Analysis
-
max time kernel
108s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 00:31
Behavioral task
behavioral1
Sample
26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe
Resource
win10v2004-20221111-en
General
-
Target
26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe
-
Size
9.5MB
-
MD5
f203f8d434b9ebe125cb1c08d827c24d
-
SHA1
a1461c7883ecc37c0ab8a1bdfc3894c2a9aff6b0
-
SHA256
26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929
-
SHA512
e74cb83daa760b904fa1e37700efe52a042aa64ab459ac2653e98edc75bef9b5aab1c47321188f89a3f23ac7874ef4ed58a39eb9f311f3b868c7bbbfe49e5df8
-
SSDEEP
98304:RtytNt8tytNt0tytNt8tytNtEtytNt8tytNtEtytNt8tytNtWt:LkvCkvqkvCkvakvCkvakvCkvw
Malware Config
Signatures
-
Executes dropped EXE 13 IoCs
pid Process 316 tmp7120010.exe 876 tmp7120431.exe 1600 notpad.exe 1652 tmp7121820.exe 272 tmp7122490.exe 1664 notpad.exe 1824 tmp7123114.exe 1108 tmp7181178.exe 612 notpad.exe 1276 tmp7185156.exe 108 tmp7223704.exe 1548 tmp7225139.exe 1320 tmp7226091.exe -
resource yara_rule behavioral1/memory/268-62-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0008000000013a20-70.dat upx behavioral1/files/0x0008000000013a20-73.dat upx behavioral1/files/0x0008000000013a20-71.dat upx behavioral1/files/0x0008000000013a20-74.dat upx behavioral1/memory/1600-87-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0007000000013a04-84.dat upx behavioral1/files/0x0008000000013a20-91.dat upx behavioral1/files/0x0008000000013a20-89.dat upx behavioral1/files/0x0008000000013a20-88.dat upx behavioral1/memory/1664-92-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0007000000013a04-100.dat upx behavioral1/memory/1664-104-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0009000000013a20-107.dat upx behavioral1/files/0x0009000000013a20-106.dat upx behavioral1/files/0x0009000000013a20-110.dat upx behavioral1/files/0x0009000000013a20-109.dat upx behavioral1/memory/612-111-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00070000000142a5-117.dat upx behavioral1/files/0x00070000000142a5-116.dat upx behavioral1/files/0x00070000000142a5-121.dat upx behavioral1/memory/612-122-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00070000000142a5-120.dat upx behavioral1/memory/108-137-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/108-130-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0007000000013a04-126.dat upx -
Loads dropped DLL 26 IoCs
pid Process 268 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 268 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 268 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 268 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 472 WerFault.exe 472 WerFault.exe 472 WerFault.exe 316 tmp7120010.exe 316 tmp7120010.exe 1600 notpad.exe 1600 notpad.exe 1600 notpad.exe 1652 tmp7121820.exe 1652 tmp7121820.exe 1664 notpad.exe 1664 notpad.exe 1664 notpad.exe 1824 tmp7123114.exe 1824 tmp7123114.exe 612 notpad.exe 612 notpad.exe 612 notpad.exe 612 notpad.exe 108 tmp7223704.exe 108 tmp7223704.exe 108 tmp7223704.exe -
Drops file in System32 directory 13 IoCs
description ioc Process File created C:\Windows\SysWOW64\notpad.exe- tmp7120010.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7121820.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7121820.exe File created C:\Windows\SysWOW64\notpad.exe tmp7121820.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7123114.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7123114.exe File created C:\Windows\SysWOW64\fsb.tmp tmp7120010.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7120010.exe File created C:\Windows\SysWOW64\notpad.exe tmp7123114.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7185156.exe File created C:\Windows\SysWOW64\notpad.exe tmp7185156.exe File created C:\Windows\SysWOW64\notpad.exe tmp7120010.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7185156.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process 472 876 WerFault.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7120010.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7121820.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7123114.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7185156.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 268 wrote to memory of 316 268 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 28 PID 268 wrote to memory of 316 268 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 28 PID 268 wrote to memory of 316 268 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 28 PID 268 wrote to memory of 316 268 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 28 PID 268 wrote to memory of 876 268 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 30 PID 268 wrote to memory of 876 268 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 30 PID 268 wrote to memory of 876 268 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 30 PID 268 wrote to memory of 876 268 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 30 PID 876 wrote to memory of 472 876 tmp7120431.exe 29 PID 876 wrote to memory of 472 876 tmp7120431.exe 29 PID 876 wrote to memory of 472 876 tmp7120431.exe 29 PID 876 wrote to memory of 472 876 tmp7120431.exe 29 PID 316 wrote to memory of 1600 316 tmp7120010.exe 31 PID 316 wrote to memory of 1600 316 tmp7120010.exe 31 PID 316 wrote to memory of 1600 316 tmp7120010.exe 31 PID 316 wrote to memory of 1600 316 tmp7120010.exe 31 PID 1600 wrote to memory of 1652 1600 notpad.exe 32 PID 1600 wrote to memory of 1652 1600 notpad.exe 32 PID 1600 wrote to memory of 1652 1600 notpad.exe 32 PID 1600 wrote to memory of 1652 1600 notpad.exe 32 PID 1600 wrote to memory of 272 1600 notpad.exe 34 PID 1600 wrote to memory of 272 1600 notpad.exe 34 PID 1600 wrote to memory of 272 1600 notpad.exe 34 PID 1600 wrote to memory of 272 1600 notpad.exe 34 PID 1652 wrote to memory of 1664 1652 tmp7121820.exe 33 PID 1652 wrote to memory of 1664 1652 tmp7121820.exe 33 PID 1652 wrote to memory of 1664 1652 tmp7121820.exe 33 PID 1652 wrote to memory of 1664 1652 tmp7121820.exe 33 PID 1664 wrote to memory of 1824 1664 notpad.exe 35 PID 1664 wrote to memory of 1824 1664 notpad.exe 35 PID 1664 wrote to memory of 1824 1664 notpad.exe 35 PID 1664 wrote to memory of 1824 1664 notpad.exe 35 PID 1664 wrote to memory of 1108 1664 notpad.exe 36 PID 1664 wrote to memory of 1108 1664 notpad.exe 36 PID 1664 wrote to memory of 1108 1664 notpad.exe 36 PID 1664 wrote to memory of 1108 1664 notpad.exe 36 PID 1824 wrote to memory of 612 1824 tmp7123114.exe 37 PID 1824 wrote to memory of 612 1824 tmp7123114.exe 37 PID 1824 wrote to memory of 612 1824 tmp7123114.exe 37 PID 1824 wrote to memory of 612 1824 tmp7123114.exe 37 PID 612 wrote to memory of 1276 612 notpad.exe 38 PID 612 wrote to memory of 1276 612 notpad.exe 38 PID 612 wrote to memory of 1276 612 notpad.exe 38 PID 612 wrote to memory of 1276 612 notpad.exe 38 PID 612 wrote to memory of 108 612 notpad.exe 39 PID 612 wrote to memory of 108 612 notpad.exe 39 PID 612 wrote to memory of 108 612 notpad.exe 39 PID 612 wrote to memory of 108 612 notpad.exe 39 PID 108 wrote to memory of 1548 108 tmp7223704.exe 40 PID 108 wrote to memory of 1548 108 tmp7223704.exe 40 PID 108 wrote to memory of 1548 108 tmp7223704.exe 40 PID 108 wrote to memory of 1548 108 tmp7223704.exe 40 PID 108 wrote to memory of 1320 108 tmp7223704.exe 41 PID 108 wrote to memory of 1320 108 tmp7223704.exe 41 PID 108 wrote to memory of 1320 108 tmp7223704.exe 41 PID 108 wrote to memory of 1320 108 tmp7223704.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe"C:\Users\Admin\AppData\Local\Temp\26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\tmp7120010.exeC:\Users\Admin\AppData\Local\Temp\tmp7120010.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\tmp7121820.exeC:\Users\Admin\AppData\Local\Temp\tmp7121820.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\tmp7123114.exeC:\Users\Admin\AppData\Local\Temp\tmp7123114.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Users\Admin\AppData\Local\Temp\tmp7185156.exeC:\Users\Admin\AppData\Local\Temp\tmp7185156.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1276
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7223704.exeC:\Users\Admin\AppData\Local\Temp\tmp7223704.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Users\Admin\AppData\Local\Temp\tmp7225139.exeC:\Users\Admin\AppData\Local\Temp\tmp7225139.exe9⤵
- Executes dropped EXE
PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7226091.exeC:\Users\Admin\AppData\Local\Temp\tmp7226091.exe9⤵
- Executes dropped EXE
PID:1320
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7181178.exeC:\Users\Admin\AppData\Local\Temp\tmp7181178.exe6⤵
- Executes dropped EXE
PID:1108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7122490.exeC:\Users\Admin\AppData\Local\Temp\tmp7122490.exe4⤵
- Executes dropped EXE
PID:272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7120431.exeC:\Users\Admin\AppData\Local\Temp\tmp7120431.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 876 -s 361⤵
- Loads dropped DLL
- Program crash
PID:472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
136KB
MD59aeb06a81883647698958706907b1c8b
SHA11ed819748dd1683826910789ce3c0e331ab636b9
SHA2562739d7b4fc7ec6f5ccbed17d4c9f57c8905147bdc926a1995e1f9c4f258d55cc
SHA512d388602a1e322789dda56df6776d570972acce420e45044699f7178115f8c20f32f9723a63657c58771df3ef54afa3193e817679b91cc24fe80d94c78ad09bbe
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
175KB
MD5d378bffb70923139d6a4f546864aa61c
SHA1f00aa51c2ed8b2f656318fdc01ee1cf5441011a4
SHA256c4232ddd4d37b9c0884bd44d8476578c54d7f98d58945728e425736a6a07e102
SHA5127c09ec193d91d3cadb7e58c634b8666d8d6243b3ee7d4d4755eeb82bac62b9508e78aa3c53106bfe72d7a437f650b29a54116663e1b4da11613a30656cccc663
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
175KB
MD5d378bffb70923139d6a4f546864aa61c
SHA1f00aa51c2ed8b2f656318fdc01ee1cf5441011a4
SHA256c4232ddd4d37b9c0884bd44d8476578c54d7f98d58945728e425736a6a07e102
SHA5127c09ec193d91d3cadb7e58c634b8666d8d6243b3ee7d4d4755eeb82bac62b9508e78aa3c53106bfe72d7a437f650b29a54116663e1b4da11613a30656cccc663
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.6MB
MD500cad02e3fedc30f3a877db87f28cc28
SHA173611464cbc5b617f745485f7a6e17c115da31b6
SHA256e16bc1b577c575605e3f8e65e765fb8938d6dda7184d1a7f5e6619002514a0ae
SHA5122aa05479fd6d9cd3d38440ef65e7355b995ce81e44c3bcc92c45808d7ccb0215eb4582fd460d3ea476217d8898f1932ba494bbdd61ec232e55960088a2bab077
-
Filesize
9.6MB
MD500cad02e3fedc30f3a877db87f28cc28
SHA173611464cbc5b617f745485f7a6e17c115da31b6
SHA256e16bc1b577c575605e3f8e65e765fb8938d6dda7184d1a7f5e6619002514a0ae
SHA5122aa05479fd6d9cd3d38440ef65e7355b995ce81e44c3bcc92c45808d7ccb0215eb4582fd460d3ea476217d8898f1932ba494bbdd61ec232e55960088a2bab077
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
175KB
MD5d378bffb70923139d6a4f546864aa61c
SHA1f00aa51c2ed8b2f656318fdc01ee1cf5441011a4
SHA256c4232ddd4d37b9c0884bd44d8476578c54d7f98d58945728e425736a6a07e102
SHA5127c09ec193d91d3cadb7e58c634b8666d8d6243b3ee7d4d4755eeb82bac62b9508e78aa3c53106bfe72d7a437f650b29a54116663e1b4da11613a30656cccc663
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.6MB
MD500cad02e3fedc30f3a877db87f28cc28
SHA173611464cbc5b617f745485f7a6e17c115da31b6
SHA256e16bc1b577c575605e3f8e65e765fb8938d6dda7184d1a7f5e6619002514a0ae
SHA5122aa05479fd6d9cd3d38440ef65e7355b995ce81e44c3bcc92c45808d7ccb0215eb4582fd460d3ea476217d8898f1932ba494bbdd61ec232e55960088a2bab077
-
Filesize
9.6MB
MD500cad02e3fedc30f3a877db87f28cc28
SHA173611464cbc5b617f745485f7a6e17c115da31b6
SHA256e16bc1b577c575605e3f8e65e765fb8938d6dda7184d1a7f5e6619002514a0ae
SHA5122aa05479fd6d9cd3d38440ef65e7355b995ce81e44c3bcc92c45808d7ccb0215eb4582fd460d3ea476217d8898f1932ba494bbdd61ec232e55960088a2bab077
-
Filesize
9.6MB
MD500cad02e3fedc30f3a877db87f28cc28
SHA173611464cbc5b617f745485f7a6e17c115da31b6
SHA256e16bc1b577c575605e3f8e65e765fb8938d6dda7184d1a7f5e6619002514a0ae
SHA5122aa05479fd6d9cd3d38440ef65e7355b995ce81e44c3bcc92c45808d7ccb0215eb4582fd460d3ea476217d8898f1932ba494bbdd61ec232e55960088a2bab077
-
Filesize
19.0MB
MD5617b660bc5da3a910c9e0f9d1cc5cee8
SHA1c74ea0a3fbea8714da1599451bd45432b8f383a3
SHA2568f6f424fe29b9baf656d5bdba67fe211acea7667766e6ddfa3617ef603167945
SHA51230c6b4d68bd27b02a95a963439876536f487a1f61872ce81969a21982166c2cb608dbca7588a0d81f2d4c0a1c219b4b4914b203bbc25c7d48edd0f1a46be1495
-
Filesize
19.0MB
MD5617b660bc5da3a910c9e0f9d1cc5cee8
SHA1c74ea0a3fbea8714da1599451bd45432b8f383a3
SHA2568f6f424fe29b9baf656d5bdba67fe211acea7667766e6ddfa3617ef603167945
SHA51230c6b4d68bd27b02a95a963439876536f487a1f61872ce81969a21982166c2cb608dbca7588a0d81f2d4c0a1c219b4b4914b203bbc25c7d48edd0f1a46be1495
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
136KB
MD59aeb06a81883647698958706907b1c8b
SHA11ed819748dd1683826910789ce3c0e331ab636b9
SHA2562739d7b4fc7ec6f5ccbed17d4c9f57c8905147bdc926a1995e1f9c4f258d55cc
SHA512d388602a1e322789dda56df6776d570972acce420e45044699f7178115f8c20f32f9723a63657c58771df3ef54afa3193e817679b91cc24fe80d94c78ad09bbe
-
Filesize
136KB
MD59aeb06a81883647698958706907b1c8b
SHA11ed819748dd1683826910789ce3c0e331ab636b9
SHA2562739d7b4fc7ec6f5ccbed17d4c9f57c8905147bdc926a1995e1f9c4f258d55cc
SHA512d388602a1e322789dda56df6776d570972acce420e45044699f7178115f8c20f32f9723a63657c58771df3ef54afa3193e817679b91cc24fe80d94c78ad09bbe
-
Filesize
136KB
MD59aeb06a81883647698958706907b1c8b
SHA11ed819748dd1683826910789ce3c0e331ab636b9
SHA2562739d7b4fc7ec6f5ccbed17d4c9f57c8905147bdc926a1995e1f9c4f258d55cc
SHA512d388602a1e322789dda56df6776d570972acce420e45044699f7178115f8c20f32f9723a63657c58771df3ef54afa3193e817679b91cc24fe80d94c78ad09bbe
-
Filesize
136KB
MD59aeb06a81883647698958706907b1c8b
SHA11ed819748dd1683826910789ce3c0e331ab636b9
SHA2562739d7b4fc7ec6f5ccbed17d4c9f57c8905147bdc926a1995e1f9c4f258d55cc
SHA512d388602a1e322789dda56df6776d570972acce420e45044699f7178115f8c20f32f9723a63657c58771df3ef54afa3193e817679b91cc24fe80d94c78ad09bbe
-
Filesize
136KB
MD59aeb06a81883647698958706907b1c8b
SHA11ed819748dd1683826910789ce3c0e331ab636b9
SHA2562739d7b4fc7ec6f5ccbed17d4c9f57c8905147bdc926a1995e1f9c4f258d55cc
SHA512d388602a1e322789dda56df6776d570972acce420e45044699f7178115f8c20f32f9723a63657c58771df3ef54afa3193e817679b91cc24fe80d94c78ad09bbe
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
175KB
MD5d378bffb70923139d6a4f546864aa61c
SHA1f00aa51c2ed8b2f656318fdc01ee1cf5441011a4
SHA256c4232ddd4d37b9c0884bd44d8476578c54d7f98d58945728e425736a6a07e102
SHA5127c09ec193d91d3cadb7e58c634b8666d8d6243b3ee7d4d4755eeb82bac62b9508e78aa3c53106bfe72d7a437f650b29a54116663e1b4da11613a30656cccc663
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
175KB
MD5d378bffb70923139d6a4f546864aa61c
SHA1f00aa51c2ed8b2f656318fdc01ee1cf5441011a4
SHA256c4232ddd4d37b9c0884bd44d8476578c54d7f98d58945728e425736a6a07e102
SHA5127c09ec193d91d3cadb7e58c634b8666d8d6243b3ee7d4d4755eeb82bac62b9508e78aa3c53106bfe72d7a437f650b29a54116663e1b4da11613a30656cccc663
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.6MB
MD500cad02e3fedc30f3a877db87f28cc28
SHA173611464cbc5b617f745485f7a6e17c115da31b6
SHA256e16bc1b577c575605e3f8e65e765fb8938d6dda7184d1a7f5e6619002514a0ae
SHA5122aa05479fd6d9cd3d38440ef65e7355b995ce81e44c3bcc92c45808d7ccb0215eb4582fd460d3ea476217d8898f1932ba494bbdd61ec232e55960088a2bab077
-
Filesize
9.6MB
MD500cad02e3fedc30f3a877db87f28cc28
SHA173611464cbc5b617f745485f7a6e17c115da31b6
SHA256e16bc1b577c575605e3f8e65e765fb8938d6dda7184d1a7f5e6619002514a0ae
SHA5122aa05479fd6d9cd3d38440ef65e7355b995ce81e44c3bcc92c45808d7ccb0215eb4582fd460d3ea476217d8898f1932ba494bbdd61ec232e55960088a2bab077
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
175KB
MD5d378bffb70923139d6a4f546864aa61c
SHA1f00aa51c2ed8b2f656318fdc01ee1cf5441011a4
SHA256c4232ddd4d37b9c0884bd44d8476578c54d7f98d58945728e425736a6a07e102
SHA5127c09ec193d91d3cadb7e58c634b8666d8d6243b3ee7d4d4755eeb82bac62b9508e78aa3c53106bfe72d7a437f650b29a54116663e1b4da11613a30656cccc663
-
Filesize
9.6MB
MD500cad02e3fedc30f3a877db87f28cc28
SHA173611464cbc5b617f745485f7a6e17c115da31b6
SHA256e16bc1b577c575605e3f8e65e765fb8938d6dda7184d1a7f5e6619002514a0ae
SHA5122aa05479fd6d9cd3d38440ef65e7355b995ce81e44c3bcc92c45808d7ccb0215eb4582fd460d3ea476217d8898f1932ba494bbdd61ec232e55960088a2bab077
-
Filesize
9.6MB
MD500cad02e3fedc30f3a877db87f28cc28
SHA173611464cbc5b617f745485f7a6e17c115da31b6
SHA256e16bc1b577c575605e3f8e65e765fb8938d6dda7184d1a7f5e6619002514a0ae
SHA5122aa05479fd6d9cd3d38440ef65e7355b995ce81e44c3bcc92c45808d7ccb0215eb4582fd460d3ea476217d8898f1932ba494bbdd61ec232e55960088a2bab077
-
Filesize
9.6MB
MD500cad02e3fedc30f3a877db87f28cc28
SHA173611464cbc5b617f745485f7a6e17c115da31b6
SHA256e16bc1b577c575605e3f8e65e765fb8938d6dda7184d1a7f5e6619002514a0ae
SHA5122aa05479fd6d9cd3d38440ef65e7355b995ce81e44c3bcc92c45808d7ccb0215eb4582fd460d3ea476217d8898f1932ba494bbdd61ec232e55960088a2bab077
-
Filesize
9.6MB
MD500cad02e3fedc30f3a877db87f28cc28
SHA173611464cbc5b617f745485f7a6e17c115da31b6
SHA256e16bc1b577c575605e3f8e65e765fb8938d6dda7184d1a7f5e6619002514a0ae
SHA5122aa05479fd6d9cd3d38440ef65e7355b995ce81e44c3bcc92c45808d7ccb0215eb4582fd460d3ea476217d8898f1932ba494bbdd61ec232e55960088a2bab077
-
Filesize
19.0MB
MD5617b660bc5da3a910c9e0f9d1cc5cee8
SHA1c74ea0a3fbea8714da1599451bd45432b8f383a3
SHA2568f6f424fe29b9baf656d5bdba67fe211acea7667766e6ddfa3617ef603167945
SHA51230c6b4d68bd27b02a95a963439876536f487a1f61872ce81969a21982166c2cb608dbca7588a0d81f2d4c0a1c219b4b4914b203bbc25c7d48edd0f1a46be1495
-
Filesize
19.0MB
MD5617b660bc5da3a910c9e0f9d1cc5cee8
SHA1c74ea0a3fbea8714da1599451bd45432b8f383a3
SHA2568f6f424fe29b9baf656d5bdba67fe211acea7667766e6ddfa3617ef603167945
SHA51230c6b4d68bd27b02a95a963439876536f487a1f61872ce81969a21982166c2cb608dbca7588a0d81f2d4c0a1c219b4b4914b203bbc25c7d48edd0f1a46be1495