Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe
Resource
win10v2004-20220901-en
General
-
Target
dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe
-
Size
444KB
-
MD5
d7084520b7f22772ecc0f67883cffe45
-
SHA1
52a5c68cda267ace9951431e5b85ef6e2a7e5574
-
SHA256
dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5
-
SHA512
a4c209870a11dd3312928765dbfc683587632ca2062f7b58fcb651ba4013d72f38f0c15cb924bb15fef7a3e22fc97769ec2ccd9ca0d25373cc670c9e47608b19
-
SSDEEP
12288:lu1mcjCfQ/Rz/xbTj7poqeLjz9+f8ldbyd8bN20rvtsRgc:81mbfgV/xPj7poqeLX98obyd8bc07twr
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 23 2256 rundll32.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts bf14a.exe -
Executes dropped EXE 3 IoCs
pid Process 1648 bf14a.exe 4460 bf14a.exe 788 bf14a.exe -
Loads dropped DLL 25 IoCs
pid Process 2736 regsvr32.exe 2256 rundll32.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe 788 bf14a.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48} regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification \??\PhysicalDrive0 bf14a.exe File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dfhry bf14a.exe File opened for modification C:\Windows\SysWOW64\rerwet bf14a.exe File opened for modification C:\Windows\SysWOW64\f61.dll dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\SysWOW64\4bfa.dlltmp dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\SysWOW64\fghjs bf14a.exe File opened for modification C:\Windows\SysWOW64\4bfa.dll bf14a.exe File opened for modification C:\Windows\SysWOW64\bf14a.exe dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\SysWOW64\f14ba.dll dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\SysWOW64\df45 bf14a.exe File created C:\Windows\SysWOW64\10611810-5 rundll32.exe File opened for modification C:\Windows\SysWOW64\ dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\SysWOW64\f1971.exe dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\SysWOW64\6f11.dlltmp dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\SysWOW64\4bfa.dll dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File created C:\Windows\SysWOW64\0343 rundll32.exe File opened for modification C:\Windows\SysWOW64\6f11.dll dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\SysWOW64\197c1.dll dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\SysWOW64\34a.dll dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\SysWOW64\wertt bf14a.exe File opened for modification C:\Windows\SysWOW64\dfhw bf14a.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\a8a.bmp dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\8f6a.exe dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\3fd941.rm dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\191.bmp dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\9631.exe dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\63fd1.txt dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\f6f1a.txt dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\6f197a.rm dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe File opened for modification C:\Windows\ dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe -
Modifies registry class 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48}\TypeLib\ = "{E9CED986-4E7C-45de-AD4C-CF04018D1677}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9CED986-4E7C-45DE-AD4C-CF04018D1677}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{059485BC-C1F5-4483-B91C-9F933B8B9B98}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHpr.Invoke.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHpr.Invoke.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHpr.Invoke\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHpr.Invoke\CLSID\ = "{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHpr.Invoke\CurVer\ = "IEHpr.Invoke.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9CED986-4E7C-45DE-AD4C-CF04018D1677}\1.0\ = "Flash ocx 2.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{059485BC-C1F5-4483-B91C-9F933B8B9B98}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{059485BC-C1F5-4483-B91C-9F933B8B9B98}\TypeLib\ = "{E9CED986-4E7C-45DE-AD4C-CF04018D1677}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{059485BC-C1F5-4483-B91C-9F933B8B9B98}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHpr.Invoke.1\CLSID\ = "{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHpr.Invoke\ = "Invoke Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHpr.Invoke\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48}\ = "Invoke Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48}\ProgID\ = "IEHpr.Invoke.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9CED986-4E7C-45DE-AD4C-CF04018D1677}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9CED986-4E7C-45DE-AD4C-CF04018D1677}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{059485BC-C1F5-4483-B91C-9F933B8B9B98}\ = "IInvoke" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{059485BC-C1F5-4483-B91C-9F933B8B9B98}\ = "IInvoke" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHpr.Invoke regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48}\VersionIndependentProgID\ = "IEHpr.Invoke" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{059485BC-C1F5-4483-B91C-9F933B8B9B98}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{059485BC-C1F5-4483-B91C-9F933B8B9B98}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{059485BC-C1F5-4483-B91C-9F933B8B9B98}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9CED986-4E7C-45DE-AD4C-CF04018D1677}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9CED986-4E7C-45DE-AD4C-CF04018D1677}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\4bfa.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{059485BC-C1F5-4483-B91C-9F933B8B9B98} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9CED986-4E7C-45DE-AD4C-CF04018D1677} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9CED986-4E7C-45DE-AD4C-CF04018D1677}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9CED986-4E7C-45DE-AD4C-CF04018D1677}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9CED986-4E7C-45DE-AD4C-CF04018D1677}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{059485BC-C1F5-4483-B91C-9F933B8B9B98} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{059485BC-C1F5-4483-B91C-9F933B8B9B98}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{059485BC-C1F5-4483-B91C-9F933B8B9B98}\TypeLib\ = "{E9CED986-4E7C-45DE-AD4C-CF04018D1677}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHpr.Invoke.1\ = "Invoke Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48}\InprocServer32\ = "C:\\Windows\\SysWow64\\4bfa.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4CCE8DD5-ECED-4c90-ADB4-C19A50F50D48}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{059485BC-C1F5-4483-B91C-9F933B8B9B98}\TypeLib regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4104 wrote to memory of 4860 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 80 PID 4104 wrote to memory of 4860 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 80 PID 4104 wrote to memory of 4860 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 80 PID 4104 wrote to memory of 4824 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 81 PID 4104 wrote to memory of 4824 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 81 PID 4104 wrote to memory of 4824 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 81 PID 4104 wrote to memory of 1648 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 82 PID 4104 wrote to memory of 1648 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 82 PID 4104 wrote to memory of 1648 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 82 PID 4104 wrote to memory of 4460 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 84 PID 4104 wrote to memory of 4460 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 84 PID 4104 wrote to memory of 4460 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 84 PID 788 wrote to memory of 2736 788 bf14a.exe 87 PID 788 wrote to memory of 2736 788 bf14a.exe 87 PID 788 wrote to memory of 2736 788 bf14a.exe 87 PID 4104 wrote to memory of 2256 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 88 PID 4104 wrote to memory of 2256 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 88 PID 4104 wrote to memory of 2256 4104 dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe"C:\Users\Admin\AppData\Local\Temp\dff0d2f66e14a867f7c97652e86dd5bc02f72b2171db5fd819b768f276127fa5.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\6f11.dll"2⤵PID:4860
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4bfa.dll"2⤵PID:4824
-
-
C:\Windows\SysWOW64\bf14a.exeC:\Windows\system32\bf14a.exe -i2⤵
- Executes dropped EXE
PID:1648
-
-
C:\Windows\SysWOW64\bf14a.exeC:\Windows\system32\bf14a.exe -s2⤵
- Executes dropped EXE
PID:4460
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\34a.dll,Always2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2256
-
-
C:\Windows\SysWOW64\bf14a.exeC:\Windows\SysWOW64\bf14a.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\4bfa.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2736
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
844KB
MD527c0b312f7f749916b230275415c6f34
SHA12c4c4953a47e983f83e903d282b9d420d3ecb1da
SHA256c0627acd5ad54eca180944d4ce99e54bf01b34cd0066dd99b26489f96b20d5cd
SHA512515fe32a555ae4817f1277b7a5c03f260ccf9305eb861f470bd309eb060cdcf71fa072d41827c86e6e0c191ed479c73ac41dd677ce51b1cdea283a20afefb186
-
Filesize
844KB
MD527c0b312f7f749916b230275415c6f34
SHA12c4c4953a47e983f83e903d282b9d420d3ecb1da
SHA256c0627acd5ad54eca180944d4ce99e54bf01b34cd0066dd99b26489f96b20d5cd
SHA512515fe32a555ae4817f1277b7a5c03f260ccf9305eb861f470bd309eb060cdcf71fa072d41827c86e6e0c191ed479c73ac41dd677ce51b1cdea283a20afefb186
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
52KB
MD5f187e0d2f96ffb8e8e8fd3a31d237e58
SHA1de8abf844060840e58a426d0c3cfab39b6915d90
SHA256860a03c78eb08eb79eb527f974dd74c792ba83e276bc3fba65fb8c19e2120450
SHA51220bbd15ed8d52aad7be0da3ad8222617604e3f379dd29ee97472543fa9b600a3e82a9ecb925a9b1d2b4ebd645a3eb182b90f1c3fb6efd8886bf19ce426426823
-
Filesize
108KB
MD513058312d7aafccb09e3a6c3008a37a9
SHA10532cf41b58752160ff59d96ee7b3e9926630f33
SHA256bcaa732b79e1270564b6a5e592c438dc3f2152a774f66d13e8b2f370cddb988d
SHA512cfaba2a7dfccdd5cbd87c416a6c65b66f6328be49beb789f5453985ea36c75b99a707e3a4c5479d3b99abcecd43abaeabe8f58a290f64432deccb17bb4600ae0
-
Filesize
108KB
MD513058312d7aafccb09e3a6c3008a37a9
SHA10532cf41b58752160ff59d96ee7b3e9926630f33
SHA256bcaa732b79e1270564b6a5e592c438dc3f2152a774f66d13e8b2f370cddb988d
SHA512cfaba2a7dfccdd5cbd87c416a6c65b66f6328be49beb789f5453985ea36c75b99a707e3a4c5479d3b99abcecd43abaeabe8f58a290f64432deccb17bb4600ae0
-
Filesize
108KB
MD513058312d7aafccb09e3a6c3008a37a9
SHA10532cf41b58752160ff59d96ee7b3e9926630f33
SHA256bcaa732b79e1270564b6a5e592c438dc3f2152a774f66d13e8b2f370cddb988d
SHA512cfaba2a7dfccdd5cbd87c416a6c65b66f6328be49beb789f5453985ea36c75b99a707e3a4c5479d3b99abcecd43abaeabe8f58a290f64432deccb17bb4600ae0
-
Filesize
108KB
MD513058312d7aafccb09e3a6c3008a37a9
SHA10532cf41b58752160ff59d96ee7b3e9926630f33
SHA256bcaa732b79e1270564b6a5e592c438dc3f2152a774f66d13e8b2f370cddb988d
SHA512cfaba2a7dfccdd5cbd87c416a6c65b66f6328be49beb789f5453985ea36c75b99a707e3a4c5479d3b99abcecd43abaeabe8f58a290f64432deccb17bb4600ae0