Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe
Resource
win10v2004-20220812-en
General
-
Target
319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe
-
Size
48KB
-
MD5
0771eb7d52d30a9c98eb92d7210161b7
-
SHA1
5b3a0492b4ba5abf2102d0fc69aefb612d47627d
-
SHA256
319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
-
SHA512
e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
SSDEEP
768:Ice/A+bfiNn37w6oifZTvb5ohF7Y/myfBirIGxv35BMCAI8J9Ua0rDq:6A+jw3NfZTvbqa0rHl5o9Uayq
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\BerasJatah.exe\"" 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\BerasJatah.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\BerasJatah.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\BerasJatah.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\BerasJatah.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\BerasJatah.exe\"" inetinfo.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" inetinfo.exe -
Disables RegEdit via registry modification 12 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe -
Disables cmd.exe use via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" lsass.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts-Denied By-Admin.com inetinfo.exe File opened for modification C:\Windows\System32\drivers\etc\hosts-Denied By-Admin.com inetinfo.exe -
Executes dropped EXE 5 IoCs
pid Process 4240 smss.exe 4852 winlogon.exe 3036 services.exe 1132 lsass.exe 1468 inetinfo.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif smss.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif smss.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" inetinfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" inetinfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" lsass.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Admin's Setting.scr smss.exe File opened for modification C:\Windows\SysWOW64\Admin's Setting.scr smss.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\ShellNew\sempalong.exe 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe File opened for modification C:\Windows\ShellNew\sempalong.exe winlogon.exe File opened for modification C:\Windows\ShellNew\sempalong.exe services.exe File opened for modification C:\Windows\BerasJatah.exe lsass.exe File opened for modification C:\Windows\BerasJatah.exe inetinfo.exe File created C:\Windows\BerasJatah.exe 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe File opened for modification C:\Windows\BerasJatah.exe 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe File opened for modification C:\Windows\BerasJatah.exe services.exe File created C:\Windows\ShellNew\sempalong.exe 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe File opened for modification C:\Windows\ShellNew\sempalong.exe smss.exe File opened for modification C:\Windows\BerasJatah.exe smss.exe File opened for modification C:\Windows\BerasJatah.exe winlogon.exe File opened for modification C:\Windows\ShellNew\sempalong.exe lsass.exe File opened for modification C:\Windows\ShellNew\sempalong.exe inetinfo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5048 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe 4240 smss.exe 4852 winlogon.exe 3036 services.exe 1132 lsass.exe 1468 inetinfo.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 5048 wrote to memory of 5080 5048 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe 80 PID 5048 wrote to memory of 5080 5048 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe 80 PID 5048 wrote to memory of 5080 5048 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe 80 PID 5048 wrote to memory of 4240 5048 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe 82 PID 5048 wrote to memory of 4240 5048 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe 82 PID 5048 wrote to memory of 4240 5048 319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe 82 PID 4240 wrote to memory of 4852 4240 smss.exe 83 PID 4240 wrote to memory of 4852 4240 smss.exe 83 PID 4240 wrote to memory of 4852 4240 smss.exe 83 PID 4240 wrote to memory of 3284 4240 smss.exe 84 PID 4240 wrote to memory of 3284 4240 smss.exe 84 PID 4240 wrote to memory of 3284 4240 smss.exe 84 PID 4240 wrote to memory of 2872 4240 smss.exe 86 PID 4240 wrote to memory of 2872 4240 smss.exe 86 PID 4240 wrote to memory of 2872 4240 smss.exe 86 PID 4240 wrote to memory of 3036 4240 smss.exe 87 PID 4240 wrote to memory of 3036 4240 smss.exe 87 PID 4240 wrote to memory of 3036 4240 smss.exe 87 PID 4240 wrote to memory of 1132 4240 smss.exe 89 PID 4240 wrote to memory of 1132 4240 smss.exe 89 PID 4240 wrote to memory of 1132 4240 smss.exe 89 PID 4240 wrote to memory of 1468 4240 smss.exe 90 PID 4240 wrote to memory of 1468 4240 smss.exe 90 PID 4240 wrote to memory of 1468 4240 smss.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe"C:\Users\Admin\AppData\Local\Temp\319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- Modifies registry class
PID:5080
-
-
C:\Users\Admin\AppData\Local\smss.exeC:\Users\Admin\AppData\Local\smss.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\winlogon.exeC:\Users\Admin\AppData\Local\winlogon.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4852
-
-
C:\Windows\SysWOW64\at.exeat /delete /y3⤵PID:3284
-
-
C:\Windows\SysWOW64\at.exeat 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Brengkolang.com"3⤵PID:2872
-
-
C:\Users\Admin\AppData\Local\services.exeC:\Users\Admin\AppData\Local\services.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
C:\Users\Admin\AppData\Local\lsass.exeC:\Users\Admin\AppData\Local\lsass.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1132
-
-
C:\Users\Admin\AppData\Local\inetinfo.exeC:\Users\Admin\AppData\Local\inetinfo.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2
-
Filesize
48KB
MD50771eb7d52d30a9c98eb92d7210161b7
SHA15b3a0492b4ba5abf2102d0fc69aefb612d47627d
SHA256319857c4f314216f29cc68be00378322483d53ad1bea765ad5e02640605d45a7
SHA512e71d37f3c1070e11e991c7072c9346e88ee50e9b6df5361638b246f506d2d7489e18413858893c0c9a63b3e259737f4293f730155dcb9f164c5bc0889c2da7c2