Analysis
-
max time kernel
150s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe
Resource
win7-20220812-en
General
-
Target
9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe
-
Size
343KB
-
MD5
e8ac8ca01148a773063961cf2c1e6423
-
SHA1
3317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
-
SHA256
9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
-
SHA512
0650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
SSDEEP
6144:stbkpT1oa0MLevIiaPUNPCV3xxqb6bGBa9wsQAM:TT1fnMNPC5CelOfH
Malware Config
Extracted
cybergate
2.6
vítima
hackercioccolatta.no-ip.biz:2222
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
scvhost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 2028 scvhost.exe 900 scvhost.exe 324 scvhost.exe 1688 scvhost.exe 572 scvhost.exe 1788 scvhost.exe 1280 scvhost.exe -
resource yara_rule behavioral1/memory/1688-111-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/572-117-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/572-135-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/572-138-0x0000000024010000-0x0000000024072000-memory.dmp upx -
Loads dropped DLL 19 IoCs
pid Process 1732 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 1732 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 524 WerFault.exe 524 WerFault.exe 524 WerFault.exe 524 WerFault.exe 524 WerFault.exe 900 scvhost.exe 900 scvhost.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 1748 WerFault.exe 1748 WerFault.exe 1748 WerFault.exe 1748 WerFault.exe 1748 WerFault.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\scvhost.exe" 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\install\\scvhost.exe" scvhost.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\install\\scvhost.exe" scvhost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\scvhost.exe" 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\install\scvhost.exe scvhost.exe File opened for modification C:\Windows\SysWOW64\install\scvhost.exe scvhost.exe File created C:\Windows\SysWOW64\install\scvhost.exe scvhost.exe File opened for modification C:\Windows\SysWOW64\install\scvhost.exe scvhost.exe File created C:\Windows\SysWOW64\install\scvhost.exe 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe File opened for modification C:\Windows\SysWOW64\install\scvhost.exe 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 360 set thread context of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 2028 set thread context of 900 2028 scvhost.exe 30 PID 324 set thread context of 1688 324 scvhost.exe 33 PID 1788 set thread context of 1280 1788 scvhost.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 1368 360 WerFault.exe 13 524 2028 WerFault.exe 29 580 324 WerFault.exe 32 1748 1788 WerFault.exe 36 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 572 scvhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 572 scvhost.exe Token: SeDebugPrivilege 572 scvhost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1732 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 900 scvhost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 2028 scvhost.exe 324 scvhost.exe 1788 scvhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 360 wrote to memory of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 360 wrote to memory of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 360 wrote to memory of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 360 wrote to memory of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 360 wrote to memory of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 360 wrote to memory of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 360 wrote to memory of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 360 wrote to memory of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 360 wrote to memory of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 360 wrote to memory of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 360 wrote to memory of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 360 wrote to memory of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 360 wrote to memory of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 360 wrote to memory of 1732 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 27 PID 360 wrote to memory of 1368 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 28 PID 360 wrote to memory of 1368 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 28 PID 360 wrote to memory of 1368 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 28 PID 360 wrote to memory of 1368 360 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 28 PID 1732 wrote to memory of 2028 1732 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 29 PID 1732 wrote to memory of 2028 1732 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 29 PID 1732 wrote to memory of 2028 1732 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 29 PID 1732 wrote to memory of 2028 1732 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 29 PID 1732 wrote to memory of 1268 1732 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 15 PID 1732 wrote to memory of 1268 1732 9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe 15 PID 2028 wrote to memory of 900 2028 scvhost.exe 30 PID 2028 wrote to memory of 900 2028 scvhost.exe 30 PID 2028 wrote to memory of 900 2028 scvhost.exe 30 PID 2028 wrote to memory of 900 2028 scvhost.exe 30 PID 2028 wrote to memory of 900 2028 scvhost.exe 30 PID 2028 wrote to memory of 900 2028 scvhost.exe 30 PID 2028 wrote to memory of 900 2028 scvhost.exe 30 PID 2028 wrote to memory of 900 2028 scvhost.exe 30 PID 2028 wrote to memory of 900 2028 scvhost.exe 30 PID 2028 wrote to memory of 900 2028 scvhost.exe 30 PID 2028 wrote to memory of 900 2028 scvhost.exe 30 PID 2028 wrote to memory of 900 2028 scvhost.exe 30 PID 2028 wrote to memory of 900 2028 scvhost.exe 30 PID 2028 wrote to memory of 900 2028 scvhost.exe 30 PID 2028 wrote to memory of 524 2028 scvhost.exe 31 PID 2028 wrote to memory of 524 2028 scvhost.exe 31 PID 2028 wrote to memory of 524 2028 scvhost.exe 31 PID 2028 wrote to memory of 524 2028 scvhost.exe 31 PID 900 wrote to memory of 324 900 scvhost.exe 32 PID 900 wrote to memory of 324 900 scvhost.exe 32 PID 900 wrote to memory of 324 900 scvhost.exe 32 PID 900 wrote to memory of 324 900 scvhost.exe 32 PID 900 wrote to memory of 1268 900 scvhost.exe 15 PID 900 wrote to memory of 1268 900 scvhost.exe 15 PID 324 wrote to memory of 1688 324 scvhost.exe 33 PID 324 wrote to memory of 1688 324 scvhost.exe 33 PID 324 wrote to memory of 1688 324 scvhost.exe 33 PID 324 wrote to memory of 1688 324 scvhost.exe 33 PID 324 wrote to memory of 1688 324 scvhost.exe 33 PID 324 wrote to memory of 1688 324 scvhost.exe 33 PID 324 wrote to memory of 1688 324 scvhost.exe 33 PID 324 wrote to memory of 1688 324 scvhost.exe 33 PID 324 wrote to memory of 1688 324 scvhost.exe 33 PID 324 wrote to memory of 1688 324 scvhost.exe 33 PID 324 wrote to memory of 1688 324 scvhost.exe 33 PID 324 wrote to memory of 1688 324 scvhost.exe 33 PID 324 wrote to memory of 1688 324 scvhost.exe 33 PID 324 wrote to memory of 1688 324 scvhost.exe 33 PID 324 wrote to memory of 580 324 scvhost.exe 34 PID 324 wrote to memory of 580 324 scvhost.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe"C:\Users\Admin\AppData\Local\Temp\9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Local\Temp\9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exeC:\Users\Admin\AppData\Local\Temp\9c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\install\scvhost.exe"C:\Windows\system32\install\scvhost.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\install\scvhost.exeC:\Windows\SysWOW64\install\scvhost.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Roaming\install\scvhost.exe"C:\Users\Admin\AppData\Roaming\install\scvhost.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Roaming\install\scvhost.exeC:\Users\Admin\AppData\Roaming\install\scvhost.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1688 -
C:\Users\Admin\AppData\Roaming\install\scvhost.exe"C:\Users\Admin\AppData\Roaming\install\scvhost.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:572 -
C:\Users\Admin\AppData\Roaming\install\scvhost.exe"C:\Users\Admin\AppData\Roaming\install\scvhost.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Users\Admin\AppData\Roaming\install\scvhost.exeC:\Users\Admin\AppData\Roaming\install\scvhost.exe9⤵
- Executes dropped EXE
PID:1280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 1929⤵
- Loads dropped DLL
- Program crash
PID:1748
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 324 -s 1926⤵
- Loads dropped DLL
- Program crash
PID:580
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 1924⤵
- Loads dropped DLL
- Program crash
PID:524
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 360 -s 1922⤵
- Program crash
PID:1368
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD56c9dd0547d7ac7e3e536f5269b61a191
SHA13cfa328a99216a4d67ebb6d5b9f855d3ee8d56ae
SHA25647ee43a404306a47007ea807db25778abedd583de4afd5a9e43c7a51ba649b6f
SHA5128b0d59328137d13b8e27712dc877390c0e49f11c03b5fcca0569a86870b8263b8b4f4eddd00fe64c33aab1eb74ed54301577579469ed92d2be43760944e20acb
-
Filesize
229KB
MD56c9dd0547d7ac7e3e536f5269b61a191
SHA13cfa328a99216a4d67ebb6d5b9f855d3ee8d56ae
SHA25647ee43a404306a47007ea807db25778abedd583de4afd5a9e43c7a51ba649b6f
SHA5128b0d59328137d13b8e27712dc877390c0e49f11c03b5fcca0569a86870b8263b8b4f4eddd00fe64c33aab1eb74ed54301577579469ed92d2be43760944e20acb
-
Filesize
229KB
MD598d2fd8b7f40bdcacdd21750281e4ff4
SHA15da92559844bfe5a892bb5b8e679261bc41f2f42
SHA2567f771f4c7930cdd7d934277e3443cbd4ef5682ea14b66a0b3258827e2f0d5b1f
SHA51210a98f0ce12f235d08c2750da3ea4b6eb0dde3aca0461f86efc3afdb74a695db52ff10827320d52254f9b01bd54c9e6c8cad4c90a58f67d368d4c0bb14d84e62
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24
-
Filesize
343KB
MD5e8ac8ca01148a773063961cf2c1e6423
SHA13317b5649378945e97bdbb56b5aa8c2fb5e5e8bc
SHA2569c71ac7dfac6163d915f32745c594fab62e52f358225ff9c2f00e42df691c646
SHA5120650294851f964d512942f684a5ab6f9a34707bac7aa5749385b1fe6f03831bc88416fd65cf27ed2fb9824756210cc7f7436dc15ebb2728bdccd6adb3fc9fd24