Analysis
-
max time kernel
198s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 19:04
Static task
static1
Behavioral task
behavioral1
Sample
b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exe
Resource
win10v2004-20221111-en
General
-
Target
b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exe
-
Size
235KB
-
MD5
557b3a4f729534a82da9498fe7270180
-
SHA1
1c1c85a7e488f1dbddaf53d3610f8095853905c4
-
SHA256
b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
-
SHA512
8ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
SSDEEP
1536:rjk6Dwdg28ez4+pmxiHA8f1zwQVgvQmG:rj+dg28ez4iAc1zwLvQmG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
userinit.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\userinit.exe" userinit.exe -
Executes dropped EXE 46 IoCs
Processes:
userinit.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exepid process 5048 userinit.exe 316 system.exe 3504 system.exe 4140 system.exe 4024 system.exe 3948 system.exe 1056 system.exe 3672 system.exe 1304 system.exe 3696 system.exe 3368 system.exe 2256 system.exe 2932 system.exe 5076 system.exe 1300 system.exe 1888 system.exe 2448 system.exe 1412 system.exe 4052 system.exe 5052 system.exe 4504 system.exe 1152 system.exe 2440 system.exe 3464 system.exe 3908 system.exe 1868 system.exe 4488 system.exe 4040 system.exe 3044 system.exe 3764 system.exe 4564 system.exe 5012 system.exe 1420 system.exe 1096 system.exe 1768 system.exe 3184 system.exe 2464 system.exe 4676 system.exe 4724 system.exe 4252 system.exe 4612 system.exe 4532 system.exe 2232 system.exe 3936 system.exe 3488 system.exe 4220 system.exe -
Drops file in System32 directory 2 IoCs
Processes:
userinit.exedescription ioc process File created C:\Windows\SysWOW64\system.exe userinit.exe File opened for modification C:\Windows\SysWOW64\system.exe userinit.exe -
Drops file in Windows directory 3 IoCs
Processes:
b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exeuserinit.exedescription ioc process File created C:\Windows\userinit.exe b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exe File opened for modification C:\Windows\userinit.exe b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exe File created C:\Windows\kdcoms.dll userinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exeuserinit.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exepid process 2088 b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exe 2088 b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exe 5048 userinit.exe 5048 userinit.exe 5048 userinit.exe 5048 userinit.exe 316 system.exe 316 system.exe 5048 userinit.exe 5048 userinit.exe 3504 system.exe 3504 system.exe 5048 userinit.exe 5048 userinit.exe 4140 system.exe 4140 system.exe 5048 userinit.exe 5048 userinit.exe 4024 system.exe 4024 system.exe 5048 userinit.exe 5048 userinit.exe 3948 system.exe 3948 system.exe 5048 userinit.exe 5048 userinit.exe 1056 system.exe 1056 system.exe 5048 userinit.exe 5048 userinit.exe 3672 system.exe 3672 system.exe 5048 userinit.exe 5048 userinit.exe 1304 system.exe 1304 system.exe 5048 userinit.exe 5048 userinit.exe 3696 system.exe 3696 system.exe 5048 userinit.exe 5048 userinit.exe 3368 system.exe 3368 system.exe 5048 userinit.exe 5048 userinit.exe 2256 system.exe 2256 system.exe 5048 userinit.exe 5048 userinit.exe 2932 system.exe 2932 system.exe 5048 userinit.exe 5048 userinit.exe 5076 system.exe 5076 system.exe 5048 userinit.exe 5048 userinit.exe 1300 system.exe 1300 system.exe 5048 userinit.exe 5048 userinit.exe 1888 system.exe 1888 system.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
userinit.exepid process 5048 userinit.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exeuserinit.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exesystem.exepid process 2088 b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exe 2088 b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exe 5048 userinit.exe 5048 userinit.exe 316 system.exe 316 system.exe 3504 system.exe 3504 system.exe 4140 system.exe 4140 system.exe 4024 system.exe 4024 system.exe 3948 system.exe 3948 system.exe 1056 system.exe 1056 system.exe 3672 system.exe 3672 system.exe 1304 system.exe 1304 system.exe 3696 system.exe 3696 system.exe 3368 system.exe 3368 system.exe 2256 system.exe 2256 system.exe 2932 system.exe 2932 system.exe 5076 system.exe 5076 system.exe 1300 system.exe 1300 system.exe 1888 system.exe 1888 system.exe 2448 system.exe 2448 system.exe 1412 system.exe 1412 system.exe 4052 system.exe 4052 system.exe 5052 system.exe 5052 system.exe 4504 system.exe 4504 system.exe 1152 system.exe 2440 system.exe 2440 system.exe 1152 system.exe 3464 system.exe 3464 system.exe 3908 system.exe 3908 system.exe 1868 system.exe 1868 system.exe 4488 system.exe 4488 system.exe 4040 system.exe 4040 system.exe 3044 system.exe 3044 system.exe 3764 system.exe 3764 system.exe 4564 system.exe 4564 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exeuserinit.exedescription pid process target process PID 2088 wrote to memory of 5048 2088 b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exe userinit.exe PID 2088 wrote to memory of 5048 2088 b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exe userinit.exe PID 2088 wrote to memory of 5048 2088 b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exe userinit.exe PID 5048 wrote to memory of 316 5048 userinit.exe system.exe PID 5048 wrote to memory of 316 5048 userinit.exe system.exe PID 5048 wrote to memory of 316 5048 userinit.exe system.exe PID 5048 wrote to memory of 3504 5048 userinit.exe system.exe PID 5048 wrote to memory of 3504 5048 userinit.exe system.exe PID 5048 wrote to memory of 3504 5048 userinit.exe system.exe PID 5048 wrote to memory of 4140 5048 userinit.exe system.exe PID 5048 wrote to memory of 4140 5048 userinit.exe system.exe PID 5048 wrote to memory of 4140 5048 userinit.exe system.exe PID 5048 wrote to memory of 4024 5048 userinit.exe system.exe PID 5048 wrote to memory of 4024 5048 userinit.exe system.exe PID 5048 wrote to memory of 4024 5048 userinit.exe system.exe PID 5048 wrote to memory of 3948 5048 userinit.exe system.exe PID 5048 wrote to memory of 3948 5048 userinit.exe system.exe PID 5048 wrote to memory of 3948 5048 userinit.exe system.exe PID 5048 wrote to memory of 1056 5048 userinit.exe system.exe PID 5048 wrote to memory of 1056 5048 userinit.exe system.exe PID 5048 wrote to memory of 1056 5048 userinit.exe system.exe PID 5048 wrote to memory of 3672 5048 userinit.exe system.exe PID 5048 wrote to memory of 3672 5048 userinit.exe system.exe PID 5048 wrote to memory of 3672 5048 userinit.exe system.exe PID 5048 wrote to memory of 1304 5048 userinit.exe system.exe PID 5048 wrote to memory of 1304 5048 userinit.exe system.exe PID 5048 wrote to memory of 1304 5048 userinit.exe system.exe PID 5048 wrote to memory of 3696 5048 userinit.exe system.exe PID 5048 wrote to memory of 3696 5048 userinit.exe system.exe PID 5048 wrote to memory of 3696 5048 userinit.exe system.exe PID 5048 wrote to memory of 3368 5048 userinit.exe system.exe PID 5048 wrote to memory of 3368 5048 userinit.exe system.exe PID 5048 wrote to memory of 3368 5048 userinit.exe system.exe PID 5048 wrote to memory of 2256 5048 userinit.exe system.exe PID 5048 wrote to memory of 2256 5048 userinit.exe system.exe PID 5048 wrote to memory of 2256 5048 userinit.exe system.exe PID 5048 wrote to memory of 2932 5048 userinit.exe system.exe PID 5048 wrote to memory of 2932 5048 userinit.exe system.exe PID 5048 wrote to memory of 2932 5048 userinit.exe system.exe PID 5048 wrote to memory of 5076 5048 userinit.exe system.exe PID 5048 wrote to memory of 5076 5048 userinit.exe system.exe PID 5048 wrote to memory of 5076 5048 userinit.exe system.exe PID 5048 wrote to memory of 1300 5048 userinit.exe system.exe PID 5048 wrote to memory of 1300 5048 userinit.exe system.exe PID 5048 wrote to memory of 1300 5048 userinit.exe system.exe PID 5048 wrote to memory of 1888 5048 userinit.exe system.exe PID 5048 wrote to memory of 1888 5048 userinit.exe system.exe PID 5048 wrote to memory of 1888 5048 userinit.exe system.exe PID 5048 wrote to memory of 2448 5048 userinit.exe system.exe PID 5048 wrote to memory of 2448 5048 userinit.exe system.exe PID 5048 wrote to memory of 2448 5048 userinit.exe system.exe PID 5048 wrote to memory of 1412 5048 userinit.exe system.exe PID 5048 wrote to memory of 1412 5048 userinit.exe system.exe PID 5048 wrote to memory of 1412 5048 userinit.exe system.exe PID 5048 wrote to memory of 4052 5048 userinit.exe system.exe PID 5048 wrote to memory of 4052 5048 userinit.exe system.exe PID 5048 wrote to memory of 4052 5048 userinit.exe system.exe PID 5048 wrote to memory of 5052 5048 userinit.exe system.exe PID 5048 wrote to memory of 5052 5048 userinit.exe system.exe PID 5048 wrote to memory of 5052 5048 userinit.exe system.exe PID 5048 wrote to memory of 4504 5048 userinit.exe system.exe PID 5048 wrote to memory of 4504 5048 userinit.exe system.exe PID 5048 wrote to memory of 4504 5048 userinit.exe system.exe PID 5048 wrote to memory of 1152 5048 userinit.exe system.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exe"C:\Users\Admin\AppData\Local\Temp\b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\userinit.exeC:\Windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:316 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3504 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4140 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4024 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3948 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3672 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1304 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3696 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3368 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2256 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5076 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1300 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2448 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1412 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4052 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5052 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4504 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3464 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3908 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4488 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4040 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3764 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4564 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5012 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1420 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1096 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3184 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4676 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4724 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4252 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4612 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4532 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2232 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3936 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb
-
Filesize
235KB
MD5557b3a4f729534a82da9498fe7270180
SHA11c1c85a7e488f1dbddaf53d3610f8095853905c4
SHA256b249341aef76947ed8863edac7e617c5dae4cb5ea55c16faa92246513b1a87e3
SHA5128ee2c0cf20ef6abc349054a03fa0ed9cb4b1b165de944b8dd840fb16c4c5cc772faa26cfa3b6a2359de3246ed26511018c8eba8412d3cde81a1e8e732fa728bb