Analysis
-
max time kernel
135s -
max time network
178s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-09-2022 10:20
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Install.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
langs/Hungarian.ps1
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
langs/Hungarian.ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
langs/Korean.ps1
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
langs/Korean.ps1
Resource
win10v2004-20220901-en
General
-
Target
Install.exe
-
Size
435.0MB
-
MD5
2a27acc2f6b26b15d6d839d43a6b6bc0
-
SHA1
661dca9bd343226ae54da0e21f12ef1e181b1776
-
SHA256
006fd40f696d274a44535fcf35d6130445842b148115db48c5b859a8519cdc77
-
SHA512
ebf8bfdf7529429a400ad39d473da0e43752c6cd16dffaadd067e38b3e0c9991664217d15931a73f7f78a0160cdbd4f5710699d2f293c1638ae8d1ed5f7940ee
-
SSDEEP
98304:Ak/AHdxT8BEU8MkJwe65adTX4a2tYsUxKr76hwrrKqdSlwrWL:Ak/i8jkJjLd8a2UxIzGwyL
Malware Config
Extracted
privateloader
http://163.123.143.4/proxies.txt
http://107.182.129.251/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
163.123.143.12
-
payload_url
https://vipsofts.xyz/files/mega.bmp
Extracted
djvu
http://acacaca.org/test3/get.php
-
extension
.oovb
-
offline_id
6GXhR4uyHH9NXT2qot14T0HeNSviNKH0Q6PGVNt1
-
payload_url
http://rgyui.top/dl/build2.exe
http://acacaca.org/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-6g0MALAb7E Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0552Jhyjd
Signatures
-
Detected Djvu ransomware 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1648-89-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1380-91-0x00000000045A0000-0x00000000046BB000-memory.dmp family_djvu behavioral1/memory/1648-85-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/1648-84-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1584-109-0x00000000086D0000-0x00000000094F5000-memory.dmp family_djvu behavioral1/memory/1648-115-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
YTStealer payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1132-111-0x00000000011D0000-0x0000000001FF5000-memory.dmp family_ytstealer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Install.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Install.exe -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
Processes:
WH4DRsogYL1Nk0FZf0Z1aUCY.exeqpBH964GBvGpwbYm8EHxTAzI.exeqpBH964GBvGpwbYm8EHxTAzI.exeM0pHdVv09lVLxm2AeLVGyBSA.exeURbaBkFskCCsEH5tYshP8wrC.exe95n5ACfdos0S72to0qItDviV.exeWZUgNx9dVZsvGTpW9tXlV1fS.exeSXA5RqCaO_bar94nU6W3PPjK.exepid Process 1132 WH4DRsogYL1Nk0FZf0Z1aUCY.exe 1380 qpBH964GBvGpwbYm8EHxTAzI.exe 1648 qpBH964GBvGpwbYm8EHxTAzI.exe 1228 M0pHdVv09lVLxm2AeLVGyBSA.exe 920 URbaBkFskCCsEH5tYshP8wrC.exe 1148 95n5ACfdos0S72to0qItDviV.exe 1056 WZUgNx9dVZsvGTpW9tXlV1fS.exe 1160 SXA5RqCaO_bar94nU6W3PPjK.exe -
Processes:
resource yara_rule behavioral1/files/0x000600000001663f-74.dat upx behavioral1/files/0x000600000001663f-67.dat upx behavioral1/files/0x000600000001663f-69.dat upx behavioral1/memory/1132-111-0x00000000011D0000-0x0000000001FF5000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/files/0x0006000000016cc6-76.dat vmprotect behavioral1/files/0x0006000000016cc6-98.dat vmprotect behavioral1/memory/1228-108-0x0000000140000000-0x00000001406B1000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Install.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\International\Geo\Nation Install.exe -
Loads dropped DLL 11 IoCs
Processes:
Install.exeqpBH964GBvGpwbYm8EHxTAzI.exepid Process 1584 Install.exe 1584 Install.exe 1584 Install.exe 1584 Install.exe 1584 Install.exe 1584 Install.exe 1584 Install.exe 1584 Install.exe 1584 Install.exe 1380 qpBH964GBvGpwbYm8EHxTAzI.exe 1584 Install.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/1584-55-0x00000000001A0000-0x0000000000D5C000-memory.dmp themida behavioral1/memory/1584-56-0x00000000001A0000-0x0000000000D5C000-memory.dmp themida behavioral1/memory/1584-58-0x00000000001A0000-0x0000000000D5C000-memory.dmp themida behavioral1/memory/1584-59-0x00000000001A0000-0x0000000000D5C000-memory.dmp themida behavioral1/memory/1584-60-0x00000000001A0000-0x0000000000D5C000-memory.dmp themida behavioral1/memory/1584-61-0x00000000001A0000-0x0000000000D5C000-memory.dmp themida behavioral1/memory/1584-62-0x00000000001A0000-0x0000000000D5C000-memory.dmp themida behavioral1/memory/1584-63-0x00000000001A0000-0x0000000000D5C000-memory.dmp themida behavioral1/memory/1584-64-0x00000000001A0000-0x0000000000D5C000-memory.dmp themida -
Processes:
Install.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Install.exe -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 124 api.2ip.ua 138 ipinfo.io 139 ipinfo.io 2 ipinfo.io 3 ipinfo.io 122 api.2ip.ua -
Drops file in System32 directory 4 IoCs
Processes:
Install.exedescription ioc Process File opened for modification C:\Windows\System32\GroupPolicy Install.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini Install.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol Install.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI Install.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Install.exepid Process 1584 Install.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
qpBH964GBvGpwbYm8EHxTAzI.exedescription pid Process procid_target PID 1380 set thread context of 1648 1380 qpBH964GBvGpwbYm8EHxTAzI.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
WZUgNx9dVZsvGTpW9tXlV1fS.exedescription ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI WZUgNx9dVZsvGTpW9tXlV1fS.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI WZUgNx9dVZsvGTpW9tXlV1fS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI WZUgNx9dVZsvGTpW9tXlV1fS.exe -
Processes:
Install.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Install.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Install.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Install.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 Install.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Install.exepid Process 1584 Install.exe 1584 Install.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
Install.exeqpBH964GBvGpwbYm8EHxTAzI.exedescription pid Process procid_target PID 1584 wrote to memory of 1132 1584 Install.exe 31 PID 1584 wrote to memory of 1132 1584 Install.exe 31 PID 1584 wrote to memory of 1132 1584 Install.exe 31 PID 1584 wrote to memory of 1132 1584 Install.exe 31 PID 1584 wrote to memory of 1380 1584 Install.exe 30 PID 1584 wrote to memory of 1380 1584 Install.exe 30 PID 1584 wrote to memory of 1380 1584 Install.exe 30 PID 1584 wrote to memory of 1380 1584 Install.exe 30 PID 1380 wrote to memory of 1648 1380 qpBH964GBvGpwbYm8EHxTAzI.exe 37 PID 1380 wrote to memory of 1648 1380 qpBH964GBvGpwbYm8EHxTAzI.exe 37 PID 1380 wrote to memory of 1648 1380 qpBH964GBvGpwbYm8EHxTAzI.exe 37 PID 1380 wrote to memory of 1648 1380 qpBH964GBvGpwbYm8EHxTAzI.exe 37 PID 1380 wrote to memory of 1648 1380 qpBH964GBvGpwbYm8EHxTAzI.exe 37 PID 1380 wrote to memory of 1648 1380 qpBH964GBvGpwbYm8EHxTAzI.exe 37 PID 1380 wrote to memory of 1648 1380 qpBH964GBvGpwbYm8EHxTAzI.exe 37 PID 1380 wrote to memory of 1648 1380 qpBH964GBvGpwbYm8EHxTAzI.exe 37 PID 1380 wrote to memory of 1648 1380 qpBH964GBvGpwbYm8EHxTAzI.exe 37 PID 1380 wrote to memory of 1648 1380 qpBH964GBvGpwbYm8EHxTAzI.exe 37 PID 1380 wrote to memory of 1648 1380 qpBH964GBvGpwbYm8EHxTAzI.exe 37 PID 1584 wrote to memory of 1148 1584 Install.exe 36 PID 1584 wrote to memory of 1148 1584 Install.exe 36 PID 1584 wrote to memory of 1148 1584 Install.exe 36 PID 1584 wrote to memory of 1148 1584 Install.exe 36 PID 1584 wrote to memory of 1228 1584 Install.exe 35 PID 1584 wrote to memory of 1228 1584 Install.exe 35 PID 1584 wrote to memory of 1228 1584 Install.exe 35 PID 1584 wrote to memory of 1228 1584 Install.exe 35 PID 1584 wrote to memory of 1160 1584 Install.exe 34 PID 1584 wrote to memory of 1160 1584 Install.exe 34 PID 1584 wrote to memory of 1160 1584 Install.exe 34 PID 1584 wrote to memory of 1160 1584 Install.exe 34 PID 1584 wrote to memory of 920 1584 Install.exe 33 PID 1584 wrote to memory of 920 1584 Install.exe 33 PID 1584 wrote to memory of 920 1584 Install.exe 33 PID 1584 wrote to memory of 920 1584 Install.exe 33 PID 1584 wrote to memory of 1056 1584 Install.exe 32 PID 1584 wrote to memory of 1056 1584 Install.exe 32 PID 1584 wrote to memory of 1056 1584 Install.exe 32 PID 1584 wrote to memory of 1056 1584 Install.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\Pictures\Minor Policy\qpBH964GBvGpwbYm8EHxTAzI.exe"C:\Users\Admin\Pictures\Minor Policy\qpBH964GBvGpwbYm8EHxTAzI.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\Pictures\Minor Policy\qpBH964GBvGpwbYm8EHxTAzI.exe"C:\Users\Admin\Pictures\Minor Policy\qpBH964GBvGpwbYm8EHxTAzI.exe"3⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\7ae7850b-ef51-4021-a046-1d8df1c44be5" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
PID:1572
-
-
-
-
C:\Users\Admin\Pictures\Minor Policy\WH4DRsogYL1Nk0FZf0Z1aUCY.exe"C:\Users\Admin\Pictures\Minor Policy\WH4DRsogYL1Nk0FZf0Z1aUCY.exe"2⤵
- Executes dropped EXE
PID:1132
-
-
C:\Users\Admin\Pictures\Minor Policy\WZUgNx9dVZsvGTpW9tXlV1fS.exe"C:\Users\Admin\Pictures\Minor Policy\WZUgNx9dVZsvGTpW9tXlV1fS.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1056
-
-
C:\Users\Admin\Pictures\Minor Policy\URbaBkFskCCsEH5tYshP8wrC.exe"C:\Users\Admin\Pictures\Minor Policy\URbaBkFskCCsEH5tYshP8wrC.exe"2⤵
- Executes dropped EXE
PID:920 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /y .\LNN0EYSO._03⤵PID:1488
-
-
-
C:\Users\Admin\Pictures\Minor Policy\SXA5RqCaO_bar94nU6W3PPjK.exe"C:\Users\Admin\Pictures\Minor Policy\SXA5RqCaO_bar94nU6W3PPjK.exe"2⤵
- Executes dropped EXE
PID:1160
-
-
C:\Users\Admin\Pictures\Minor Policy\M0pHdVv09lVLxm2AeLVGyBSA.exe"C:\Users\Admin\Pictures\Minor Policy\M0pHdVv09lVLxm2AeLVGyBSA.exe"2⤵
- Executes dropped EXE
PID:1228
-
-
C:\Users\Admin\Pictures\Minor Policy\95n5ACfdos0S72to0qItDviV.exe"C:\Users\Admin\Pictures\Minor Policy\95n5ACfdos0S72to0qItDviV.exe"2⤵
- Executes dropped EXE
PID:1148
-
-
C:\Users\Admin\Pictures\Minor Policy\tMDSzxpIfyCYVromXZIv3xOC.exe"C:\Users\Admin\Pictures\Minor Policy\tMDSzxpIfyCYVromXZIv3xOC.exe"2⤵PID:1772
-
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD56c6a24456559f305308cb1fb6c5486b3
SHA13273ac27d78572f16c3316732b9756ebc22cb6ed
SHA256efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973
SHA512587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc95b1939c205872b4dfda1da36f736
SHA174d1b4b031ec6bdc9447585166de3b9f428c08e2
SHA256f645798988cc8df09bc77f9c38f1cf304ab7bb2c18533d494e139e824ccba9a2
SHA5129868dcc5469a9aaf3ca410f1b0e0b60abebfbb0c8a73063b64b2b704c3a10927a07257a2927d3a2589987264838fcaddee80c9ce994dda355236ba5f5b63fb63
-
Filesize
400KB
MD59519c85c644869f182927d93e8e25a33
SHA1eadc9026e041f7013056f80e068ecf95940ea060
SHA256f0dc8fa1a18901ac46f4448e434c3885a456865a3a309840a1c4ac67fd56895b
SHA512dcc1dd25bba19aaf75ec4a1a69dc215eb519e9ee3b8f7b1bd16164b736b3aa81389c076ed4e8a17a1cbfaec2e0b3155df039d1bca3c7186cfeb9950369bccf23
-
Filesize
400KB
MD59519c85c644869f182927d93e8e25a33
SHA1eadc9026e041f7013056f80e068ecf95940ea060
SHA256f0dc8fa1a18901ac46f4448e434c3885a456865a3a309840a1c4ac67fd56895b
SHA512dcc1dd25bba19aaf75ec4a1a69dc215eb519e9ee3b8f7b1bd16164b736b3aa81389c076ed4e8a17a1cbfaec2e0b3155df039d1bca3c7186cfeb9950369bccf23
-
Filesize
3.8MB
MD5e605e6fa69f66689ae1ea2d37ec272d6
SHA1553f96ef3482ed29f2d2c6f2d44f47605097d238
SHA256ba034c13ba85f4c482e24697454e0afc06f0d5e136ac59aa3b9770edb1b342cc
SHA5121047f0577649ed71bd76a67aae062be8a4edfa53891e49eb7632aaed9dec2b2382e10d8e24a5b4386070917f4589beb76a8adbf33b306a8907c4c18ec7de29d5
-
Filesize
5.6MB
MD5b3b0630feab568055f33b84593b6a0b3
SHA1e9cb1f95f51fcf31ecbc132f822897cb8dab839f
SHA256aba67ec9bd4de3a05d77d0049c165058d642c40bb27f67f87748ee712f8f38b4
SHA512752e20041e43364a68a5fc21e55307835a8b479b49ade1d8cf60a90ed62fe611753abaeda35735a61c2ec80c6982e3b97f067ea22c55ce1afbb7fc6741a37bd6
-
Filesize
5.6MB
MD5b3b0630feab568055f33b84593b6a0b3
SHA1e9cb1f95f51fcf31ecbc132f822897cb8dab839f
SHA256aba67ec9bd4de3a05d77d0049c165058d642c40bb27f67f87748ee712f8f38b4
SHA512752e20041e43364a68a5fc21e55307835a8b479b49ade1d8cf60a90ed62fe611753abaeda35735a61c2ec80c6982e3b97f067ea22c55ce1afbb7fc6741a37bd6
-
Filesize
1.4MB
MD5801da28ffc36a68709e90ee155f3cfc6
SHA1319ae8716fcd4c66fd8d52e0b450496931370d3c
SHA256f5dc8c288ae4d48b64be65be39b8d930eafef543acea6a4b308610f347ce7430
SHA51214ea7e255804347ec0adbae7f7c38e6f6be67a168ea2a91d5a1c28ec702f34ee413a817cc85d105caa70bb29fa7fb421fb236c0001e3c7f383de1dd6b07a464a
-
Filesize
1.4MB
MD5801da28ffc36a68709e90ee155f3cfc6
SHA1319ae8716fcd4c66fd8d52e0b450496931370d3c
SHA256f5dc8c288ae4d48b64be65be39b8d930eafef543acea6a4b308610f347ce7430
SHA51214ea7e255804347ec0adbae7f7c38e6f6be67a168ea2a91d5a1c28ec702f34ee413a817cc85d105caa70bb29fa7fb421fb236c0001e3c7f383de1dd6b07a464a
-
Filesize
4.1MB
MD5bb1dec3065d196ef788c2907ad6f5494
SHA14775ac52549c6547aa20239f5ac00ee6c9ef23f7
SHA256ff3ae8fff0d1862d4bde8f61e0ed14ef76d6d2cc6d940bb83dc0b4cfdacc2752
SHA51242e1cae0bdcde411cd72b6f28878781ce06666afd33dcd98c2e16e66f3f7b58fa797be36d15b110df1ce8acac523247499dba3a70e6420ebce6d3ac08fe9b388
-
Filesize
332KB
MD52d2a0338b82193b09f9e751df24a9fea
SHA13231d42da8dc3d79ddba4aeffebe357bef6a9889
SHA256a490abf26bd20fd2d59c186c322ead44860ee3e74df99ced8b21d58d5c1f93f0
SHA5122b5ee14e0f72d73343f2a32ff2b756a1b3f5c276cbda8df86bf58ecbdcd79e5bd5a122dce612e8c6da14c53f63bed4032104b66eedb3a3f75a4a4ea85db97f03
-
Filesize
852KB
MD58c3eee23dd6014fc5b97f8bc278b9557
SHA1df869aeb66a15d07e45d3aa46653b6dd3fda270f
SHA25608f30389e658c7aecd0ac08eaf510fb47df05c75d7669cd2fbd0aff3d62853a1
SHA512ded6fe22eb89b2cd0b0c99d76bd1f9285620aa60f38876d12d28f3906ad2beeac8c8a89ee268bb58a7023370815893f22cae2fe213b3f86f288b05c241526b0e
-
Filesize
852KB
MD58c3eee23dd6014fc5b97f8bc278b9557
SHA1df869aeb66a15d07e45d3aa46653b6dd3fda270f
SHA25608f30389e658c7aecd0ac08eaf510fb47df05c75d7669cd2fbd0aff3d62853a1
SHA512ded6fe22eb89b2cd0b0c99d76bd1f9285620aa60f38876d12d28f3906ad2beeac8c8a89ee268bb58a7023370815893f22cae2fe213b3f86f288b05c241526b0e
-
Filesize
852KB
MD58c3eee23dd6014fc5b97f8bc278b9557
SHA1df869aeb66a15d07e45d3aa46653b6dd3fda270f
SHA25608f30389e658c7aecd0ac08eaf510fb47df05c75d7669cd2fbd0aff3d62853a1
SHA512ded6fe22eb89b2cd0b0c99d76bd1f9285620aa60f38876d12d28f3906ad2beeac8c8a89ee268bb58a7023370815893f22cae2fe213b3f86f288b05c241526b0e
-
Filesize
400KB
MD59519c85c644869f182927d93e8e25a33
SHA1eadc9026e041f7013056f80e068ecf95940ea060
SHA256f0dc8fa1a18901ac46f4448e434c3885a456865a3a309840a1c4ac67fd56895b
SHA512dcc1dd25bba19aaf75ec4a1a69dc215eb519e9ee3b8f7b1bd16164b736b3aa81389c076ed4e8a17a1cbfaec2e0b3155df039d1bca3c7186cfeb9950369bccf23
-
Filesize
3.8MB
MD5e605e6fa69f66689ae1ea2d37ec272d6
SHA1553f96ef3482ed29f2d2c6f2d44f47605097d238
SHA256ba034c13ba85f4c482e24697454e0afc06f0d5e136ac59aa3b9770edb1b342cc
SHA5121047f0577649ed71bd76a67aae062be8a4edfa53891e49eb7632aaed9dec2b2382e10d8e24a5b4386070917f4589beb76a8adbf33b306a8907c4c18ec7de29d5
-
Filesize
5.6MB
MD5b3b0630feab568055f33b84593b6a0b3
SHA1e9cb1f95f51fcf31ecbc132f822897cb8dab839f
SHA256aba67ec9bd4de3a05d77d0049c165058d642c40bb27f67f87748ee712f8f38b4
SHA512752e20041e43364a68a5fc21e55307835a8b479b49ade1d8cf60a90ed62fe611753abaeda35735a61c2ec80c6982e3b97f067ea22c55ce1afbb7fc6741a37bd6
-
Filesize
1.4MB
MD5801da28ffc36a68709e90ee155f3cfc6
SHA1319ae8716fcd4c66fd8d52e0b450496931370d3c
SHA256f5dc8c288ae4d48b64be65be39b8d930eafef543acea6a4b308610f347ce7430
SHA51214ea7e255804347ec0adbae7f7c38e6f6be67a168ea2a91d5a1c28ec702f34ee413a817cc85d105caa70bb29fa7fb421fb236c0001e3c7f383de1dd6b07a464a
-
Filesize
4.1MB
MD5bb1dec3065d196ef788c2907ad6f5494
SHA14775ac52549c6547aa20239f5ac00ee6c9ef23f7
SHA256ff3ae8fff0d1862d4bde8f61e0ed14ef76d6d2cc6d940bb83dc0b4cfdacc2752
SHA51242e1cae0bdcde411cd72b6f28878781ce06666afd33dcd98c2e16e66f3f7b58fa797be36d15b110df1ce8acac523247499dba3a70e6420ebce6d3ac08fe9b388
-
Filesize
4.1MB
MD5bb1dec3065d196ef788c2907ad6f5494
SHA14775ac52549c6547aa20239f5ac00ee6c9ef23f7
SHA256ff3ae8fff0d1862d4bde8f61e0ed14ef76d6d2cc6d940bb83dc0b4cfdacc2752
SHA51242e1cae0bdcde411cd72b6f28878781ce06666afd33dcd98c2e16e66f3f7b58fa797be36d15b110df1ce8acac523247499dba3a70e6420ebce6d3ac08fe9b388
-
Filesize
332KB
MD52d2a0338b82193b09f9e751df24a9fea
SHA13231d42da8dc3d79ddba4aeffebe357bef6a9889
SHA256a490abf26bd20fd2d59c186c322ead44860ee3e74df99ced8b21d58d5c1f93f0
SHA5122b5ee14e0f72d73343f2a32ff2b756a1b3f5c276cbda8df86bf58ecbdcd79e5bd5a122dce612e8c6da14c53f63bed4032104b66eedb3a3f75a4a4ea85db97f03
-
Filesize
332KB
MD52d2a0338b82193b09f9e751df24a9fea
SHA13231d42da8dc3d79ddba4aeffebe357bef6a9889
SHA256a490abf26bd20fd2d59c186c322ead44860ee3e74df99ced8b21d58d5c1f93f0
SHA5122b5ee14e0f72d73343f2a32ff2b756a1b3f5c276cbda8df86bf58ecbdcd79e5bd5a122dce612e8c6da14c53f63bed4032104b66eedb3a3f75a4a4ea85db97f03
-
Filesize
852KB
MD58c3eee23dd6014fc5b97f8bc278b9557
SHA1df869aeb66a15d07e45d3aa46653b6dd3fda270f
SHA25608f30389e658c7aecd0ac08eaf510fb47df05c75d7669cd2fbd0aff3d62853a1
SHA512ded6fe22eb89b2cd0b0c99d76bd1f9285620aa60f38876d12d28f3906ad2beeac8c8a89ee268bb58a7023370815893f22cae2fe213b3f86f288b05c241526b0e
-
Filesize
852KB
MD58c3eee23dd6014fc5b97f8bc278b9557
SHA1df869aeb66a15d07e45d3aa46653b6dd3fda270f
SHA25608f30389e658c7aecd0ac08eaf510fb47df05c75d7669cd2fbd0aff3d62853a1
SHA512ded6fe22eb89b2cd0b0c99d76bd1f9285620aa60f38876d12d28f3906ad2beeac8c8a89ee268bb58a7023370815893f22cae2fe213b3f86f288b05c241526b0e
-
Filesize
852KB
MD58c3eee23dd6014fc5b97f8bc278b9557
SHA1df869aeb66a15d07e45d3aa46653b6dd3fda270f
SHA25608f30389e658c7aecd0ac08eaf510fb47df05c75d7669cd2fbd0aff3d62853a1
SHA512ded6fe22eb89b2cd0b0c99d76bd1f9285620aa60f38876d12d28f3906ad2beeac8c8a89ee268bb58a7023370815893f22cae2fe213b3f86f288b05c241526b0e