Analysis
-
max time kernel
153s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe
Resource
win10v2004-20220812-en
General
-
Target
d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe
-
Size
100KB
-
MD5
0f4189e46b0ee6646684727e90146a40
-
SHA1
cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
-
SHA256
d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
-
SHA512
c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
SSDEEP
768:Cy8/987dmJKW+IMcK8jFlEMDwfPaO3MRlppr78ZhTp6LRsPxYevbYm7Emgv35BMC:c985mcHIqfypX78ZJuuPHbYwEm+5
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" inetinfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" inetinfo.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" inetinfo.exe -
Disables RegEdit via registry modification 12 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe -
Disables cmd.exe use via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts-Denied By-Admin.com inetinfo.exe File opened for modification C:\Windows\System32\drivers\etc\hosts-Denied By-Admin.com inetinfo.exe -
Executes dropped EXE 5 IoCs
pid Process 2080 smss.exe 4944 winlogon.exe 3240 services.exe 220 lsass.exe 2836 inetinfo.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif smss.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif smss.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" inetinfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" inetinfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" lsass.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Admin's Setting.scr smss.exe File opened for modification C:\Windows\SysWOW64\Admin's Setting.scr smss.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\eksplorasi.exe winlogon.exe File opened for modification C:\Windows\eksplorasi.exe services.exe File opened for modification C:\Windows\eksplorasi.exe lsass.exe File opened for modification C:\Windows\ShellNew\sempalong.exe inetinfo.exe File opened for modification C:\Windows\eksplorasi.exe inetinfo.exe File opened for modification C:\Windows\eksplorasi.exe d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe File opened for modification C:\Windows\eksplorasi.exe smss.exe File opened for modification C:\Windows\ShellNew\sempalong.exe d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe File opened for modification C:\Windows\ShellNew\sempalong.exe winlogon.exe File opened for modification C:\Windows\ShellNew\sempalong.exe smss.exe File opened for modification C:\Windows\ShellNew\sempalong.exe lsass.exe File opened for modification C:\Windows\ShellNew\sempalong.exe services.exe File created C:\Windows\ShellNew\sempalong.exe d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe File created C:\Windows\eksplorasi.exe d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1080 d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe 2080 smss.exe 4944 winlogon.exe 3240 services.exe 220 lsass.exe 2836 inetinfo.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1080 wrote to memory of 4628 1080 d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe 79 PID 1080 wrote to memory of 4628 1080 d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe 79 PID 1080 wrote to memory of 4628 1080 d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe 79 PID 1080 wrote to memory of 2080 1080 d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe 80 PID 1080 wrote to memory of 2080 1080 d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe 80 PID 1080 wrote to memory of 2080 1080 d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe 80 PID 2080 wrote to memory of 4944 2080 smss.exe 81 PID 2080 wrote to memory of 4944 2080 smss.exe 81 PID 2080 wrote to memory of 4944 2080 smss.exe 81 PID 2080 wrote to memory of 4020 2080 smss.exe 82 PID 2080 wrote to memory of 4020 2080 smss.exe 82 PID 2080 wrote to memory of 4020 2080 smss.exe 82 PID 2080 wrote to memory of 2368 2080 smss.exe 84 PID 2080 wrote to memory of 2368 2080 smss.exe 84 PID 2080 wrote to memory of 2368 2080 smss.exe 84 PID 2080 wrote to memory of 3240 2080 smss.exe 86 PID 2080 wrote to memory of 3240 2080 smss.exe 86 PID 2080 wrote to memory of 3240 2080 smss.exe 86 PID 2080 wrote to memory of 220 2080 smss.exe 87 PID 2080 wrote to memory of 220 2080 smss.exe 87 PID 2080 wrote to memory of 220 2080 smss.exe 87 PID 2080 wrote to memory of 2836 2080 smss.exe 88 PID 2080 wrote to memory of 2836 2080 smss.exe 88 PID 2080 wrote to memory of 2836 2080 smss.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe"C:\Users\Admin\AppData\Local\Temp\d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- Modifies registry class
PID:4628
-
-
C:\Users\Admin\AppData\Local\smss.exeC:\Users\Admin\AppData\Local\smss.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\winlogon.exeC:\Users\Admin\AppData\Local\winlogon.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4944
-
-
C:\Windows\SysWOW64\at.exeat /delete /y3⤵PID:4020
-
-
C:\Windows\SysWOW64\at.exeat 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Brengkolang.com"3⤵PID:2368
-
-
C:\Users\Admin\AppData\Local\services.exeC:\Users\Admin\AppData\Local\services.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3240
-
-
C:\Users\Admin\AppData\Local\lsass.exeC:\Users\Admin\AppData\Local\lsass.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:220
-
-
C:\Users\Admin\AppData\Local\inetinfo.exeC:\Users\Admin\AppData\Local\inetinfo.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
63KB
MD5aa1563755e9b07f31553d313ce9689cd
SHA1f4dc29da51d8ebe49e2011fccc7a9601b6b1e6fc
SHA25653c3bf1831ae5eb446d12460e6c3df95bed84e2ba48dabcd7a1191e35d74786e
SHA5128aa040c3e6d027471d298b3cc077b3e346ea724f364016ec55ddc1e4f13f69deba0238c2641b454f1e79a0847ffff8a0850e843fd4b5a34ca068864da9645965
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
100KB
MD50f4189e46b0ee6646684727e90146a40
SHA1cf2d160b616d5fd3dc794c3e8d930e0d82e414b5
SHA256d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249
SHA512c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549
-
Filesize
64KB
MD5d8fcdc9b326c9ce23a8f11b04fc9558f
SHA16f88c8c30878ae2eee74fb931a1d4434ca5b59c8
SHA25615a3ba095de5001ae7267705df232b24038150ca16402f6f4dbaebc82db69c1a
SHA512cb3eb9ce23b9193d3a5340f9c84f36bccbb2aa16d464e45eecc3ad5c5e558b687e017c7bc786f30d66deee9cadc0d36e0c15616732ae30cdef2b6c7bdbe592a1