Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
193KB
-
MD5
f0557a599dbe4fcdc93cfac451726ccc
-
SHA1
b252de02acae4256e348773e4a7b751834175593
-
SHA256
0d7f4c807220c6b839ee41dd5b41e9e24a2f1b1f503a749dc45504d092f59298
-
SHA512
1ee89b4b4baba7a0a4bd7ed9ffcf0f22e936e09ba647b99f76b5c3c3f9849a9a1b4863d77891f7793bcef0c0fe28de30ac1c45134edeffbabca5b06fffa8f67d
-
SSDEEP
3072:OXScc8Lts2wRw/5L2qxpyB3Ksz3Ei9K21tYq0Ky/rhhf/:Wdc8LaLSB2qxgx5RNtV0XVhf
Malware Config
Extracted
djvu
http://winnlinne.com/lancer/get.php
-
extension
.tury
-
offline_id
Uz66zEbmA32arcxwT81zZhkb23026oHz5iSp8qt1
-
payload_url
http://rgyui.top/dl/build2.exe
http://winnlinne.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-o7UXxOstmw Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0585Jhyjd
Extracted
danabot
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Signatures
-
Detected Djvu ransomware 10 IoCs
resource yara_rule behavioral2/memory/2620-141-0x00000000021B0000-0x00000000022CB000-memory.dmp family_djvu behavioral2/memory/1400-145-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1400-149-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1400-155-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1400-161-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1400-199-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4360-208-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4360-209-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4360-215-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4360-217-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 3 IoCs
resource yara_rule behavioral2/memory/5008-133-0x00000000004D0000-0x00000000004D9000-memory.dmp family_smokeloader behavioral2/memory/2092-180-0x0000000002030000-0x0000000002039000-memory.dmp family_smokeloader behavioral2/memory/2680-185-0x0000000000470000-0x0000000000479000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 2620 27BC.exe 1400 27BC.exe 2092 6534.exe 4308 6804.exe 4124 6A76.exe 2680 6E7E.exe 1132 4CAA.exe 3528 27BC.exe 4360 27BC.exe 2264 build2.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 27BC.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 27BC.exe -
Loads dropped DLL 1 IoCs
pid Process 4264 regsvr32.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2992 icacls.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\1a62caec-33db-46cf-954d-9785e9832949\\27BC.exe\" --AutoStart" 27BC.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 32 api.2ip.ua 33 api.2ip.ua 72 api.2ip.ua -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2620 set thread context of 1400 2620 27BC.exe 87 PID 3528 set thread context of 4360 3528 27BC.exe 111 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3256 2680 WerFault.exe 91 4352 4308 WerFault.exe 89 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6534.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6534.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6534.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 6A76.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 6A76.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5008 file.exe 5008 file.exe 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1040 Process not Found -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 5008 file.exe 1040 Process not Found 1040 Process not Found 1040 Process not Found 1040 Process not Found 2092 6534.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeShutdownPrivilege 1040 Process not Found Token: SeCreatePagefilePrivilege 1040 Process not Found Token: SeDebugPrivilege 4124 6A76.exe Token: SeShutdownPrivilege 1040 Process not Found Token: SeCreatePagefilePrivilege 1040 Process not Found Token: SeShutdownPrivilege 1040 Process not Found Token: SeCreatePagefilePrivilege 1040 Process not Found Token: SeShutdownPrivilege 1040 Process not Found Token: SeCreatePagefilePrivilege 1040 Process not Found Token: SeShutdownPrivilege 1040 Process not Found Token: SeCreatePagefilePrivilege 1040 Process not Found Token: SeShutdownPrivilege 1040 Process not Found Token: SeCreatePagefilePrivilege 1040 Process not Found Token: SeShutdownPrivilege 1040 Process not Found Token: SeCreatePagefilePrivilege 1040 Process not Found Token: SeShutdownPrivilege 1040 Process not Found Token: SeCreatePagefilePrivilege 1040 Process not Found Token: SeShutdownPrivilege 1040 Process not Found Token: SeCreatePagefilePrivilege 1040 Process not Found -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2620 1040 Process not Found 84 PID 1040 wrote to memory of 2620 1040 Process not Found 84 PID 1040 wrote to memory of 2620 1040 Process not Found 84 PID 1040 wrote to memory of 3264 1040 Process not Found 85 PID 1040 wrote to memory of 3264 1040 Process not Found 85 PID 2620 wrote to memory of 1400 2620 27BC.exe 87 PID 2620 wrote to memory of 1400 2620 27BC.exe 87 PID 2620 wrote to memory of 1400 2620 27BC.exe 87 PID 3264 wrote to memory of 4264 3264 regsvr32.exe 86 PID 3264 wrote to memory of 4264 3264 regsvr32.exe 86 PID 3264 wrote to memory of 4264 3264 regsvr32.exe 86 PID 2620 wrote to memory of 1400 2620 27BC.exe 87 PID 2620 wrote to memory of 1400 2620 27BC.exe 87 PID 2620 wrote to memory of 1400 2620 27BC.exe 87 PID 2620 wrote to memory of 1400 2620 27BC.exe 87 PID 2620 wrote to memory of 1400 2620 27BC.exe 87 PID 2620 wrote to memory of 1400 2620 27BC.exe 87 PID 2620 wrote to memory of 1400 2620 27BC.exe 87 PID 1040 wrote to memory of 2092 1040 Process not Found 88 PID 1040 wrote to memory of 2092 1040 Process not Found 88 PID 1040 wrote to memory of 2092 1040 Process not Found 88 PID 1040 wrote to memory of 4308 1040 Process not Found 89 PID 1040 wrote to memory of 4308 1040 Process not Found 89 PID 1040 wrote to memory of 4308 1040 Process not Found 89 PID 1040 wrote to memory of 4124 1040 Process not Found 90 PID 1040 wrote to memory of 4124 1040 Process not Found 90 PID 1040 wrote to memory of 4124 1040 Process not Found 90 PID 1040 wrote to memory of 2680 1040 Process not Found 91 PID 1040 wrote to memory of 2680 1040 Process not Found 91 PID 1040 wrote to memory of 2680 1040 Process not Found 91 PID 1040 wrote to memory of 4736 1040 Process not Found 92 PID 1040 wrote to memory of 4736 1040 Process not Found 92 PID 1040 wrote to memory of 4736 1040 Process not Found 92 PID 1040 wrote to memory of 4736 1040 Process not Found 92 PID 1040 wrote to memory of 4696 1040 Process not Found 93 PID 1040 wrote to memory of 4696 1040 Process not Found 93 PID 1040 wrote to memory of 4696 1040 Process not Found 93 PID 1400 wrote to memory of 2992 1400 27BC.exe 103 PID 1400 wrote to memory of 2992 1400 27BC.exe 103 PID 1400 wrote to memory of 2992 1400 27BC.exe 103 PID 1040 wrote to memory of 1132 1040 Process not Found 105 PID 1040 wrote to memory of 1132 1040 Process not Found 105 PID 1040 wrote to memory of 1132 1040 Process not Found 105 PID 1400 wrote to memory of 3528 1400 27BC.exe 107 PID 1400 wrote to memory of 3528 1400 27BC.exe 107 PID 1400 wrote to memory of 3528 1400 27BC.exe 107 PID 1132 wrote to memory of 4220 1132 4CAA.exe 109 PID 1132 wrote to memory of 4220 1132 4CAA.exe 109 PID 1132 wrote to memory of 4220 1132 4CAA.exe 109 PID 3528 wrote to memory of 4360 3528 27BC.exe 111 PID 3528 wrote to memory of 4360 3528 27BC.exe 111 PID 3528 wrote to memory of 4360 3528 27BC.exe 111 PID 3528 wrote to memory of 4360 3528 27BC.exe 111 PID 3528 wrote to memory of 4360 3528 27BC.exe 111 PID 3528 wrote to memory of 4360 3528 27BC.exe 111 PID 3528 wrote to memory of 4360 3528 27BC.exe 111 PID 3528 wrote to memory of 4360 3528 27BC.exe 111 PID 3528 wrote to memory of 4360 3528 27BC.exe 111 PID 3528 wrote to memory of 4360 3528 27BC.exe 111 PID 4360 wrote to memory of 2264 4360 27BC.exe 112 PID 4360 wrote to memory of 2264 4360 27BC.exe 112 PID 4360 wrote to memory of 2264 4360 27BC.exe 112 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5008
-
C:\Users\Admin\AppData\Local\Temp\27BC.exeC:\Users\Admin\AppData\Local\Temp\27BC.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\27BC.exeC:\Users\Admin\AppData\Local\Temp\27BC.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\1a62caec-33db-46cf-954d-9785e9832949" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\27BC.exe"C:\Users\Admin\AppData\Local\Temp\27BC.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\27BC.exe"C:\Users\Admin\AppData\Local\Temp\27BC.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\fab4f2c9-2b6c-4ad9-a1db-9b6262d450da\build2.exe"C:\Users\Admin\AppData\Local\fab4f2c9-2b6c-4ad9-a1db-9b6262d450da\build2.exe"5⤵
- Executes dropped EXE
PID:2264
-
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3DE5.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3DE5.dll2⤵
- Loads dropped DLL
PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\6534.exeC:\Users\Admin\AppData\Local\Temp\6534.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2092
-
C:\Users\Admin\AppData\Local\Temp\6804.exeC:\Users\Admin\AppData\Local\Temp\6804.exe1⤵
- Executes dropped EXE
PID:4308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 3402⤵
- Program crash
PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\6A76.exeC:\Users\Admin\AppData\Local\Temp\6A76.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
C:\Users\Admin\AppData\Local\Temp\6E7E.exeC:\Users\Admin\AppData\Local\Temp\6E7E.exe1⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 3402⤵
- Program crash
PID:3256
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4736
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2680 -ip 26801⤵PID:1296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4308 -ip 43081⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\4CAA.exeC:\Users\Admin\AppData\Local\Temp\4CAA.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\agentactivationruntimestarter.exeC:\Windows\system32\agentactivationruntimestarter.exe2⤵PID:4220
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc1⤵PID:2352
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5bc68c4ccb08d2c94eb10c1918865ccae
SHA18256faeec3f3ec799819d5370195a60f0ec2bdb0
SHA25679313c35e9f5655225ab6d4564a396cf9d473d04909c04db10935c27959f677d
SHA512f6baa632cd93126c31a495e340e8f42e3f9b171b0975877e7a6725677fe57c8b51784be5366cedba022fea273cfe9ecfc5fce8546f2a76e1e6516e5865666933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5ee895cd37d1bbafdf7a736b85dd47348
SHA15c182ae0d6ffc54c386763ad882256cedd8d0e7c
SHA256939346daba2e0757e14e822fd55350189708ac8d2d782b148e1744ee85c49aa5
SHA512b2f86fa2f14864ab155693804f0d5da4f13e0c9257743eb7376d49a6ce77d950f6e98bbda24030386578c0edb58f4ad3e50eaec2dcc10803a7dd314d703cf740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5dec620fc54ed2187f1467e0c1a6c5f3f
SHA158b7919f0eee9aa54f87de72c6e69ba5aefed938
SHA256b2842104fb4cb45f525af99161bae6cb8c9921fab44ebae45eaf08afff8ef5cb
SHA5120307d75e47eaba3ed2d80755f3a3c17497c6cff5e94ad19621680543676f4c822e74bb0797d19a14faaa7b1cd1cfbd3540bf2f53b3d0fa7c436395d860bb22c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5fa53999391a8857cee5abd7322d75880
SHA1758302cbb04dc2956302f9c27faaff119ebbc07f
SHA2566a75150374ae9a5f77c3c7e37659ef0a2a39076776ea20cd578e0b035f582dc7
SHA51299c0c2a0a72397027311f989ad70d5e5e15ff2c493f0a9eb172ba79a07f2727b9ac2893f641ee2894142074be62826120f336b387767f961cb40d74006671c1c
-
Filesize
713KB
MD5b7bc860cee7201e0c810642890a03246
SHA1d9edc9d61baf9d8cad3f840bba699ffd9219cce0
SHA256ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27
SHA5125e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594
-
Filesize
713KB
MD5b7bc860cee7201e0c810642890a03246
SHA1d9edc9d61baf9d8cad3f840bba699ffd9219cce0
SHA256ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27
SHA5125e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594
-
Filesize
713KB
MD5b7bc860cee7201e0c810642890a03246
SHA1d9edc9d61baf9d8cad3f840bba699ffd9219cce0
SHA256ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27
SHA5125e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594
-
Filesize
713KB
MD5b7bc860cee7201e0c810642890a03246
SHA1d9edc9d61baf9d8cad3f840bba699ffd9219cce0
SHA256ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27
SHA5125e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594
-
Filesize
713KB
MD5b7bc860cee7201e0c810642890a03246
SHA1d9edc9d61baf9d8cad3f840bba699ffd9219cce0
SHA256ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27
SHA5125e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594
-
Filesize
713KB
MD5b7bc860cee7201e0c810642890a03246
SHA1d9edc9d61baf9d8cad3f840bba699ffd9219cce0
SHA256ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27
SHA5125e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594
-
Filesize
1.8MB
MD54dca89f3a66ae9ac204beea85d7a3d75
SHA15cc81459e35f27a79047c4e041a65739cc91a067
SHA256223759e9e0c53c73d5255e47c1b455d7ccda1d050809446300485c0747d16981
SHA51267dd36ca578ae7bfe3ebd167f193fe35513841aaa3a5f3124c4a1ae04241c554a0ff26a9afcee4e3ad4aaa8528b96e99a89192c7f1fc22dead81ad9af36a4906
-
Filesize
1.8MB
MD54dca89f3a66ae9ac204beea85d7a3d75
SHA15cc81459e35f27a79047c4e041a65739cc91a067
SHA256223759e9e0c53c73d5255e47c1b455d7ccda1d050809446300485c0747d16981
SHA51267dd36ca578ae7bfe3ebd167f193fe35513841aaa3a5f3124c4a1ae04241c554a0ff26a9afcee4e3ad4aaa8528b96e99a89192c7f1fc22dead81ad9af36a4906
-
Filesize
1.2MB
MD5126ab2a3f29d4fcc19197b48551c0745
SHA1120d2b163bc0748db5f776edcadfd922396d4d12
SHA256fae6ecff0005977007f1e38c6f9f574b5ead530a3fd4e006e985e1a324860c05
SHA5128a2f26969a14ca7b78becbd6af1f555fc9686566bd84a37f92f3f2ab9cd2f368c0c9eb184a0b2fa0bee2491c9ed54dbda76e72718794284193c890b381640b33
-
Filesize
1.2MB
MD5126ab2a3f29d4fcc19197b48551c0745
SHA1120d2b163bc0748db5f776edcadfd922396d4d12
SHA256fae6ecff0005977007f1e38c6f9f574b5ead530a3fd4e006e985e1a324860c05
SHA5128a2f26969a14ca7b78becbd6af1f555fc9686566bd84a37f92f3f2ab9cd2f368c0c9eb184a0b2fa0bee2491c9ed54dbda76e72718794284193c890b381640b33
-
Filesize
195KB
MD5dec9250f99f41e0f5bb969e4d22c2cd4
SHA1b3ece4bdcdadf2ee77c92b6000cb51431379be22
SHA2569956a179fea738e50c94d1bcd8a4e4d78a6c5c10e3d9dabeae851819d020beae
SHA512d17ec18b2ba5f6e776bb2079f1e19b62c6c0804cd4e2fc37207264adf6f96a2ea8157531ba3763604e6bbdb42b894ef2296fb964e1366c761640f8572751a576
-
Filesize
195KB
MD5dec9250f99f41e0f5bb969e4d22c2cd4
SHA1b3ece4bdcdadf2ee77c92b6000cb51431379be22
SHA2569956a179fea738e50c94d1bcd8a4e4d78a6c5c10e3d9dabeae851819d020beae
SHA512d17ec18b2ba5f6e776bb2079f1e19b62c6c0804cd4e2fc37207264adf6f96a2ea8157531ba3763604e6bbdb42b894ef2296fb964e1366c761640f8572751a576
-
Filesize
193KB
MD5c1bf74789ae95f35dcf98ab453acbff3
SHA178cfde9b320ad6ca9219e7221e2b6342fb13ee63
SHA2567abaebf4d3807453b2e2a0ef250101b1087e291010b9f69124272af30f540d4a
SHA51238e8f2d4a4731b55fed60af7a0e102ccdaacfdd3dd204a53d2e0573cd19c66adfa6ae889e2a016bfed660db278355ebfd47dd81acdac73c502cf9d4bf1fa0f00
-
Filesize
193KB
MD5c1bf74789ae95f35dcf98ab453acbff3
SHA178cfde9b320ad6ca9219e7221e2b6342fb13ee63
SHA2567abaebf4d3807453b2e2a0ef250101b1087e291010b9f69124272af30f540d4a
SHA51238e8f2d4a4731b55fed60af7a0e102ccdaacfdd3dd204a53d2e0573cd19c66adfa6ae889e2a016bfed660db278355ebfd47dd81acdac73c502cf9d4bf1fa0f00
-
Filesize
103KB
MD5b389787c2afa664b07383c9b655732e5
SHA1227dcf02b647d31bba648c7e9402de7250161d16
SHA25659b9eb8336740e545bcc0f12ae6d3db658496bc6ed79a4087eb134d78cd687fa
SHA512320c02c7ed68e1d965de26813fbccba16e1406b22793734d39042a41304b62cf561436f21f9b5bbac8119b26ae07982e369b407b91b706153695aec9daa27ff7
-
Filesize
103KB
MD5b389787c2afa664b07383c9b655732e5
SHA1227dcf02b647d31bba648c7e9402de7250161d16
SHA25659b9eb8336740e545bcc0f12ae6d3db658496bc6ed79a4087eb134d78cd687fa
SHA512320c02c7ed68e1d965de26813fbccba16e1406b22793734d39042a41304b62cf561436f21f9b5bbac8119b26ae07982e369b407b91b706153695aec9daa27ff7
-
Filesize
194KB
MD571efcf6744318ba8dff53729acc2f821
SHA11adf3caa79b66a799aaf8fe52fcb9fbede4a51b1
SHA2564a5eadfc176749a508c86d1e8875a5e3a48f9a971a7b7b7b5219719daddc7c02
SHA512258bcf0b5ff01d3cab8cc2eb574bf7c764da9150a6494dd5320e4f338a601b348cd0a64b1edeb28063d16ca36e5eb42fe08a92a0fa785fd8fcad142dffc24671
-
Filesize
194KB
MD571efcf6744318ba8dff53729acc2f821
SHA11adf3caa79b66a799aaf8fe52fcb9fbede4a51b1
SHA2564a5eadfc176749a508c86d1e8875a5e3a48f9a971a7b7b7b5219719daddc7c02
SHA512258bcf0b5ff01d3cab8cc2eb574bf7c764da9150a6494dd5320e4f338a601b348cd0a64b1edeb28063d16ca36e5eb42fe08a92a0fa785fd8fcad142dffc24671
-
Filesize
325KB
MD5e4e90e1dda4b51d199d449fa936db902
SHA170de6b213f872ba782ba11cad5a5d1294ca9e741
SHA2568ecc0426ea37a5c9e59d00b4fde1508175a950372ec3870965f1e527634b3419
SHA5123958e1c40d69d5439b5e85bdb5765bb38ec5bba24f38a8aafb9a53c167ebaffb5c202441613af3f2d968c9c902de35036f67d87f7777efeb4c66869a7fc3c4ed
-
Filesize
325KB
MD5e4e90e1dda4b51d199d449fa936db902
SHA170de6b213f872ba782ba11cad5a5d1294ca9e741
SHA2568ecc0426ea37a5c9e59d00b4fde1508175a950372ec3870965f1e527634b3419
SHA5123958e1c40d69d5439b5e85bdb5765bb38ec5bba24f38a8aafb9a53c167ebaffb5c202441613af3f2d968c9c902de35036f67d87f7777efeb4c66869a7fc3c4ed