Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
26-11-2023 00:22
Static task
static1
Behavioral task
behavioral1
Sample
28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1.exe
Resource
win7-20231025-en
General
-
Target
28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1.exe
-
Size
433KB
-
MD5
629b605a97b640510e44fb5f8bb34062
-
SHA1
11b19b857e38b89ab6c8f3317f2621f6bd6084f9
-
SHA256
28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1
-
SHA512
a3a12a009968f24856a8630f3d60c801c18a87dee977dbef43295412e59c0b945091c62c2ccebe9ed9726ba5ee1738f8751a17e679e372472d5c400071264e75
-
SSDEEP
6144:3rjeCoWsacXOgBSinpyVlPqTKEnU0NPBAiOXATu2ApYftcksd+:3rjuacXOmSip+PqTK/0LCA3BtfO+
Malware Config
Extracted
amadey
http://arrunda.ru
http://soetegem.com
http://tceducn.com
-
strings_key
eb714cabd2548b4a03c45f723f838bdc
-
url_paths
/forum/index.php
Extracted
amadey
4.11
http://shohetrc.com
http://sibcomputer.ru
http://tve-mail.com
-
install_dir
d4dd819322
-
install_file
Utsysc.exe
-
strings_key
8419b3024d6f72beef8af6915e592308
-
url_paths
/forum/index.php
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
rundll32.exerundll32.exerundll32.exeflow pid process 17 1244 rundll32.exe 19 1244 rundll32.exe 22 2968 rundll32.exe 23 2968 rundll32.exe 26 2452 rundll32.exe 27 2452 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
Utsysc.exeUtsysc.exeUtsysc.exeUtsysc.exepid process 1344 Utsysc.exe 2560 Utsysc.exe 2320 Utsysc.exe 888 Utsysc.exe -
Loads dropped DLL 44 IoCs
Processes:
28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1.exerundll32.exerundll32.exeWerFault.exerundll32.exerundll32.exeWerFault.exerundll32.exerundll32.exeWerFault.exerundll32.exerundll32.exerundll32.exepid process 2936 28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1.exe 2936 28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1.exe 1688 rundll32.exe 1688 rundll32.exe 1688 rundll32.exe 1688 rundll32.exe 2240 rundll32.exe 2240 rundll32.exe 2240 rundll32.exe 2240 rundll32.exe 2008 WerFault.exe 2008 WerFault.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 528 rundll32.exe 528 rundll32.exe 528 rundll32.exe 528 rundll32.exe 2412 WerFault.exe 2412 WerFault.exe 1544 rundll32.exe 1544 rundll32.exe 1544 rundll32.exe 1544 rundll32.exe 476 rundll32.exe 476 rundll32.exe 476 rundll32.exe 476 rundll32.exe 2592 WerFault.exe 2592 WerFault.exe 1244 rundll32.exe 1244 rundll32.exe 1244 rundll32.exe 1244 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1.exepid process 2936 28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1.exeUtsysc.exetaskeng.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exedescription pid process target process PID 2936 wrote to memory of 1344 2936 28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1.exe Utsysc.exe PID 2936 wrote to memory of 1344 2936 28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1.exe Utsysc.exe PID 2936 wrote to memory of 1344 2936 28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1.exe Utsysc.exe PID 2936 wrote to memory of 1344 2936 28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1.exe Utsysc.exe PID 1344 wrote to memory of 2692 1344 Utsysc.exe schtasks.exe PID 1344 wrote to memory of 2692 1344 Utsysc.exe schtasks.exe PID 1344 wrote to memory of 2692 1344 Utsysc.exe schtasks.exe PID 1344 wrote to memory of 2692 1344 Utsysc.exe schtasks.exe PID 2496 wrote to memory of 2560 2496 taskeng.exe Utsysc.exe PID 2496 wrote to memory of 2560 2496 taskeng.exe Utsysc.exe PID 2496 wrote to memory of 2560 2496 taskeng.exe Utsysc.exe PID 2496 wrote to memory of 2560 2496 taskeng.exe Utsysc.exe PID 1344 wrote to memory of 1688 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1688 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1688 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1688 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1688 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1688 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1688 1344 Utsysc.exe rundll32.exe PID 1688 wrote to memory of 2240 1688 rundll32.exe rundll32.exe PID 1688 wrote to memory of 2240 1688 rundll32.exe rundll32.exe PID 1688 wrote to memory of 2240 1688 rundll32.exe rundll32.exe PID 1688 wrote to memory of 2240 1688 rundll32.exe rundll32.exe PID 2240 wrote to memory of 2008 2240 rundll32.exe WerFault.exe PID 2240 wrote to memory of 2008 2240 rundll32.exe WerFault.exe PID 2240 wrote to memory of 2008 2240 rundll32.exe WerFault.exe PID 1344 wrote to memory of 376 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 376 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 376 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 376 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 376 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 376 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 376 1344 Utsysc.exe rundll32.exe PID 376 wrote to memory of 528 376 rundll32.exe rundll32.exe PID 376 wrote to memory of 528 376 rundll32.exe rundll32.exe PID 376 wrote to memory of 528 376 rundll32.exe rundll32.exe PID 376 wrote to memory of 528 376 rundll32.exe rundll32.exe PID 528 wrote to memory of 2412 528 rundll32.exe WerFault.exe PID 528 wrote to memory of 2412 528 rundll32.exe WerFault.exe PID 528 wrote to memory of 2412 528 rundll32.exe WerFault.exe PID 1344 wrote to memory of 1544 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1544 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1544 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1544 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1544 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1544 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1544 1344 Utsysc.exe rundll32.exe PID 1544 wrote to memory of 476 1544 rundll32.exe rundll32.exe PID 1544 wrote to memory of 476 1544 rundll32.exe rundll32.exe PID 1544 wrote to memory of 476 1544 rundll32.exe rundll32.exe PID 1544 wrote to memory of 476 1544 rundll32.exe rundll32.exe PID 476 wrote to memory of 2592 476 rundll32.exe WerFault.exe PID 476 wrote to memory of 2592 476 rundll32.exe WerFault.exe PID 476 wrote to memory of 2592 476 rundll32.exe WerFault.exe PID 1344 wrote to memory of 1244 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1244 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1244 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1244 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1244 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1244 1344 Utsysc.exe rundll32.exe PID 1344 wrote to memory of 1244 1344 Utsysc.exe rundll32.exe PID 2496 wrote to memory of 2320 2496 taskeng.exe Utsysc.exe PID 2496 wrote to memory of 2320 2496 taskeng.exe Utsysc.exe PID 2496 wrote to memory of 2320 2496 taskeng.exe Utsysc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1.exe"C:\Users\Admin\AppData\Local\Temp\28aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2692 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2240 -s 3125⤵
- Loads dropped DLL
PID:2008 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 476 -s 3125⤵
- Loads dropped DLL
PID:2592 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1244 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2968 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2452
-
C:\Windows\system32\taskeng.exetaskeng.exe {9650821B-19BC-45A4-BA2E-664795D8F7A1} S-1-5-21-1861898231-3446828954-4278112889-1000:PTZSFKIF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:888
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 528 -s 3121⤵
- Loads dropped DLL
PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD555f4ed1d7891b0a31a5c1a17670b34c4
SHA1a21869444d1fa9fe08cfda811b8ef4bef315f543
SHA2564455e153f491d9969d3d1013b63e0c5ccbd1c690c87094cfee721bec47725d6d
SHA51257e4c1983b492273d7eb242672e94cfb8eb0b610ffd08a8448aae8704b86edb92fb25ddcea569fa56ad5f24b060849a00e398f4e66531aa648a9045ce7214843
-
Filesize
433KB
MD5629b605a97b640510e44fb5f8bb34062
SHA111b19b857e38b89ab6c8f3317f2621f6bd6084f9
SHA25628aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1
SHA512a3a12a009968f24856a8630f3d60c801c18a87dee977dbef43295412e59c0b945091c62c2ccebe9ed9726ba5ee1738f8751a17e679e372472d5c400071264e75
-
Filesize
433KB
MD5629b605a97b640510e44fb5f8bb34062
SHA111b19b857e38b89ab6c8f3317f2621f6bd6084f9
SHA25628aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1
SHA512a3a12a009968f24856a8630f3d60c801c18a87dee977dbef43295412e59c0b945091c62c2ccebe9ed9726ba5ee1738f8751a17e679e372472d5c400071264e75
-
Filesize
433KB
MD5629b605a97b640510e44fb5f8bb34062
SHA111b19b857e38b89ab6c8f3317f2621f6bd6084f9
SHA25628aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1
SHA512a3a12a009968f24856a8630f3d60c801c18a87dee977dbef43295412e59c0b945091c62c2ccebe9ed9726ba5ee1738f8751a17e679e372472d5c400071264e75
-
Filesize
433KB
MD5629b605a97b640510e44fb5f8bb34062
SHA111b19b857e38b89ab6c8f3317f2621f6bd6084f9
SHA25628aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1
SHA512a3a12a009968f24856a8630f3d60c801c18a87dee977dbef43295412e59c0b945091c62c2ccebe9ed9726ba5ee1738f8751a17e679e372472d5c400071264e75
-
Filesize
433KB
MD5629b605a97b640510e44fb5f8bb34062
SHA111b19b857e38b89ab6c8f3317f2621f6bd6084f9
SHA25628aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1
SHA512a3a12a009968f24856a8630f3d60c801c18a87dee977dbef43295412e59c0b945091c62c2ccebe9ed9726ba5ee1738f8751a17e679e372472d5c400071264e75
-
Filesize
433KB
MD5629b605a97b640510e44fb5f8bb34062
SHA111b19b857e38b89ab6c8f3317f2621f6bd6084f9
SHA25628aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1
SHA512a3a12a009968f24856a8630f3d60c801c18a87dee977dbef43295412e59c0b945091c62c2ccebe9ed9726ba5ee1738f8751a17e679e372472d5c400071264e75
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
433KB
MD5629b605a97b640510e44fb5f8bb34062
SHA111b19b857e38b89ab6c8f3317f2621f6bd6084f9
SHA25628aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1
SHA512a3a12a009968f24856a8630f3d60c801c18a87dee977dbef43295412e59c0b945091c62c2ccebe9ed9726ba5ee1738f8751a17e679e372472d5c400071264e75
-
Filesize
433KB
MD5629b605a97b640510e44fb5f8bb34062
SHA111b19b857e38b89ab6c8f3317f2621f6bd6084f9
SHA25628aca0fd2c1f0d03572e8b9b7f485b6da57dd164112065c040f46147df4465d1
SHA512a3a12a009968f24856a8630f3d60c801c18a87dee977dbef43295412e59c0b945091c62c2ccebe9ed9726ba5ee1738f8751a17e679e372472d5c400071264e75
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63