Analysis
-
max time kernel
151s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe
Resource
win10v2004-20220812-en
General
-
Target
4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe
-
Size
192KB
-
MD5
a184a7b2cb20fd894e7b2c47fce2989c
-
SHA1
5a23438166d4720b7380a52a23e89ae584a935d9
-
SHA256
4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e
-
SHA512
b0f48cbdfda6ea7c14ee7bcac699e4fdf03431fc942da692680aa14ed3b4ceb2a1c4682a0d8cf8ec2c9f158de5d1e6aaf3d8a71eae40947f2e8f8906c36f944b
-
SSDEEP
3072:DOm0VJOSokrwInQrLS4kZxPQtmnU9Ri7TJAc1BkHy8IA9aVsV2Bq:Km0VJOvI6S4QQtOU9ROp8/V28
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" quoupoy.exe -
Executes dropped EXE 1 IoCs
pid Process 992 quoupoy.exe -
Loads dropped DLL 2 IoCs
pid Process 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /g" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /x" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /b" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /q" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /u" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /j" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /h" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /v" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /w" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /d" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /l" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /s" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /e" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /p" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /f" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /o" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /j" 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /n" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /k" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /y" quoupoy.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /a" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /m" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /c" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /r" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /i" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /t" quoupoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\quoupoy = "C:\\Users\\Admin\\quoupoy.exe /z" quoupoy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe 992 quoupoy.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe 992 quoupoy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1464 wrote to memory of 992 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe 26 PID 1464 wrote to memory of 992 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe 26 PID 1464 wrote to memory of 992 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe 26 PID 1464 wrote to memory of 992 1464 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe"C:\Users\Admin\AppData\Local\Temp\4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\quoupoy.exe"C:\Users\Admin\quoupoy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:992
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5d916eb91d3152fe771ee8854b4cd52f2
SHA148807bf1f0aca6cd6de04a24e68f057be1439f23
SHA256879bcd721fdd0b761b78acd436f2a864a3e7430ce24459e2e855bb400b52c276
SHA512f6216914820eaca95be638c97b1e847f156e368a3880ad9f7d6051d47690f437c473b72368cd12610f2ec068278bd2e8a980b95cca3c6d943685ffd15b7911e3
-
Filesize
192KB
MD5d916eb91d3152fe771ee8854b4cd52f2
SHA148807bf1f0aca6cd6de04a24e68f057be1439f23
SHA256879bcd721fdd0b761b78acd436f2a864a3e7430ce24459e2e855bb400b52c276
SHA512f6216914820eaca95be638c97b1e847f156e368a3880ad9f7d6051d47690f437c473b72368cd12610f2ec068278bd2e8a980b95cca3c6d943685ffd15b7911e3
-
Filesize
192KB
MD5d916eb91d3152fe771ee8854b4cd52f2
SHA148807bf1f0aca6cd6de04a24e68f057be1439f23
SHA256879bcd721fdd0b761b78acd436f2a864a3e7430ce24459e2e855bb400b52c276
SHA512f6216914820eaca95be638c97b1e847f156e368a3880ad9f7d6051d47690f437c473b72368cd12610f2ec068278bd2e8a980b95cca3c6d943685ffd15b7911e3
-
Filesize
192KB
MD5d916eb91d3152fe771ee8854b4cd52f2
SHA148807bf1f0aca6cd6de04a24e68f057be1439f23
SHA256879bcd721fdd0b761b78acd436f2a864a3e7430ce24459e2e855bb400b52c276
SHA512f6216914820eaca95be638c97b1e847f156e368a3880ad9f7d6051d47690f437c473b72368cd12610f2ec068278bd2e8a980b95cca3c6d943685ffd15b7911e3