Analysis
-
max time kernel
187s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
ba963ac550f2ba20912f3ac63abd02cb5115dc3c4bb688b992839484362f7289.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba963ac550f2ba20912f3ac63abd02cb5115dc3c4bb688b992839484362f7289.exe
Resource
win10v2004-20221111-en
General
-
Target
ba963ac550f2ba20912f3ac63abd02cb5115dc3c4bb688b992839484362f7289.exe
-
Size
741KB
-
MD5
d43183e2b83823fec7e3dd26aab6209f
-
SHA1
ceff5a52d48591414da89bc1ce86c46d0d162747
-
SHA256
ba963ac550f2ba20912f3ac63abd02cb5115dc3c4bb688b992839484362f7289
-
SHA512
23790e105a109dcd7bfc18b43c271e1b2b0818afc90f6d92f364ee6c800031b94dc56fa2e777d9d3fc79e7bf4b08ef1d73b51617f64953900d498049c5bb8132
-
SSDEEP
12288:Ww2vBhyUfYXcYrzQTwb+QThuSnV5SdNRvmg5mGF1Jl3uv+O71wUVcAyVBvXtb9VZ:WREUfYsY3AA/hJVUnReg883u7OKuVBvn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3208 smsk.exe -
resource yara_rule behavioral2/files/0x0009000000022dfb-135.dat upx behavioral2/files/0x0009000000022dfb-136.dat upx behavioral2/memory/3208-137-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/3208-164-0x0000000000400000-0x0000000000444000-memory.dmp upx -
Loads dropped DLL 16 IoCs
pid Process 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 smsk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total smsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" smsk.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.hcp8123.com smsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" smsk.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch smsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" smsk.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\hcp8123.com smsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.hcp8123.com\ = "126" smsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" smsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" smsk.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\IESettingSync smsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" smsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\hcp8123.com\NumberOfSubdomains = "1" smsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.hcp8123.com\ = "63" smsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\hcp8123.com\Total = "126" smsk.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\International\CpMRU smsk.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DOMStorage\hcp8123.com smsk.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage smsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\hcp8123.com\Total = "63" smsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" smsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" smsk.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 684 msedge.exe 684 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3900 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe 3208 smsk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 3208 2392 ba963ac550f2ba20912f3ac63abd02cb5115dc3c4bb688b992839484362f7289.exe 82 PID 2392 wrote to memory of 3208 2392 ba963ac550f2ba20912f3ac63abd02cb5115dc3c4bb688b992839484362f7289.exe 82 PID 2392 wrote to memory of 3208 2392 ba963ac550f2ba20912f3ac63abd02cb5115dc3c4bb688b992839484362f7289.exe 82 PID 3208 wrote to memory of 3900 3208 smsk.exe 89 PID 3208 wrote to memory of 3900 3208 smsk.exe 89 PID 3900 wrote to memory of 3912 3900 msedge.exe 90 PID 3900 wrote to memory of 3912 3900 msedge.exe 90 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 3760 3900 msedge.exe 94 PID 3900 wrote to memory of 684 3900 msedge.exe 95 PID 3900 wrote to memory of 684 3900 msedge.exe 95 PID 3900 wrote to memory of 5000 3900 msedge.exe 96 PID 3900 wrote to memory of 5000 3900 msedge.exe 96 PID 3900 wrote to memory of 5000 3900 msedge.exe 96 PID 3900 wrote to memory of 5000 3900 msedge.exe 96 PID 3900 wrote to memory of 5000 3900 msedge.exe 96 PID 3900 wrote to memory of 5000 3900 msedge.exe 96 PID 3900 wrote to memory of 5000 3900 msedge.exe 96 PID 3900 wrote to memory of 5000 3900 msedge.exe 96 PID 3900 wrote to memory of 5000 3900 msedge.exe 96 PID 3900 wrote to memory of 5000 3900 msedge.exe 96 PID 3900 wrote to memory of 5000 3900 msedge.exe 96 PID 3900 wrote to memory of 5000 3900 msedge.exe 96 PID 3900 wrote to memory of 5000 3900 msedge.exe 96 PID 3900 wrote to memory of 5000 3900 msedge.exe 96 PID 3900 wrote to memory of 5000 3900 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba963ac550f2ba20912f3ac63abd02cb5115dc3c4bb688b992839484362f7289.exe"C:\Users\Admin\AppData\Local\Temp\ba963ac550f2ba20912f3ac63abd02cb5115dc3c4bb688b992839484362f7289.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\smsk.exeC:\Users\Admin\AppData\Local\Temp2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.baidu.com/s?wd=site%3Awww.smskb.com+%C1%D0%B3%B5%CA%B1%BF%CC%B1%ED&cl=33⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9f53e46f8,0x7ff9f53e4708,0x7ff9f53e47184⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1272,1130942969258112195,6566894214891345426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:24⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1272,1130942969258112195,6566894214891345426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1272,1130942969258112195,6566894214891345426,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3108 /prefetch:84⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1272,1130942969258112195,6566894214891345426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:14⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1272,1130942969258112195,6566894214891345426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:14⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1272,1130942969258112195,6566894214891345426,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5072 /prefetch:84⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1272,1130942969258112195,6566894214891345426,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:14⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1272,1130942969258112195,6566894214891345426,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:14⤵PID:3464
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3208 -ip 32081⤵PID:3100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59cae1bfb492310329724705e88fae4d0
SHA187c00b80337b9c83f82bb73e425233bf2535af10
SHA256f7e3bd589c6affe1eb98375c2113ad90880fb284236cccd4a2f38e3c44dc47c4
SHA512237d4dff3e7aa6c68653fdfedf0b325f4182045af8aee8ebcc46163a8112cee0f0a3c36e3408b769acfb08be6aee10d2d7d3f64a5503713bfb1972610ae423a6
-
Filesize
87KB
MD58ee412a7e143ce7ca450aeb0e89e03a6
SHA14b8fe0de8384c5a24923773c003a0834553019a6
SHA256959ccf3f8f42ba522d8a61dfb6e1021cf57f9ac63269c11ce8ccbe1e49d3c5bc
SHA512a5717f2de335e307f476eae8d2845f88c29d710580bf62f0b8b1a49bf885b0969d7fb832ac45c890ed8ca809fb2385bdad20fdd6f881414d110a57778fae5c51
-
Filesize
87KB
MD58ee412a7e143ce7ca450aeb0e89e03a6
SHA14b8fe0de8384c5a24923773c003a0834553019a6
SHA256959ccf3f8f42ba522d8a61dfb6e1021cf57f9ac63269c11ce8ccbe1e49d3c5bc
SHA512a5717f2de335e307f476eae8d2845f88c29d710580bf62f0b8b1a49bf885b0969d7fb832ac45c890ed8ca809fb2385bdad20fdd6f881414d110a57778fae5c51
-
Filesize
64B
MD5445c04077e2e3146b0e8837ad8f38a54
SHA16a67f56d525374132595719fe34afb92162e9ea3
SHA256ade8d4dbe7875d8049d39af6a51a6cbf6a9755cf721e33a5647cec60d4474b5d
SHA512fb0fca3539a4f021c3a867591e2e45aec4b7439e95243b6c499e85113bedba7a4ed9c5a7ff32b32701b3fbdc646e9de02fc58891ad30ed424c2fe75afdc495c3
-
Filesize
2.0MB
MD5e375dd10dd39bb18300a7178182a5130
SHA1d5dd978279e403aec12deeccfd470b1f6050cfac
SHA256ece9218bae1fa5d36ba77fc6c513ac2e2ee44c51e2ff3415e66021b770cae595
SHA5125b9c5a8f10c2f1652724bd61fd3a8e4275e805963d9eefb407c0df996f554fbc87ceffefb21612cc3a38b0a8084634f439df5862699e86effd396fe5f4b8c2cb
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117
-
Filesize
29KB
MD51fd2809aca394800be23e4eab35b2035
SHA192c03cbeb417fb4329aeda3470e15bbb06a4f99e
SHA2561e3e9f7ac74cb01cc5ff82995c879a3906fe0c2c2bd21467c4b48a2687638578
SHA5123559702b852df650f439963e1848a8feeb149770a6c08cf97700d43b51b32236a65f48ca1c47868b466bafa119492a19d32ac4d13b8df40414d8981284581117