Analysis
-
max time kernel
149s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 10:23
Static task
static1
Behavioral task
behavioral1
Sample
fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe
Resource
win10v2004-20220812-en
General
-
Target
fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe
-
Size
2.6MB
-
MD5
e72aaafff683d056502cc68ab1333deb
-
SHA1
934deb70f68a11e75985933a8a449fb4a8269dc4
-
SHA256
fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7
-
SHA512
101d7c33bad59ce83b5d372e013fc838f1b6c33e96d94b22bcf499ef6a3a6277f2ec86d864d5d6ac7edfa1e6dee83a0e7dfc4a277b7e63546c7899585d5a29f2
-
SSDEEP
49152:SJZoQrbTFZY1iazcBXcmdxoNmiHFNWt7jAui5Uj2MNo:StrbTA1Eo
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\winmgr125.exe,explorer.exe" fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe -
Executes dropped EXE 4 IoCs
Processes:
File.exevegas.pro.12.-patch.exevbc.exewinmgr125.exepid process 1692 File.exe 956 vegas.pro.12.-patch.exe 968 vbc.exe 268 winmgr125.exe -
Loads dropped DLL 13 IoCs
Processes:
cmd.exeFile.exevegas.pro.12.-patch.exevbc.exepid process 2016 cmd.exe 2016 cmd.exe 1692 File.exe 1692 File.exe 1692 File.exe 1692 File.exe 1692 File.exe 956 vegas.pro.12.-patch.exe 956 vegas.pro.12.-patch.exe 968 vbc.exe 968 vbc.exe 956 vegas.pro.12.-patch.exe 956 vegas.pro.12.-patch.exe -
Uses the VBS compiler for execution 1 TTPs
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe autoit_exe C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exedescription pid process target process PID 1212 set thread context of 948 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 688 schtasks.exe 1612 schtasks.exe 628 schtasks.exe 1768 schtasks.exe 1304 schtasks.exe 980 schtasks.exe 280 schtasks.exe 1996 schtasks.exe 1736 schtasks.exe 976 schtasks.exe 1712 schtasks.exe 1812 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exepid process 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 1732 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1732 AUDIODG.EXE Token: 33 1732 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1732 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.execmd.exeFile.exedescription pid process target process PID 1212 wrote to memory of 2016 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe cmd.exe PID 1212 wrote to memory of 2016 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe cmd.exe PID 1212 wrote to memory of 2016 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe cmd.exe PID 1212 wrote to memory of 2016 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe cmd.exe PID 2016 wrote to memory of 1692 2016 cmd.exe File.exe PID 2016 wrote to memory of 1692 2016 cmd.exe File.exe PID 2016 wrote to memory of 1692 2016 cmd.exe File.exe PID 2016 wrote to memory of 1692 2016 cmd.exe File.exe PID 2016 wrote to memory of 1692 2016 cmd.exe File.exe PID 2016 wrote to memory of 1692 2016 cmd.exe File.exe PID 2016 wrote to memory of 1692 2016 cmd.exe File.exe PID 1212 wrote to memory of 948 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe RegAsm.exe PID 1212 wrote to memory of 948 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe RegAsm.exe PID 1212 wrote to memory of 948 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe RegAsm.exe PID 1212 wrote to memory of 948 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe RegAsm.exe PID 1212 wrote to memory of 948 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe RegAsm.exe PID 1212 wrote to memory of 948 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe RegAsm.exe PID 1212 wrote to memory of 948 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe RegAsm.exe PID 1212 wrote to memory of 948 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe RegAsm.exe PID 1212 wrote to memory of 948 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe RegAsm.exe PID 1212 wrote to memory of 948 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe RegAsm.exe PID 1212 wrote to memory of 948 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe RegAsm.exe PID 1212 wrote to memory of 948 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe RegAsm.exe PID 1212 wrote to memory of 628 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 628 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 628 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 628 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 1768 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 1768 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 1768 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 1768 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 688 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 688 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 688 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 688 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 1304 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 1304 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 1304 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 1304 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 980 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 980 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 980 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 980 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 280 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 280 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 280 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 280 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1692 wrote to memory of 956 1692 File.exe vegas.pro.12.-patch.exe PID 1692 wrote to memory of 956 1692 File.exe vegas.pro.12.-patch.exe PID 1692 wrote to memory of 956 1692 File.exe vegas.pro.12.-patch.exe PID 1692 wrote to memory of 956 1692 File.exe vegas.pro.12.-patch.exe PID 1692 wrote to memory of 956 1692 File.exe vegas.pro.12.-patch.exe PID 1692 wrote to memory of 956 1692 File.exe vegas.pro.12.-patch.exe PID 1692 wrote to memory of 956 1692 File.exe vegas.pro.12.-patch.exe PID 1692 wrote to memory of 968 1692 File.exe vbc.exe PID 1692 wrote to memory of 968 1692 File.exe vbc.exe PID 1692 wrote to memory of 968 1692 File.exe vbc.exe PID 1692 wrote to memory of 968 1692 File.exe vbc.exe PID 1692 wrote to memory of 968 1692 File.exe vbc.exe PID 1692 wrote to memory of 968 1692 File.exe vbc.exe PID 1692 wrote to memory of 968 1692 File.exe vbc.exe PID 1212 wrote to memory of 1996 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 1996 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe PID 1212 wrote to memory of 1996 1212 fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe"C:\Users\Admin\AppData\Local\Temp\fed74fd902778dd9263ec46c97192a4d0238afd343b2c73b43bed3b309df55b7.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\File.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\File.exeC:\Users\Admin\AppData\Local\Temp\File.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\vegas.pro.12.-patch.exe"C:\Users\Admin\AppData\Local\Temp\vegas.pro.12.-patch.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:968
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵PID:948
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr125.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe" /f2⤵
- Creates scheduled task(s)
PID:628
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr125.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe" /f2⤵
- Creates scheduled task(s)
PID:1768
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr125.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe" /f2⤵
- Creates scheduled task(s)
PID:688
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr125.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe" /f2⤵
- Creates scheduled task(s)
PID:1304
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr125.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe" /f2⤵
- Creates scheduled task(s)
PID:980
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr125.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe" /f2⤵
- Creates scheduled task(s)
PID:280
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr125.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe" /f2⤵
- Creates scheduled task(s)
PID:1996
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr125.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe" /f2⤵
- Creates scheduled task(s)
PID:1612
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr125.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe" /f2⤵
- Creates scheduled task(s)
PID:1736
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr125.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe" /f2⤵
- Creates scheduled task(s)
PID:976
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr125.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe" /f2⤵
- Creates scheduled task(s)
PID:1712
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr125.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe" /f2⤵
- Creates scheduled task(s)
PID:1812
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5681⤵
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
C:\Windows\system32\taskeng.exetaskeng.exe {78617E62-086C-4089-A98A-1E222511892D} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵PID:1524
-
C:\Users\Admin\AppData\Roaming\Windows\winmgr125.exeC:\Users\Admin\AppData\Roaming\Windows\winmgr125.exe2⤵
- Executes dropped EXE
PID:268
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD55e39c63781767d37289b856d42d7a466
SHA14b677be118b2c5c0413d0e47691e8c9266502006
SHA25650b35255bdaf57c1afe35589925e0a7a8ad549880518f8b22ef07e704aac4ad1
SHA512f2f5319cd6eab3c0b21bb5f2b7a6d2714af5597547fecf4d6c881c09e4d36d50660942a3c90646ca2c0fcc79f1f982b1de451b0e725237962fda977ef34c7110
-
Filesize
1.1MB
MD55e39c63781767d37289b856d42d7a466
SHA14b677be118b2c5c0413d0e47691e8c9266502006
SHA25650b35255bdaf57c1afe35589925e0a7a8ad549880518f8b22ef07e704aac4ad1
SHA512f2f5319cd6eab3c0b21bb5f2b7a6d2714af5597547fecf4d6c881c09e4d36d50660942a3c90646ca2c0fcc79f1f982b1de451b0e725237962fda977ef34c7110
-
Filesize
104KB
MD5252ff7ee1ee5556f3060ccdb4a5f546a
SHA175b012ccb52d403a8beb55b1382e9dae25a25af5
SHA2561ddb00abce8dbda3aa0dd5e4d2d00c14b9b668c9b4533058764163706c1e093d
SHA51273e4313230c2efd717902ec3b5a8a7ef5b57b3f1c3624c465f350efa2dca273d5f988275a519c927ff76b0cc811ab399c01c493ba82ee06a3c05c56459ee5972
-
Filesize
104KB
MD5252ff7ee1ee5556f3060ccdb4a5f546a
SHA175b012ccb52d403a8beb55b1382e9dae25a25af5
SHA2561ddb00abce8dbda3aa0dd5e4d2d00c14b9b668c9b4533058764163706c1e093d
SHA51273e4313230c2efd717902ec3b5a8a7ef5b57b3f1c3624c465f350efa2dca273d5f988275a519c927ff76b0cc811ab399c01c493ba82ee06a3c05c56459ee5972
-
Filesize
923KB
MD59ce24ef65f2af35e42079ea84b535097
SHA1fb2b10c924e107597aabf49d5bb6c624ac10e3b4
SHA256903bcf62888ce93b6b7e29a6c6243bf0f11931b5db02c703cd7ea857737c2358
SHA512dad6168e4f0ee425fca9522d7dc5a79ef51f279c37a293e2cfaa3ce0faf24165a485042bebcb6984a0fe47eba9e847a6f55cc53721514c71141c0c5deb517197
-
Filesize
923KB
MD59ce24ef65f2af35e42079ea84b535097
SHA1fb2b10c924e107597aabf49d5bb6c624ac10e3b4
SHA256903bcf62888ce93b6b7e29a6c6243bf0f11931b5db02c703cd7ea857737c2358
SHA512dad6168e4f0ee425fca9522d7dc5a79ef51f279c37a293e2cfaa3ce0faf24165a485042bebcb6984a0fe47eba9e847a6f55cc53721514c71141c0c5deb517197
-
Filesize
5.2MB
MD587b0ab9ea7c848a123b6d549e40132f1
SHA1d38c00b3d916aadb61b2fd6d4653f8c214c1033f
SHA2560eea6b205bb130bf91377842c10c6c4f73d56e94300209053fce945a3cd1db79
SHA512c164bbfa9a84aad0ab074fa905523ee271a0c1fec1b195a52eb172dba70e25d7a9b7d63de00ddf69711d7d7d0575bacfa1bd1454bddc67ef7f80e2dc63852428
-
Filesize
5.2MB
MD587b0ab9ea7c848a123b6d549e40132f1
SHA1d38c00b3d916aadb61b2fd6d4653f8c214c1033f
SHA2560eea6b205bb130bf91377842c10c6c4f73d56e94300209053fce945a3cd1db79
SHA512c164bbfa9a84aad0ab074fa905523ee271a0c1fec1b195a52eb172dba70e25d7a9b7d63de00ddf69711d7d7d0575bacfa1bd1454bddc67ef7f80e2dc63852428
-
Filesize
1.1MB
MD55e39c63781767d37289b856d42d7a466
SHA14b677be118b2c5c0413d0e47691e8c9266502006
SHA25650b35255bdaf57c1afe35589925e0a7a8ad549880518f8b22ef07e704aac4ad1
SHA512f2f5319cd6eab3c0b21bb5f2b7a6d2714af5597547fecf4d6c881c09e4d36d50660942a3c90646ca2c0fcc79f1f982b1de451b0e725237962fda977ef34c7110
-
Filesize
1.1MB
MD55e39c63781767d37289b856d42d7a466
SHA14b677be118b2c5c0413d0e47691e8c9266502006
SHA25650b35255bdaf57c1afe35589925e0a7a8ad549880518f8b22ef07e704aac4ad1
SHA512f2f5319cd6eab3c0b21bb5f2b7a6d2714af5597547fecf4d6c881c09e4d36d50660942a3c90646ca2c0fcc79f1f982b1de451b0e725237962fda977ef34c7110
-
Filesize
1.1MB
MD55e39c63781767d37289b856d42d7a466
SHA14b677be118b2c5c0413d0e47691e8c9266502006
SHA25650b35255bdaf57c1afe35589925e0a7a8ad549880518f8b22ef07e704aac4ad1
SHA512f2f5319cd6eab3c0b21bb5f2b7a6d2714af5597547fecf4d6c881c09e4d36d50660942a3c90646ca2c0fcc79f1f982b1de451b0e725237962fda977ef34c7110
-
Filesize
1.1MB
MD55e39c63781767d37289b856d42d7a466
SHA14b677be118b2c5c0413d0e47691e8c9266502006
SHA25650b35255bdaf57c1afe35589925e0a7a8ad549880518f8b22ef07e704aac4ad1
SHA512f2f5319cd6eab3c0b21bb5f2b7a6d2714af5597547fecf4d6c881c09e4d36d50660942a3c90646ca2c0fcc79f1f982b1de451b0e725237962fda977ef34c7110
-
Filesize
1.1MB
MD55e39c63781767d37289b856d42d7a466
SHA14b677be118b2c5c0413d0e47691e8c9266502006
SHA25650b35255bdaf57c1afe35589925e0a7a8ad549880518f8b22ef07e704aac4ad1
SHA512f2f5319cd6eab3c0b21bb5f2b7a6d2714af5597547fecf4d6c881c09e4d36d50660942a3c90646ca2c0fcc79f1f982b1de451b0e725237962fda977ef34c7110
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822
-
Filesize
615KB
MD5ad68a51c74adfd0ea926a692783d6479
SHA1a828edd399720c492e8fe556acbc4e6d9649ad8d
SHA256394b34e3ea4114e2181324e0a289e1db0cec01a15886af2bf1c23610cf415e76
SHA51231e5583c65d77114045735e1561fef896cdcfc53fd0bf367baa3e4d234931edf3b6756ae6a66be2babc8c8d7d9e1ba33f7475ccc560b6766a6ee10c389ef1904
-
Filesize
104KB
MD5252ff7ee1ee5556f3060ccdb4a5f546a
SHA175b012ccb52d403a8beb55b1382e9dae25a25af5
SHA2561ddb00abce8dbda3aa0dd5e4d2d00c14b9b668c9b4533058764163706c1e093d
SHA51273e4313230c2efd717902ec3b5a8a7ef5b57b3f1c3624c465f350efa2dca273d5f988275a519c927ff76b0cc811ab399c01c493ba82ee06a3c05c56459ee5972
-
Filesize
104KB
MD5252ff7ee1ee5556f3060ccdb4a5f546a
SHA175b012ccb52d403a8beb55b1382e9dae25a25af5
SHA2561ddb00abce8dbda3aa0dd5e4d2d00c14b9b668c9b4533058764163706c1e093d
SHA51273e4313230c2efd717902ec3b5a8a7ef5b57b3f1c3624c465f350efa2dca273d5f988275a519c927ff76b0cc811ab399c01c493ba82ee06a3c05c56459ee5972
-
Filesize
104KB
MD5252ff7ee1ee5556f3060ccdb4a5f546a
SHA175b012ccb52d403a8beb55b1382e9dae25a25af5
SHA2561ddb00abce8dbda3aa0dd5e4d2d00c14b9b668c9b4533058764163706c1e093d
SHA51273e4313230c2efd717902ec3b5a8a7ef5b57b3f1c3624c465f350efa2dca273d5f988275a519c927ff76b0cc811ab399c01c493ba82ee06a3c05c56459ee5972
-
Filesize
923KB
MD59ce24ef65f2af35e42079ea84b535097
SHA1fb2b10c924e107597aabf49d5bb6c624ac10e3b4
SHA256903bcf62888ce93b6b7e29a6c6243bf0f11931b5db02c703cd7ea857737c2358
SHA512dad6168e4f0ee425fca9522d7dc5a79ef51f279c37a293e2cfaa3ce0faf24165a485042bebcb6984a0fe47eba9e847a6f55cc53721514c71141c0c5deb517197
-
Filesize
923KB
MD59ce24ef65f2af35e42079ea84b535097
SHA1fb2b10c924e107597aabf49d5bb6c624ac10e3b4
SHA256903bcf62888ce93b6b7e29a6c6243bf0f11931b5db02c703cd7ea857737c2358
SHA512dad6168e4f0ee425fca9522d7dc5a79ef51f279c37a293e2cfaa3ce0faf24165a485042bebcb6984a0fe47eba9e847a6f55cc53721514c71141c0c5deb517197
-
Filesize
923KB
MD59ce24ef65f2af35e42079ea84b535097
SHA1fb2b10c924e107597aabf49d5bb6c624ac10e3b4
SHA256903bcf62888ce93b6b7e29a6c6243bf0f11931b5db02c703cd7ea857737c2358
SHA512dad6168e4f0ee425fca9522d7dc5a79ef51f279c37a293e2cfaa3ce0faf24165a485042bebcb6984a0fe47eba9e847a6f55cc53721514c71141c0c5deb517197