Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
3ca4f40a83f068afe32f020dc9a4702ab0ec5282b485212c7308a5d2562cb4b5.exe
Resource
win7-20220812-en
General
-
Target
3ca4f40a83f068afe32f020dc9a4702ab0ec5282b485212c7308a5d2562cb4b5.exe
-
Size
664KB
-
MD5
0e73df070a318cc1946c80618d63fbf5
-
SHA1
922678a841985c6785ea9a60271c85d76d4e53c2
-
SHA256
3ca4f40a83f068afe32f020dc9a4702ab0ec5282b485212c7308a5d2562cb4b5
-
SHA512
04b63e471db02c933119909ca487a113d9fba7622cd335f94cbe340f98ebc55cb918e497416125da6c572a65059c9ad3469e8d37ae6fe2b81061ab5a538325e7
-
SSDEEP
12288:F/XM4DShe9EcHPLrLZ5AICgkTP3/HQr3ZBIRjD68wBxGsHmmvV9RnCbzvYej:RM4DSs9FvzAICgkTMZB2oGmvDRnY1
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List WScript.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\5445:TCP = "5445:TCP:*:Enabled:@xpsp2res.dll,-22003" WScript.exe -
Executes dropped EXE 5 IoCs
pid Process 1348 cleaner file.exe 1708 smss.exe 1940 smss.exe 1884 smss.exe 1436 smss.exe -
Loads dropped DLL 23 IoCs
pid Process 684 3ca4f40a83f068afe32f020dc9a4702ab0ec5282b485212c7308a5d2562cb4b5.exe 1348 cleaner file.exe 1348 cleaner file.exe 1348 cleaner file.exe 912 WScript.exe 912 WScript.exe 1708 smss.exe 1708 smss.exe 1708 smss.exe 1708 smss.exe 912 WScript.exe 912 WScript.exe 1940 smss.exe 1940 smss.exe 1940 smss.exe 1940 smss.exe 912 WScript.exe 912 WScript.exe 1884 smss.exe 1884 smss.exe 1884 smss.exe 1884 smss.exe 1436 smss.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\PIF\firewall.vbe cleaner file.exe File created C:\Windows\PIF\cmd.vbe cleaner file.exe File opened for modification C:\Windows\PIF\cmd.vbe cleaner file.exe File created C:\Windows\PIF\reg1.reg cleaner file.exe File opened for modification C:\Windows\PIF\reg1.reg cleaner file.exe File created C:\Windows\PIF\reg.reg cleaner file.exe File created C:\Windows\PIF\smss.exe cleaner file.exe File opened for modification C:\Windows\PIF\smss.exe cleaner file.exe File opened for modification C:\Windows\PIF\firewall.vbe cleaner file.exe File opened for modification C:\Windows\PIF cleaner file.exe File created C:\Windows\PIF\AdmDll.dll cleaner file.exe File opened for modification C:\Windows\PIF\AdmDll.dll cleaner file.exe File opened for modification C:\Windows\PIF\reg.reg cleaner file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 2 IoCs
pid Process 600 regedit.exe 1620 regedit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1348 cleaner file.exe Token: SeBackupPrivilege 1348 cleaner file.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 684 wrote to memory of 1348 684 3ca4f40a83f068afe32f020dc9a4702ab0ec5282b485212c7308a5d2562cb4b5.exe 27 PID 684 wrote to memory of 1348 684 3ca4f40a83f068afe32f020dc9a4702ab0ec5282b485212c7308a5d2562cb4b5.exe 27 PID 684 wrote to memory of 1348 684 3ca4f40a83f068afe32f020dc9a4702ab0ec5282b485212c7308a5d2562cb4b5.exe 27 PID 684 wrote to memory of 1348 684 3ca4f40a83f068afe32f020dc9a4702ab0ec5282b485212c7308a5d2562cb4b5.exe 27 PID 684 wrote to memory of 1348 684 3ca4f40a83f068afe32f020dc9a4702ab0ec5282b485212c7308a5d2562cb4b5.exe 27 PID 684 wrote to memory of 1348 684 3ca4f40a83f068afe32f020dc9a4702ab0ec5282b485212c7308a5d2562cb4b5.exe 27 PID 684 wrote to memory of 1348 684 3ca4f40a83f068afe32f020dc9a4702ab0ec5282b485212c7308a5d2562cb4b5.exe 27 PID 1348 wrote to memory of 912 1348 cleaner file.exe 29 PID 1348 wrote to memory of 912 1348 cleaner file.exe 29 PID 1348 wrote to memory of 912 1348 cleaner file.exe 29 PID 1348 wrote to memory of 912 1348 cleaner file.exe 29 PID 1348 wrote to memory of 912 1348 cleaner file.exe 29 PID 1348 wrote to memory of 912 1348 cleaner file.exe 29 PID 1348 wrote to memory of 912 1348 cleaner file.exe 29 PID 912 wrote to memory of 664 912 WScript.exe 30 PID 912 wrote to memory of 664 912 WScript.exe 30 PID 912 wrote to memory of 664 912 WScript.exe 30 PID 912 wrote to memory of 664 912 WScript.exe 30 PID 912 wrote to memory of 664 912 WScript.exe 30 PID 912 wrote to memory of 664 912 WScript.exe 30 PID 912 wrote to memory of 664 912 WScript.exe 30 PID 912 wrote to memory of 600 912 WScript.exe 31 PID 912 wrote to memory of 600 912 WScript.exe 31 PID 912 wrote to memory of 600 912 WScript.exe 31 PID 912 wrote to memory of 600 912 WScript.exe 31 PID 912 wrote to memory of 600 912 WScript.exe 31 PID 912 wrote to memory of 600 912 WScript.exe 31 PID 912 wrote to memory of 600 912 WScript.exe 31 PID 912 wrote to memory of 1620 912 WScript.exe 32 PID 912 wrote to memory of 1620 912 WScript.exe 32 PID 912 wrote to memory of 1620 912 WScript.exe 32 PID 912 wrote to memory of 1620 912 WScript.exe 32 PID 912 wrote to memory of 1620 912 WScript.exe 32 PID 912 wrote to memory of 1620 912 WScript.exe 32 PID 912 wrote to memory of 1620 912 WScript.exe 32 PID 912 wrote to memory of 1708 912 WScript.exe 33 PID 912 wrote to memory of 1708 912 WScript.exe 33 PID 912 wrote to memory of 1708 912 WScript.exe 33 PID 912 wrote to memory of 1708 912 WScript.exe 33 PID 912 wrote to memory of 1708 912 WScript.exe 33 PID 912 wrote to memory of 1708 912 WScript.exe 33 PID 912 wrote to memory of 1708 912 WScript.exe 33 PID 912 wrote to memory of 1940 912 WScript.exe 34 PID 912 wrote to memory of 1940 912 WScript.exe 34 PID 912 wrote to memory of 1940 912 WScript.exe 34 PID 912 wrote to memory of 1940 912 WScript.exe 34 PID 912 wrote to memory of 1940 912 WScript.exe 34 PID 912 wrote to memory of 1940 912 WScript.exe 34 PID 912 wrote to memory of 1940 912 WScript.exe 34 PID 912 wrote to memory of 1884 912 WScript.exe 35 PID 912 wrote to memory of 1884 912 WScript.exe 35 PID 912 wrote to memory of 1884 912 WScript.exe 35 PID 912 wrote to memory of 1884 912 WScript.exe 35 PID 912 wrote to memory of 1884 912 WScript.exe 35 PID 912 wrote to memory of 1884 912 WScript.exe 35 PID 912 wrote to memory of 1884 912 WScript.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ca4f40a83f068afe32f020dc9a4702ab0ec5282b485212c7308a5d2562cb4b5.exe"C:\Users\Admin\AppData\Local\Temp\3ca4f40a83f068afe32f020dc9a4702ab0ec5282b485212c7308a5d2562cb4b5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Roaming\cleaner file.exe"C:\Users\Admin\AppData\Roaming\cleaner file.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\PIF\cmd.vbe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\PIF\firewall.vbe"4⤵
- Modifies firewall policy service
PID:664
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\regedit.exe" /s C:\Windows\PIF\reg.reg4⤵
- Runs .reg file with regedit
PID:600
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\regedit.exe" /s C:\Windows\PIF\reg1.reg4⤵
- Runs .reg file with regedit
PID:1620
-
-
C:\Windows\PIF\smss.exe"C:\Windows\PIF\smss.exe" /install /silence4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708
-
-
C:\Windows\PIF\smss.exe"C:\Windows\PIF\smss.exe" /pass:xplicit /port:5445 /save /silence4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1940
-
-
C:\Windows\PIF\smss.exe"C:\Windows\PIF\smss.exe" /start /silence4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1884
-
-
-
-
C:\Windows\PIF\smss.exe"C:\Windows\PIF\smss.exe" /service1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317KB
MD5e2981acd6aad63030a427c8fbe23214d
SHA1114917d24670c37c5323fd3d14ad8f4859efa47a
SHA256c64dc6b16fbf9875acad2bc192e0ea9a964100d1ba78207695d96cf088786a37
SHA5124dd1c84f143ebef5945144c505c395eab20a09a3edbbe14be30eb164aa21db0e9c64af909e2950b70afb6248a06f8bfc232106a0fc1ae7e4495ea9eaba4b0f05
-
Filesize
317KB
MD5e2981acd6aad63030a427c8fbe23214d
SHA1114917d24670c37c5323fd3d14ad8f4859efa47a
SHA256c64dc6b16fbf9875acad2bc192e0ea9a964100d1ba78207695d96cf088786a37
SHA5124dd1c84f143ebef5945144c505c395eab20a09a3edbbe14be30eb164aa21db0e9c64af909e2950b70afb6248a06f8bfc232106a0fc1ae7e4495ea9eaba4b0f05
-
Filesize
88KB
MD5c915181e93fe3d4c41b1963180d3c535
SHA1f35e66bec967d4254338a120eea8159f29c06a99
SHA256d8fc5d545e684a4d5001004463f762d190bee478eb3a329f65998bad53d3c958
SHA5122a5ceeb919546a713e172823da75e8f58c98c1dcedfaa7cacbd48af57bcb8da49c6289908c6c2a1bb6bda4cc7fac58adffae4a500dfe0c503397ca9aa8e92e21
-
Filesize
531B
MD540b7488181074032b35b36f790e3b4d7
SHA1495fbb91d17a22a211c99ffba757c612d220fd1d
SHA25632ff28bc0fa11dafa988824e9c02b7f52082884ac09135d440a6df135092f3aa
SHA5120d981d4ae16a6d0712b3c583e07126f64b490c599d3bdbdf7f72016499f37b6785c1c217cb41d5854126aa0634a8a51cbf7fd4c90c875e7ac645bc33478823c4
-
Filesize
267B
MD530088192ecd38db91bb8332e3f4cbdec
SHA1dbd421b46a212d047eb5cbf79d233e6557feed57
SHA2564a3a6938cb7b4501982cee517b6d21007e855c1ea4d3ffe229a44fe4facd6e8d
SHA512cd8df66bb39e0f3d5cea106b8dd4ea34ddf562f9b828e803243b3345bea9f681fab9b02168cd264ee19ad3a9f8c41ec513ca207a320b097f9dea17b16a425b0d
-
Filesize
828B
MD5e483050e5285a268eeb7730eabcfa03f
SHA1c93cb3b84db521051f713afb192987bc356bb593
SHA256bc35a9c29f2b75aa4c42a2ac403b25f26bb93a42cf76be5d3a5674e0d9ebbe8f
SHA5120bbb51b583af80b81184ff1d9f50601424c69012301ef5bf82d0c9cef9f2271a460abddded0639f27eef808d539dbd4619de94851a731114d20cca1e1f4ab4bb
-
Filesize
258B
MD5852bca3a6be73d7ba1d0cac7c2bb5603
SHA1a93b0be44178620a548899b42c5d304185c83a99
SHA25631550d77b0358435287e357b84958dd1c4787e838a3cb774e0c4b410aab10ecc
SHA5125f99803f3099d6df552793b95f7685e82d284f079733fffcd4fc8557d395d7bf985026608eea522bfef9cc99ec2cf117633d6a42f85240b13703c1c898d69c3e
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
317KB
MD5e2981acd6aad63030a427c8fbe23214d
SHA1114917d24670c37c5323fd3d14ad8f4859efa47a
SHA256c64dc6b16fbf9875acad2bc192e0ea9a964100d1ba78207695d96cf088786a37
SHA5124dd1c84f143ebef5945144c505c395eab20a09a3edbbe14be30eb164aa21db0e9c64af909e2950b70afb6248a06f8bfc232106a0fc1ae7e4495ea9eaba4b0f05
-
Filesize
317KB
MD5e2981acd6aad63030a427c8fbe23214d
SHA1114917d24670c37c5323fd3d14ad8f4859efa47a
SHA256c64dc6b16fbf9875acad2bc192e0ea9a964100d1ba78207695d96cf088786a37
SHA5124dd1c84f143ebef5945144c505c395eab20a09a3edbbe14be30eb164aa21db0e9c64af909e2950b70afb6248a06f8bfc232106a0fc1ae7e4495ea9eaba4b0f05
-
Filesize
317KB
MD5e2981acd6aad63030a427c8fbe23214d
SHA1114917d24670c37c5323fd3d14ad8f4859efa47a
SHA256c64dc6b16fbf9875acad2bc192e0ea9a964100d1ba78207695d96cf088786a37
SHA5124dd1c84f143ebef5945144c505c395eab20a09a3edbbe14be30eb164aa21db0e9c64af909e2950b70afb6248a06f8bfc232106a0fc1ae7e4495ea9eaba4b0f05
-
Filesize
317KB
MD5e2981acd6aad63030a427c8fbe23214d
SHA1114917d24670c37c5323fd3d14ad8f4859efa47a
SHA256c64dc6b16fbf9875acad2bc192e0ea9a964100d1ba78207695d96cf088786a37
SHA5124dd1c84f143ebef5945144c505c395eab20a09a3edbbe14be30eb164aa21db0e9c64af909e2950b70afb6248a06f8bfc232106a0fc1ae7e4495ea9eaba4b0f05
-
Filesize
88KB
MD5c915181e93fe3d4c41b1963180d3c535
SHA1f35e66bec967d4254338a120eea8159f29c06a99
SHA256d8fc5d545e684a4d5001004463f762d190bee478eb3a329f65998bad53d3c958
SHA5122a5ceeb919546a713e172823da75e8f58c98c1dcedfaa7cacbd48af57bcb8da49c6289908c6c2a1bb6bda4cc7fac58adffae4a500dfe0c503397ca9aa8e92e21
-
Filesize
88KB
MD5c915181e93fe3d4c41b1963180d3c535
SHA1f35e66bec967d4254338a120eea8159f29c06a99
SHA256d8fc5d545e684a4d5001004463f762d190bee478eb3a329f65998bad53d3c958
SHA5122a5ceeb919546a713e172823da75e8f58c98c1dcedfaa7cacbd48af57bcb8da49c6289908c6c2a1bb6bda4cc7fac58adffae4a500dfe0c503397ca9aa8e92e21
-
Filesize
88KB
MD5c915181e93fe3d4c41b1963180d3c535
SHA1f35e66bec967d4254338a120eea8159f29c06a99
SHA256d8fc5d545e684a4d5001004463f762d190bee478eb3a329f65998bad53d3c958
SHA5122a5ceeb919546a713e172823da75e8f58c98c1dcedfaa7cacbd48af57bcb8da49c6289908c6c2a1bb6bda4cc7fac58adffae4a500dfe0c503397ca9aa8e92e21
-
Filesize
88KB
MD5c915181e93fe3d4c41b1963180d3c535
SHA1f35e66bec967d4254338a120eea8159f29c06a99
SHA256d8fc5d545e684a4d5001004463f762d190bee478eb3a329f65998bad53d3c958
SHA5122a5ceeb919546a713e172823da75e8f58c98c1dcedfaa7cacbd48af57bcb8da49c6289908c6c2a1bb6bda4cc7fac58adffae4a500dfe0c503397ca9aa8e92e21
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684