Analysis
-
max time kernel
158s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-07-2022 08:22
Static task
static1
Behavioral task
behavioral1
Sample
3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe
Resource
win7-20220414-en
General
-
Target
3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe
-
Size
4.8MB
-
MD5
aa631cb4aa034b7ab6898b238fd14afe
-
SHA1
2b3aab346fa40df68e3ccd7bd50d7fb1c0ac4c14
-
SHA256
3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f
-
SHA512
2205a82bd3e3d2438d5f78432eba0d9bc7fe281307594e41a14e8a514ce26242762207374c8591238d1d67c7fe6625cb6fc18b6b40cf36be8be9ca01cba077b0
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 548 drv_install(x86).exe 1492 xpsrchv.exe 4712 xpsrchv.exe 3424 xpsrchv.exe 1200 xpsrchv.exe 1432 WUDLicense.exe 4384 WUDLicense.exe 1156 WUDLicense.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4044 attrib.exe -
Stops running service(s) 3 TTPs
-
resource yara_rule behavioral2/files/0x0006000000022e1c-146.dat upx behavioral2/files/0x0006000000022e1c-147.dat upx behavioral2/memory/1492-148-0x0000000000400000-0x0000000000AAA000-memory.dmp upx behavioral2/memory/1492-149-0x0000000000400000-0x0000000000AAA000-memory.dmp upx behavioral2/files/0x0006000000022e1c-151.dat upx behavioral2/memory/4712-152-0x0000000000400000-0x0000000000AAA000-memory.dmp upx behavioral2/memory/4712-153-0x0000000000400000-0x0000000000AAA000-memory.dmp upx behavioral2/files/0x0006000000022e1c-159.dat upx behavioral2/files/0x0006000000022e1c-160.dat upx behavioral2/memory/3424-161-0x0000000000400000-0x0000000000AAA000-memory.dmp upx behavioral2/memory/1200-162-0x0000000000400000-0x0000000000AAA000-memory.dmp upx behavioral2/files/0x0006000000022e1b-169.dat upx behavioral2/files/0x0006000000022e1b-172.dat upx behavioral2/files/0x0006000000022e1b-173.dat upx behavioral2/memory/3424-174-0x0000000000400000-0x0000000000AAA000-memory.dmp upx behavioral2/memory/1432-175-0x0000000000400000-0x00000000009BD000-memory.dmp upx behavioral2/memory/4384-176-0x0000000000400000-0x00000000009BD000-memory.dmp upx behavioral2/files/0x0006000000022e1b-178.dat upx behavioral2/memory/1156-179-0x0000000000400000-0x00000000009BD000-memory.dmp upx behavioral2/memory/1200-180-0x0000000000400000-0x0000000000AAA000-memory.dmp upx behavioral2/memory/1432-181-0x0000000000400000-0x00000000009BD000-memory.dmp upx behavioral2/memory/4384-182-0x0000000000400000-0x00000000009BD000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation drv_install(x86).exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\symbols\exe\xpsrchv.pdb xpsrchv.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{B1E6668C-7013-4136-ACFB-06120FE1DC72}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{615A80BD-5467-4C10-A0B5-139AAC4AAB8E}.catalogItem svchost.exe File opened for modification C:\Windows\SysWOW64\xpsrchv.pdb xpsrchv.exe File opened for modification C:\Windows\SysWOW64\exe\xpsrchv.pdb xpsrchv.exe -
Drops file in Windows directory 28 IoCs
description ioc Process File opened for modification C:\Windows\ehome\ASCON 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File opened for modification C:\Windows\ehome\ASCON\vp8encoder.dll 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File opened for modification C:\Windows\ehome\ASCON\drv_set.reg 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File created C:\Windows\ehome\ASCON\webmvorbisencoder.dll 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File created C:\Windows\ehome\ASCON\drv_set.reg 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File created C:\Windows\ehome\ASCON\vp8decoder.dll 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File opened for modification C:\Windows\ehome\ASCON attrib.exe File opened for modification C:\Windows\ehome\ASCON\webmvorbisdecoder.dll 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File opened for modification C:\Windows\ehome\ASCON\xpsrchv.pdb xpsrchv.exe File created C:\Windows\ehome\ASCON\SystemInstall.bat 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File opened for modification C:\Windows\ehome\ASCON\webmmux.dll 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File opened for modification C:\Windows\ehome 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File created C:\Windows\ehome\ASCON\Russian.lg 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File created C:\Windows\ehome\ASCON\WUDLicense.exe 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File created C:\Windows\ehome\ASCON\xpsrchv.exe 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File created C:\Windows\ehome\ASCON\drv_install(x86).exe 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File opened for modification C:\Windows\ehome\ASCON\drv_install(x86).exe 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File opened for modification C:\Windows\ehome\ASCON\SystemInstall.bat 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File opened for modification C:\Windows\ehome\ASCON\vp8decoder.dll 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File created C:\Windows\ehome\ASCON\webmvorbisdecoder.dll 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File opened for modification C:\Windows\ehome\ASCON\xpsrchv.exe 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File created C:\Windows\ehome\ASCON\SystemAPI.dat drv_install(x86).exe File created C:\Windows\ehome\ASCON\__tmp_rar_sfx_access_check_240567109 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File opened for modification C:\Windows\ehome\ASCON\Russian.lg 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File created C:\Windows\ehome\ASCON\vp8encoder.dll 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File created C:\Windows\ehome\ASCON\webmmux.dll 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File opened for modification C:\Windows\ehome\ASCON\webmvorbisencoder.dll 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe File opened for modification C:\Windows\ehome\ASCON\WUDLicense.exe 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1528 sc.exe 4452 sc.exe 2680 sc.exe 1924 sc.exe 4888 sc.exe 5048 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Kills process with taskkill 4 IoCs
pid Process 4060 taskkill.exe 5084 taskkill.exe 1172 taskkill.exe 4132 taskkill.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1720 regedit.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1492 xpsrchv.exe 1492 xpsrchv.exe 1492 xpsrchv.exe 1492 xpsrchv.exe 1492 xpsrchv.exe 1492 xpsrchv.exe 4712 xpsrchv.exe 4712 xpsrchv.exe 3424 xpsrchv.exe 3424 xpsrchv.exe 1200 xpsrchv.exe 1200 xpsrchv.exe 1200 xpsrchv.exe 1200 xpsrchv.exe 1200 xpsrchv.exe 1200 xpsrchv.exe 4384 WUDLicense.exe 4384 WUDLicense.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1156 WUDLicense.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4060 taskkill.exe Token: SeDebugPrivilege 5084 taskkill.exe Token: SeDebugPrivilege 1172 taskkill.exe Token: SeDebugPrivilege 4132 taskkill.exe Token: SeDebugPrivilege 1492 xpsrchv.exe Token: SeDebugPrivilege 3424 xpsrchv.exe Token: SeTakeOwnershipPrivilege 1200 xpsrchv.exe Token: SeTcbPrivilege 1200 xpsrchv.exe Token: SeTcbPrivilege 1200 xpsrchv.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1492 xpsrchv.exe 4712 xpsrchv.exe 3424 xpsrchv.exe 1200 xpsrchv.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4784 wrote to memory of 548 4784 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe 77 PID 4784 wrote to memory of 548 4784 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe 77 PID 4784 wrote to memory of 548 4784 3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe 77 PID 548 wrote to memory of 4508 548 drv_install(x86).exe 79 PID 548 wrote to memory of 4508 548 drv_install(x86).exe 79 PID 548 wrote to memory of 4508 548 drv_install(x86).exe 79 PID 4508 wrote to memory of 4044 4508 cmd.exe 81 PID 4508 wrote to memory of 4044 4508 cmd.exe 81 PID 4508 wrote to memory of 4044 4508 cmd.exe 81 PID 4508 wrote to memory of 5048 4508 cmd.exe 82 PID 4508 wrote to memory of 5048 4508 cmd.exe 82 PID 4508 wrote to memory of 5048 4508 cmd.exe 82 PID 4508 wrote to memory of 1528 4508 cmd.exe 83 PID 4508 wrote to memory of 1528 4508 cmd.exe 83 PID 4508 wrote to memory of 1528 4508 cmd.exe 83 PID 4508 wrote to memory of 4452 4508 cmd.exe 84 PID 4508 wrote to memory of 4452 4508 cmd.exe 84 PID 4508 wrote to memory of 4452 4508 cmd.exe 84 PID 4508 wrote to memory of 2680 4508 cmd.exe 85 PID 4508 wrote to memory of 2680 4508 cmd.exe 85 PID 4508 wrote to memory of 2680 4508 cmd.exe 85 PID 4508 wrote to memory of 4060 4508 cmd.exe 86 PID 4508 wrote to memory of 4060 4508 cmd.exe 86 PID 4508 wrote to memory of 4060 4508 cmd.exe 86 PID 4508 wrote to memory of 5084 4508 cmd.exe 88 PID 4508 wrote to memory of 5084 4508 cmd.exe 88 PID 4508 wrote to memory of 5084 4508 cmd.exe 88 PID 4508 wrote to memory of 1172 4508 cmd.exe 89 PID 4508 wrote to memory of 1172 4508 cmd.exe 89 PID 4508 wrote to memory of 1172 4508 cmd.exe 89 PID 4508 wrote to memory of 4132 4508 cmd.exe 90 PID 4508 wrote to memory of 4132 4508 cmd.exe 90 PID 4508 wrote to memory of 4132 4508 cmd.exe 90 PID 4508 wrote to memory of 4340 4508 cmd.exe 91 PID 4508 wrote to memory of 4340 4508 cmd.exe 91 PID 4508 wrote to memory of 4340 4508 cmd.exe 91 PID 4508 wrote to memory of 1492 4508 cmd.exe 92 PID 4508 wrote to memory of 1492 4508 cmd.exe 92 PID 4508 wrote to memory of 1492 4508 cmd.exe 92 PID 4508 wrote to memory of 4712 4508 cmd.exe 93 PID 4508 wrote to memory of 4712 4508 cmd.exe 93 PID 4508 wrote to memory of 4712 4508 cmd.exe 93 PID 4508 wrote to memory of 1720 4508 cmd.exe 94 PID 4508 wrote to memory of 1720 4508 cmd.exe 94 PID 4508 wrote to memory of 1720 4508 cmd.exe 94 PID 4508 wrote to memory of 1924 4508 cmd.exe 95 PID 4508 wrote to memory of 1924 4508 cmd.exe 95 PID 4508 wrote to memory of 1924 4508 cmd.exe 95 PID 4508 wrote to memory of 4888 4508 cmd.exe 96 PID 4508 wrote to memory of 4888 4508 cmd.exe 96 PID 4508 wrote to memory of 4888 4508 cmd.exe 96 PID 4508 wrote to memory of 3424 4508 cmd.exe 97 PID 4508 wrote to memory of 3424 4508 cmd.exe 97 PID 4508 wrote to memory of 3424 4508 cmd.exe 97 PID 1200 wrote to memory of 1432 1200 xpsrchv.exe 99 PID 1200 wrote to memory of 1432 1200 xpsrchv.exe 99 PID 1200 wrote to memory of 1432 1200 xpsrchv.exe 99 PID 1200 wrote to memory of 4384 1200 xpsrchv.exe 100 PID 1200 wrote to memory of 4384 1200 xpsrchv.exe 100 PID 1200 wrote to memory of 4384 1200 xpsrchv.exe 100 PID 4384 wrote to memory of 1156 4384 WUDLicense.exe 101 PID 4384 wrote to memory of 1156 4384 WUDLicense.exe 101 PID 4384 wrote to memory of 1156 4384 WUDLicense.exe 101 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4044 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe"C:\Users\Admin\AppData\Local\Temp\3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\ehome\ASCON\drv_install(x86).exe"C:\Windows\ehome\ASCON\drv_install(x86).exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\ehome\ASCON\SystemInstall.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Windows\ehome\ASCON"4⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:4044
-
-
C:\Windows\SysWOW64\sc.exesc stop AdobeReader4⤵
- Launches sc.exe
PID:5048
-
-
C:\Windows\SysWOW64\sc.exesc stop RManService4⤵
- Launches sc.exe
PID:1528
-
-
C:\Windows\SysWOW64\sc.exesc delete AdobeReader4⤵
- Launches sc.exe
PID:4452
-
-
C:\Windows\SysWOW64\sc.exesc delete RManService4⤵
- Launches sc.exe
PID:2680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im rfusclient.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im rutserv.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im WUDLicense.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im xpsrchv.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Hardware System\DeviceXPS" /f4⤵PID:4340
-
-
C:\Windows\ehome\ASCON\xpsrchv.exe"C:\Windows\ehome\ASCON\xpsrchv.exe" /silentinstall4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
C:\Windows\ehome\ASCON\xpsrchv.exe"C:\Windows\ehome\ASCON\xpsrchv.exe" /firewall4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4712
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\Windows\ehome\ASCON\drv_set.reg"4⤵
- Runs .reg file with regedit
PID:1720
-
-
C:\Windows\SysWOW64\sc.exesc failure WUDLicense reset= 0 actions= restart/1000/restart/1000/restart/10004⤵
- Launches sc.exe
PID:1924
-
-
C:\Windows\SysWOW64\sc.exesc config WUDLicense obj= LocalSystem type= interact type= own4⤵
- Launches sc.exe
PID:4888
-
-
C:\Windows\ehome\ASCON\xpsrchv.exe"C:\Windows\ehome\ASCON\xpsrchv.exe" /start4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3424
-
-
-
-
C:\Windows\ehome\ASCON\xpsrchv.exeC:\Windows\ehome\ASCON\xpsrchv.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\ehome\ASCON\WUDLicense.exeC:\Windows\ehome\ASCON\WUDLicense.exe /tray2⤵
- Executes dropped EXE
PID:1432
-
-
C:\Windows\ehome\ASCON\WUDLicense.exeC:\Windows\ehome\ASCON\WUDLicense.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\ehome\ASCON\WUDLicense.exeC:\Windows\ehome\ASCON\WUDLicense.exe /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1156
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:1236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5e44e34bc285b709f08f967325d9c8be1
SHA1e73f05c6a980ec9d006930c5343955f89579b409
SHA2561d99a7b5f7b3daa61fa773972b1e335aa09b92411484f6ddc99d2b2894455a5b
SHA512576b292b6e9cf022822443e050994462a6cbd9a3c60063bae9f54c78a84e75e17bb5eddf7e259a22a9d93f757cb6536c503762e2a30e75091e40c2756cde8727
-
Filesize
744B
MD5c7a1b5b843094dc26cc706be17653e9a
SHA18fcf9a42c1ea48557fce03c731c3e197303f407f
SHA256059c65efe42cc3e0d847157747d07f6d0ad2c32e7bf653e7325fb8531783b9c8
SHA5129598082cc3ad5836d1c7cbf3101405ac96adcd05abd58c4cdb3b59ed22fe0cdf228edf20b946ad5fa3dcaecf7d27f63f1da3d26e920a1810ff00da53bb5236d2
-
Filesize
1.5MB
MD564f12becc50082532cd14498bd496a76
SHA1a13356f88919f79fd5381eef3dd9e0b2d964a03e
SHA256275328321b16562004a291bd7a886bcb52b3ded86ba9e146d212ca8e2296b6a9
SHA51281fcf12028c1aa266d4158895fdbff1b29e05124749bd45e1748994ef9921bd22e721a6f3a745866b71fea2a7b24488f5d956b22db4e7d0a2203d2ede1dacd59
-
Filesize
1.5MB
MD564f12becc50082532cd14498bd496a76
SHA1a13356f88919f79fd5381eef3dd9e0b2d964a03e
SHA256275328321b16562004a291bd7a886bcb52b3ded86ba9e146d212ca8e2296b6a9
SHA51281fcf12028c1aa266d4158895fdbff1b29e05124749bd45e1748994ef9921bd22e721a6f3a745866b71fea2a7b24488f5d956b22db4e7d0a2203d2ede1dacd59
-
Filesize
1.5MB
MD564f12becc50082532cd14498bd496a76
SHA1a13356f88919f79fd5381eef3dd9e0b2d964a03e
SHA256275328321b16562004a291bd7a886bcb52b3ded86ba9e146d212ca8e2296b6a9
SHA51281fcf12028c1aa266d4158895fdbff1b29e05124749bd45e1748994ef9921bd22e721a6f3a745866b71fea2a7b24488f5d956b22db4e7d0a2203d2ede1dacd59
-
Filesize
1.5MB
MD564f12becc50082532cd14498bd496a76
SHA1a13356f88919f79fd5381eef3dd9e0b2d964a03e
SHA256275328321b16562004a291bd7a886bcb52b3ded86ba9e146d212ca8e2296b6a9
SHA51281fcf12028c1aa266d4158895fdbff1b29e05124749bd45e1748994ef9921bd22e721a6f3a745866b71fea2a7b24488f5d956b22db4e7d0a2203d2ede1dacd59
-
Filesize
401KB
MD5a8f7d6a03fe2b4a496368be6de61e4de
SHA120c7ebc1285fe9e2d0912a78914f41c5b832bc13
SHA256a302b3f215917d955b9d3eecb248a530675a5b7680e89e3ce986f0e6ba095cff
SHA5123ecdb8a61bff9904ca19f7078709d32099becbb8820bfd46d8af4a6001e59768fccbc311cfd98c8525fbd3b1390c16fa4e9c992f50b5715721c8cf236f8a15eb
-
Filesize
401KB
MD5a8f7d6a03fe2b4a496368be6de61e4de
SHA120c7ebc1285fe9e2d0912a78914f41c5b832bc13
SHA256a302b3f215917d955b9d3eecb248a530675a5b7680e89e3ce986f0e6ba095cff
SHA5123ecdb8a61bff9904ca19f7078709d32099becbb8820bfd46d8af4a6001e59768fccbc311cfd98c8525fbd3b1390c16fa4e9c992f50b5715721c8cf236f8a15eb
-
Filesize
12KB
MD5e44473729c90f5c856de475cdc137df1
SHA1c835c3949e6a333c54c1c013616e09cdf8acaea8
SHA25695cc6adeca1eafd60551801fe8c884732f4a6271a232c0d1decf943ee460e65c
SHA5127dc925ff392c1e3d9a37108206ab578652c7e4330b3f2037c4c52b6d9942ce863beccad48ab3b6bbc7d66cc82b4d420538d9434b961e0024d7d3ce26d7e95192
-
Filesize
378KB
MD5d43fa82fab5337ce20ad14650085c5d9
SHA1678aa092075ff65b6815ffc2d8fdc23af8425981
SHA256c022958429edd94bfe31f2eacfe24ff6b45d6f12747725c449a36116373de03b
SHA512103e61a9f58df03316676a074487e50ec518479c11068df3736df139b85c7671048c65bce0ef2c55b3c50c61fde54e9e6c7d1b795aea71263ae94c91d4874e0d
-
Filesize
1.6MB
MD5dab4646806dfca6d0e0b4d80fa9209d6
SHA18244dfe22ec2090eee89dad103e6b2002059d16a
SHA256cb6ef96d3a66ef08ec2c8640b751a52d6d4f4530cf01162a69966f0fd5153587
SHA512aa5eb93bf23a10de797d6fb52a55a95d36bc48927c76fedd81e0c48872745cb7f7d1b3f230eaae42fd4e79b6a59ca707e56bd6963b03644cbd5984f11e98d6e7
-
Filesize
258KB
MD59581f7064028a782182e8a4411e9afa5
SHA19356d9f62fc38a1150c3cad556b2a531cd7d430b
SHA256320a23db8d34bd2628078903d4496d4b9320d50c13d11283f77a8c3b9ec36698
SHA51201c5a711bd0d7cea5cae906c163b7a98c3b09b8ce5a5b52f096d806e20d7f28fe3e174eb6ba8ff630b870b1cea3d9d72905227a989d70e312d79b55644e6442c
-
Filesize
363KB
MD5ec59d88c3ebda7c2ce36dcdbe4c67e5b
SHA18b01a5730ebda5729a57d97abec1de00c7cf0218
SHA25654b661f2d55f5cafccd7aca334efb89e908b3f19e3e35c9aa661221b31ec60e3
SHA51246963b390affcb1f6e5d42ae4f4a67a453d9048e8f8b825bb543a1c2031f1ece07d2f295d30eff51a6624bf096e0d10f8ba8d6516b28e63926f214eb7d7e5b84
-
Filesize
858KB
MD512eba58e4c0450ccb2d9fdce22255d09
SHA11f88ce0834e0bcf0f61ed0557204ef05dd577b1e
SHA256c80464f71b46411b01962b6095acd6eb2ed09ad8d6eb0a67840826a6297823b2
SHA51208f999aeb55968de3dacb560a25174e5a1c29eb2ea95a6fc8f770c10369263e2f8cea525f93c89a0e03954ff1221b4486641fc9a892d53a8857e9cf441ec05d4
-
Filesize
1.7MB
MD54dc099cee622d4269283da9259f0020f
SHA18af35092e8e562584c108bd401096e7ad4af83fe
SHA2569e2b15926960c4c2ccc8850157e93675e827d417c6d4d3066d855efbdb78011e
SHA51271cb1f8059e2e7f8679a22c3504148ac91ceb56d6d85f9cb7a6fe3346a098f992a71ed721b4d73e7dd784beed42e5bbd3dd61299c22071b6236a0db2aaf9e006
-
Filesize
1.7MB
MD54dc099cee622d4269283da9259f0020f
SHA18af35092e8e562584c108bd401096e7ad4af83fe
SHA2569e2b15926960c4c2ccc8850157e93675e827d417c6d4d3066d855efbdb78011e
SHA51271cb1f8059e2e7f8679a22c3504148ac91ceb56d6d85f9cb7a6fe3346a098f992a71ed721b4d73e7dd784beed42e5bbd3dd61299c22071b6236a0db2aaf9e006
-
Filesize
1.7MB
MD54dc099cee622d4269283da9259f0020f
SHA18af35092e8e562584c108bd401096e7ad4af83fe
SHA2569e2b15926960c4c2ccc8850157e93675e827d417c6d4d3066d855efbdb78011e
SHA51271cb1f8059e2e7f8679a22c3504148ac91ceb56d6d85f9cb7a6fe3346a098f992a71ed721b4d73e7dd784beed42e5bbd3dd61299c22071b6236a0db2aaf9e006
-
Filesize
1.7MB
MD54dc099cee622d4269283da9259f0020f
SHA18af35092e8e562584c108bd401096e7ad4af83fe
SHA2569e2b15926960c4c2ccc8850157e93675e827d417c6d4d3066d855efbdb78011e
SHA51271cb1f8059e2e7f8679a22c3504148ac91ceb56d6d85f9cb7a6fe3346a098f992a71ed721b4d73e7dd784beed42e5bbd3dd61299c22071b6236a0db2aaf9e006
-
Filesize
1.7MB
MD54dc099cee622d4269283da9259f0020f
SHA18af35092e8e562584c108bd401096e7ad4af83fe
SHA2569e2b15926960c4c2ccc8850157e93675e827d417c6d4d3066d855efbdb78011e
SHA51271cb1f8059e2e7f8679a22c3504148ac91ceb56d6d85f9cb7a6fe3346a098f992a71ed721b4d73e7dd784beed42e5bbd3dd61299c22071b6236a0db2aaf9e006