userinit.exe 5056 system.exe 5056 system.exe 3416 userinit.exe 3416 userinit.exe 4800 system.exe 4800 system.exe 3416 userinit.exe 3416 userinit.exe 1912 system.exe 1912 system.exe 3416 userinit.exe 3416 userinit.exe 4360 system.exe 4360 system.exe 3416 userinit.exe 3416 userinit.exe 3852 system.exe 3852 system.exe 3416 userinit.exe 3416 userinit.exe 4344 system.exe 4344 system.exe 3416 userinit.exe 3416 userinit.exe 4948 system.exe 4948 system.exe 3416 userinit.exe 3416 userinit.exe 4404 system.exe 4404 system.exe 3416 userinit.exe 3416 userinit.exe 3396 system.exe 3396 system.exe 3416 userinit.exe 3416 userinit.exe 5088 system.exe 5088 system.exe 3416 userinit.exe 3416 userinit.exe 5072 system.exe 5072 system.exe 3416 userinit.exe 3416 userinit.exe 3416 userinit.exe 3416 userinit.exe 4688 system.exe 4688 system.exe 64 system.exe 64 system.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3416 userinit.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4232 56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65.exe 4232 56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65.exe 3416 userinit.exe 3416 userinit.exe 4240 system.exe 4240 system.exe 5020 system.exe 5020 system.exe 5056 system.exe 5056 system.exe 4800 system.exe 4800 system.exe 1912 system.exe 1912 system.exe 4360 system.exe 4360 system.exe 3852 system.exe 3852 system.exe 4344 system.exe 4344 system.exe 4948 system.exe 4948 system.exe 4404 system.exe 4404 system.exe 3396 system.exe 3396 system.exe 5088 system.exe 5088 system.exe 5072 system.exe 5072 system.exe 4688 system.exe 4688 system.exe 64 system.exe 64 system.exe 1644 system.exe 1644 system.exe 1260 system.exe 1260 system.exe 3196 system.exe 3196 system.exe 3832 system.exe 3832 system.exe 788 system.exe 788 system.exe 2256 system.exe 2256 system.exe 4904 system.exe 4904 system.exe 4072 system.exe 4072 system.exe 4476 system.exe 4476 system.exe 5044 system.exe 5044 system.exe 3908 system.exe 3908 system.exe 5048 system.exe 5048 system.exe 496 system.exe 496 system.exe 1352 system.exe 1352 system.exe 4504 system.exe 4504 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4232 wrote to memory of 3416 4232 56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65.exe 80 PID 4232 wrote to memory of 3416 4232 56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65.exe 80 PID 4232 wrote to memory of 3416 4232 56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65.exe 80 PID 3416 wrote to memory of 4240 3416 userinit.exe 81 PID 3416 wrote to memory of 4240 3416 userinit.exe 81 PID 3416 wrote to memory of 4240 3416 userinit.exe 81 PID 3416 wrote to memory of 5020 3416 userinit.exe 82 PID 3416 wrote to memory of 5020 3416 userinit.exe 82 PID 3416 wrote to memory of 5020 3416 userinit.exe 82 PID 3416 wrote to memory of 5056 3416 userinit.exe 83 PID 3416 wrote to memory of 5056 3416 userinit.exe 83 PID 3416 wrote to memory of 5056 3416 userinit.exe 83 PID 3416 wrote to memory of 4800 3416 userinit.exe 84 PID 3416 wrote to memory of 4800 3416 userinit.exe 84 PID 3416 wrote to memory of 4800 3416 userinit.exe 84 PID 3416 wrote to memory of 1912 3416 userinit.exe 87 PID 3416 wrote to memory of 1912 3416 userinit.exe 87 PID 3416 wrote to memory of 1912 3416 userinit.exe 87 PID 3416 wrote to memory of 4360 3416 userinit.exe 88 PID 3416 wrote to memory of 4360 3416 userinit.exe 88 PID 3416 wrote to memory of 4360 3416 userinit.exe 88 PID 3416 wrote to memory of 3852 3416 userinit.exe 89 PID 3416 wrote to memory of 3852 3416 userinit.exe 89 PID 3416 wrote to memory of 3852 3416 userinit.exe 89 PID 3416 wrote to memory of 4344 3416 userinit.exe 90 PID 3416 wrote to memory of 4344 3416 userinit.exe 90 PID 3416 wrote to memory of 4344 3416 userinit.exe 90 PID 3416 wrote to memory of 4948 3416 userinit.exe 91 PID 3416 wrote to memory of 4948 3416 userinit.exe 91 PID 3416 wrote to memory of 4948 3416 userinit.exe 91 PID 3416 wrote to memory of 4404 3416 userinit.exe 92 PID 3416 wrote to memory of 4404 3416 userinit.exe 92 PID 3416 wrote to memory of 4404 3416 userinit.exe 92 PID 3416 wrote to memory of 3396 3416 userinit.exe 93 PID 3416 wrote to memory of 3396 3416 userinit.exe 93 PID 3416 wrote to memory of 3396 3416 userinit.exe 93 PID 3416 wrote to memory of 5088 3416 userinit.exe 94 PID 3416 wrote to memory of 5088 3416 userinit.exe 94 PID 3416 wrote to memory of 5088 3416 userinit.exe 94 PID 3416 wrote to memory of 5072 3416 userinit.exe 95 PID 3416 wrote to memory of 5072 3416 userinit.exe 95 PID 3416 wrote to memory of 5072 3416 userinit.exe 95 PID 3416 wrote to memory of 4688 3416 userinit.exe 98 PID 3416 wrote to memory of 4688 3416 userinit.exe 98 PID 3416 wrote to memory of 4688 3416 userinit.exe 98 PID 3416 wrote to memory of 64 3416 userinit.exe 99 PID 3416 wrote to memory of 64 3416 userinit.exe 99 PID 3416 wrote to memory of 64 3416 userinit.exe 99 PID 3416 wrote to memory of 1644 3416 userinit.exe 101 PID 3416 wrote to memory of 1644 3416 userinit.exe 101 PID 3416 wrote to memory of 1644 3416 userinit.exe 101 PID 3416 wrote to memory of 1260 3416 userinit.exe 103 PID 3416 wrote to memory of 1260 3416 userinit.exe 103 PID 3416 wrote to memory of 1260 3416 userinit.exe 103 PID 3416 wrote to memory of 3196 3416 userinit.exe 104 PID 3416 wrote to memory of 3196 3416 userinit.exe 104 PID 3416 wrote to memory of 3196 3416 userinit.exe 104 PID 3416 wrote to memory of 3832 3416 userinit.exe 107 PID 3416 wrote to memory of 3832 3416 userinit.exe 107 PID 3416 wrote to memory of 3832 3416 userinit.exe 107 PID 3416 wrote to memory of 788 3416 userinit.exe 108 PID 3416 wrote to memory of 788 3416 userinit.exe 108 PID 3416 wrote to memory of 788 3416 userinit.exe 108 PID 3416 wrote to memory of 2256 3416 userinit.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65.exe"C:\Users\Admin\AppData\Local\Temp\56ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\userinit.exeC:\Windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4240
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5020
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5056
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4800
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1912
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4360
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3852
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4344
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4948
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4404
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3396
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5088
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5072
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4688
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:64
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1644
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1260
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3196
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3832
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:788
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2256
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4904
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4072
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4476
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5044
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3908
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5048
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2464
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:496
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1352
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4504
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2744
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2204
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3160
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4852
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3112
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1184
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1120
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4360
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1484
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4328
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4032
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2412
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4712
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1124
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3248
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15
-
Filesize
888KB
MD582905e631dc8e92da27c9b3c26213e45
SHA15b37324345cf632f0be21121f161d6981196a0bf
SHA25656ea92409946101f6526fff1ecea49e66c2b1220470d8d8f314f981d6499bf65
SHA512f66061506269bb9ab590247f569fe10266f36cb8bf6b644cdc934389d2058443aa29caa21179a8c65648269193426fe1bbf30310c6072f804d7c0ce0f689ad15