Analysis
-
max time kernel
207s -
max time network
226s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 00:31
Behavioral task
behavioral1
Sample
26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe
Resource
win10v2004-20221111-en
General
-
Target
26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe
-
Size
9.5MB
-
MD5
f203f8d434b9ebe125cb1c08d827c24d
-
SHA1
a1461c7883ecc37c0ab8a1bdfc3894c2a9aff6b0
-
SHA256
26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929
-
SHA512
e74cb83daa760b904fa1e37700efe52a042aa64ab459ac2653e98edc75bef9b5aab1c47321188f89a3f23ac7874ef4ed58a39eb9f311f3b868c7bbbfe49e5df8
-
SSDEEP
98304:RtytNt8tytNt0tytNt8tytNtEtytNt8tytNtEtytNt8tytNtWt:LkvCkvqkvCkvakvCkvakvCkvw
Malware Config
Signatures
-
Executes dropped EXE 13 IoCs
pid Process 112 tmp240615640.exe 528 tmp240616468.exe 4672 notpad.exe 632 tmp240661046.exe 3316 tmp240661718.exe 1560 notpad.exe 5100 tmp240663703.exe 4112 tmp240711343.exe 1288 notpad.exe 2152 tmp240722156.exe 216 notpad.exe 3876 tmp240752031.exe 3524 tmp240754078.exe -
resource yara_rule behavioral2/memory/4216-132-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4216-139-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000022e12-142.dat upx behavioral2/files/0x0008000000022e12-143.dat upx behavioral2/memory/4672-149-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000b000000022e0a-147.dat upx behavioral2/memory/4672-152-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000022e12-154.dat upx behavioral2/memory/1560-155-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1560-156-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000b000000022e0a-161.dat upx behavioral2/memory/1560-163-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0009000000022e12-166.dat upx behavioral2/files/0x0009000000022e12-167.dat upx behavioral2/memory/1288-168-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000b000000022e0a-172.dat upx behavioral2/files/0x0009000000022e12-175.dat upx behavioral2/memory/216-176-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000c000000022e13-178.dat upx behavioral2/memory/1288-179-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000c000000022e13-180.dat upx behavioral2/files/0x0008000000022e41-188.dat upx behavioral2/memory/216-192-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000022e41-189.dat upx behavioral2/files/0x000b000000022e0a-185.dat upx behavioral2/memory/3096-193-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3096-203-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3876-197-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3876-195-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000a000000022e12-205.dat upx behavioral2/files/0x000a000000022e12-206.dat upx -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation tmp240661046.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation tmp240663703.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation tmp240722156.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation tmp240615640.exe -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240663703.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240663703.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240722156.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240615640.exe File created C:\Windows\SysWOW64\notpad.exe tmp240615640.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240661046.exe File created C:\Windows\SysWOW64\notpad.exe tmp240661046.exe File created C:\Windows\SysWOW64\notpad.exe tmp240663703.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240722156.exe File created C:\Windows\SysWOW64\notpad.exe tmp240722156.exe File created C:\Windows\SysWOW64\fsb.tmp tmp240615640.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240615640.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240661046.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3252 528 WerFault.exe 88 -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240615640.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240661046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240663703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240722156.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4216 wrote to memory of 112 4216 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 87 PID 4216 wrote to memory of 112 4216 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 87 PID 4216 wrote to memory of 112 4216 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 87 PID 4216 wrote to memory of 528 4216 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 88 PID 4216 wrote to memory of 528 4216 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 88 PID 4216 wrote to memory of 528 4216 26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe 88 PID 112 wrote to memory of 4672 112 tmp240615640.exe 93 PID 112 wrote to memory of 4672 112 tmp240615640.exe 93 PID 112 wrote to memory of 4672 112 tmp240615640.exe 93 PID 4672 wrote to memory of 632 4672 notpad.exe 94 PID 4672 wrote to memory of 632 4672 notpad.exe 94 PID 4672 wrote to memory of 632 4672 notpad.exe 94 PID 4672 wrote to memory of 3316 4672 notpad.exe 95 PID 4672 wrote to memory of 3316 4672 notpad.exe 95 PID 4672 wrote to memory of 3316 4672 notpad.exe 95 PID 632 wrote to memory of 1560 632 tmp240661046.exe 96 PID 632 wrote to memory of 1560 632 tmp240661046.exe 96 PID 632 wrote to memory of 1560 632 tmp240661046.exe 96 PID 1560 wrote to memory of 5100 1560 notpad.exe 97 PID 1560 wrote to memory of 5100 1560 notpad.exe 97 PID 1560 wrote to memory of 5100 1560 notpad.exe 97 PID 1560 wrote to memory of 4112 1560 notpad.exe 98 PID 1560 wrote to memory of 4112 1560 notpad.exe 98 PID 1560 wrote to memory of 4112 1560 notpad.exe 98 PID 5100 wrote to memory of 1288 5100 tmp240663703.exe 99 PID 5100 wrote to memory of 1288 5100 tmp240663703.exe 99 PID 5100 wrote to memory of 1288 5100 tmp240663703.exe 99 PID 1288 wrote to memory of 2152 1288 notpad.exe 100 PID 1288 wrote to memory of 2152 1288 notpad.exe 100 PID 1288 wrote to memory of 2152 1288 notpad.exe 100 PID 2152 wrote to memory of 216 2152 tmp240722156.exe 101 PID 2152 wrote to memory of 216 2152 tmp240722156.exe 101 PID 2152 wrote to memory of 216 2152 tmp240722156.exe 101 PID 1288 wrote to memory of 3876 1288 notpad.exe 103 PID 1288 wrote to memory of 3876 1288 notpad.exe 103 PID 1288 wrote to memory of 3876 1288 notpad.exe 103 PID 216 wrote to memory of 3524 216 notpad.exe 104 PID 216 wrote to memory of 3524 216 notpad.exe 104 PID 216 wrote to memory of 3524 216 notpad.exe 104 PID 216 wrote to memory of 3096 216 notpad.exe 105 PID 216 wrote to memory of 3096 216 notpad.exe 105 PID 216 wrote to memory of 3096 216 notpad.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe"C:\Users\Admin\AppData\Local\Temp\26fa89f18a9a705817c3acdc5cffd27eadc9f06217863cdd4be0cb93eecef929.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\tmp240615640.exeC:\Users\Admin\AppData\Local\Temp\tmp240615640.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\tmp240661046.exeC:\Users\Admin\AppData\Local\Temp\tmp240661046.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\tmp240663703.exeC:\Users\Admin\AppData\Local\Temp\tmp240663703.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\tmp240722156.exeC:\Users\Admin\AppData\Local\Temp\tmp240722156.exe8⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\tmp240754078.exeC:\Users\Admin\AppData\Local\Temp\tmp240754078.exe10⤵
- Executes dropped EXE
PID:3524 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵PID:3432
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240762093.exeC:\Users\Admin\AppData\Local\Temp\tmp240762093.exe10⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\tmp240763281.exeC:\Users\Admin\AppData\Local\Temp\tmp240763281.exe11⤵PID:3408
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240762671.exeC:\Users\Admin\AppData\Local\Temp\tmp240762671.exe11⤵PID:1600
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240752031.exeC:\Users\Admin\AppData\Local\Temp\tmp240752031.exe8⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\tmp240762015.exeC:\Users\Admin\AppData\Local\Temp\tmp240762015.exe9⤵PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240762687.exeC:\Users\Admin\AppData\Local\Temp\tmp240762687.exe9⤵PID:3964
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240711343.exeC:\Users\Admin\AppData\Local\Temp\tmp240711343.exe6⤵
- Executes dropped EXE
PID:4112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240661718.exeC:\Users\Admin\AppData\Local\Temp\tmp240661718.exe4⤵
- Executes dropped EXE
PID:3316
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240616468.exeC:\Users\Admin\AppData\Local\Temp\tmp240616468.exe2⤵
- Executes dropped EXE
PID:528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 2243⤵
- Program crash
PID:3252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 528 -ip 5281⤵PID:3376
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
136KB
MD59aeb06a81883647698958706907b1c8b
SHA11ed819748dd1683826910789ce3c0e331ab636b9
SHA2562739d7b4fc7ec6f5ccbed17d4c9f57c8905147bdc926a1995e1f9c4f258d55cc
SHA512d388602a1e322789dda56df6776d570972acce420e45044699f7178115f8c20f32f9723a63657c58771df3ef54afa3193e817679b91cc24fe80d94c78ad09bbe
-
Filesize
136KB
MD59aeb06a81883647698958706907b1c8b
SHA11ed819748dd1683826910789ce3c0e331ab636b9
SHA2562739d7b4fc7ec6f5ccbed17d4c9f57c8905147bdc926a1995e1f9c4f258d55cc
SHA512d388602a1e322789dda56df6776d570972acce420e45044699f7178115f8c20f32f9723a63657c58771df3ef54afa3193e817679b91cc24fe80d94c78ad09bbe
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
162KB
MD5e92d3a824a0578a50d2dd81b5060145f
SHA150ef7c645fd5cbb95d50fbaddf6213800f9296ec
SHA25687f53bc444c05230ce439dbb127c03f2e374067d6fb08e91c834371fd9ecf661
SHA51240d0ac6fa5a424b099923fcdb465e9a2f44569af1c75cf05323315a8720517316a7e8627be248cff3a83382fb6db1cf026161f627a39bc1908e63f67a34c0fd5
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
162KB
MD5e92d3a824a0578a50d2dd81b5060145f
SHA150ef7c645fd5cbb95d50fbaddf6213800f9296ec
SHA25687f53bc444c05230ce439dbb127c03f2e374067d6fb08e91c834371fd9ecf661
SHA51240d0ac6fa5a424b099923fcdb465e9a2f44569af1c75cf05323315a8720517316a7e8627be248cff3a83382fb6db1cf026161f627a39bc1908e63f67a34c0fd5
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
8.5MB
MD5a6e7376c3ce5382b5451bfb5974eaf06
SHA1137fe8da76a3e2a26535b9ee83d9290e78513d73
SHA2561eda514e668bce1462ba2534eba7075aa8b7790a59594e4e4ab345e8cfac69ff
SHA51290a424eb7783bf06c55fb72e91b881f016345cd85d4cd5efdeef7349f3208ef146920b040199f875937ac10ca8d81fa050944d1b96038472ec6ed64170dd2ebe
-
Filesize
7.6MB
MD57d8a8aca3e7ee16f9855da497ff3088d
SHA1d1268adddd8ab1b16e166cf7da52cb17005f4f23
SHA25652976898b44df52c50a32d79bbd5aaf0a2c37b13e8e02f32ff372b7f811d70f8
SHA512a11a6d030cb1f936ffe826241fffdb61dce52752f56b86a09460d22315e91aedcaaff273dda6c4e5bf231e109670541c9394c25cb26a291ce6f9a116574cf0a1
-
Filesize
7.2MB
MD5beca30a4c5457aafa80191e6ddc01c73
SHA1ea55b7e95685848385009c5cf451621a2b3f1a85
SHA256e5ac38415634b40b893026b27ced81669631282086aa361601cd280ca5b93bac
SHA5122f1f86d7e974e32845fc97a93d2130ac0e73b66997dda2daf3142beea26cd387ee268aa81d378fc1368aecb515322752b2c28d2454d409f657f1fc26198127b8
-
Filesize
7.1MB
MD5966910ac64f37495857fb1cf5a96ebc3
SHA16d9a4e7eaf9071ef3305204bc121f15676ecff5f
SHA256da89b62ff03fc09476faeba9cb87fefff6a3dd0faf7d0d58f1bcf697d7e175b0
SHA5124bac4fe73951649b889e529c3417c7f0b049cc8dba559e4ccc5a3f98a0f62262429c62fe4f801b5682633151b026405d7835d231c85a0a5a058d849143c93337
-
Filesize
5.0MB
MD56bbf1d1f1c87d654ed55b9b4f833c7d6
SHA1f5dceb0e7d95770d760accde5e8f31751d6a1816
SHA256a44df1f488365138901ed979046780efacf7e434fdb70437a9ce564b3a55a1ca
SHA512da0a00deb23d3369142f5fc4bb3f24d025298bd96464de7bb1d92baa4770f771de1c9ad5c980d558cb060175df0246124124fd6031b626c26ac0dda8259d6b77
-
Filesize
5.1MB
MD5c2983af70ef868231ff8bb5a2750f647
SHA10a91ae9d8c8150a19d3f1f2c7564787f52c9a4e0
SHA2568fda98f21c45b0c19663cb451f1badd75a8d9791c107ddd7d73707be28d0c368
SHA51250b260551eb7741ca04bb4f0c25b4f4673b2e8e197af6673287623e4a27678cdf4484d0b7085a38b5e787a1adc2ca0465cc644dfd89b912b82b8322be06cae27
-
Filesize
4.1MB
MD52beb85bcafcc392d6398a5dd4078cf58
SHA12f88aa15fc7acd7f2a8d31ba5aeb5e7bc7ebf5d3
SHA256f44b0427d866439a1359bcfeedfc418bab88c4b1d2747c70673156480059361c
SHA512c5a0c95d267974495b6da90e808d868b3e3bf8acb2909d835d73b7045dbdf94c932480563741026e93607bd47d0f859005f299e9fcf17a72dfcb0db504492c50
-
Filesize
4.1MB
MD5eec4311b8ffa57f127a02957f4b33a11
SHA1bdc1b2a4fa836dcca1010240f3a7309ddf37ae21
SHA25638f12de903bef36e118ab3e484a6d053a5ccdd77c9144e44aaf39752034959f8
SHA512d12d43857408cc9ddbef7510d574ecdbb79676d2a4e71370bc52b476e0ae026122006f1fff4b887c19494260a1d224068b50fdf0fdb1c186f2c965d828531edb
-
Filesize
3.2MB
MD5fa0670604bd0b585dfb2bb0593cc515d
SHA1a23d3e80009947565a78ab6ac1930479f0a08e5a
SHA2561e0d9673be4aa95c3ed7a89906db6b41bb52c13bea0f18a990b43c5dbe2027af
SHA5122e0189ecb614f0b9907f08f2bc49bad9f936f74a982add74fe50ef5a5bda5084d425f99fd7a524a9f5b08d9c6db6626df4edb197f0327cabda5dee68eee0d61a
-
Filesize
3.1MB
MD517b15d3a645c45360f6394459c4ae895
SHA1bed6ef91707f1f2aced5257404375003a45a38a2
SHA2567cf055d4209e5ca2e57b1636ae6015b0c33209b7599f2a2617e0ea0abce95d68
SHA51221d03445fe1a6fdca524a97e109eb02ebfc2fc19a3e0ceb7e6228b520cba2318a20e730c8e3b657f530fbf58a732ca62758984f39ff1eda2f5b34126a3a90736
-
Filesize
162KB
MD5e92d3a824a0578a50d2dd81b5060145f
SHA150ef7c645fd5cbb95d50fbaddf6213800f9296ec
SHA25687f53bc444c05230ce439dbb127c03f2e374067d6fb08e91c834371fd9ecf661
SHA51240d0ac6fa5a424b099923fcdb465e9a2f44569af1c75cf05323315a8720517316a7e8627be248cff3a83382fb6db1cf026161f627a39bc1908e63f67a34c0fd5
-
Filesize
162KB
MD5e92d3a824a0578a50d2dd81b5060145f
SHA150ef7c645fd5cbb95d50fbaddf6213800f9296ec
SHA25687f53bc444c05230ce439dbb127c03f2e374067d6fb08e91c834371fd9ecf661
SHA51240d0ac6fa5a424b099923fcdb465e9a2f44569af1c75cf05323315a8720517316a7e8627be248cff3a83382fb6db1cf026161f627a39bc1908e63f67a34c0fd5
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
9.4MB
MD557e8db96fcf27a43a6801e86251db314
SHA1435d77c86335466d0b7dac9bdf2023b4b47c273e
SHA2567d41daa2ef10dfaede4423ab9882c6dd03dbfa327c31d05f6413c094aba961c6
SHA51265dd73a7d42d7b899991db27771b54435ddcd18b9b19630093bff9a5c27815910aa3d3ee553542374b298e268c9bb23139c6e48a5e90eabdb97fa95e1f5d0bf1
-
Filesize
5.3MB
MD54418215e600bf9234cfc7a5f316c7a1b
SHA13b2f02c9a07fcfaf5f43a1981718c41d76950ab9
SHA25615098f51e594c26a608aa1e72701c3147ecd2adcedaab36dd26dfe690d6eced5
SHA512840dac9f91f50360bad5d1c976622af268221203f1a806b06614a15c1e0208f421834bc203bb6ea7d4e61f468e052573c4779ef79878d146e742f39defa31571
-
Filesize
9.6MB
MD54b95bfd392769522f24eebb15f57d443
SHA117878211bb8d7dd27b70ea0161d82983302f0c9a
SHA2569ceb8a702e475b746b7a3eda8b0c29f6c2ce2377f4aa96ea731e1b695bbea6f2
SHA512e5672c945d2b5e44cc60c86d6d2c494399ad26672f2e5155862b10879cb61de4953c79178d430e44e853e3521ebe4ecabbe0d1f2f7494fd2b2a55377f5bc6e94
-
Filesize
9.6MB
MD54b95bfd392769522f24eebb15f57d443
SHA117878211bb8d7dd27b70ea0161d82983302f0c9a
SHA2569ceb8a702e475b746b7a3eda8b0c29f6c2ce2377f4aa96ea731e1b695bbea6f2
SHA512e5672c945d2b5e44cc60c86d6d2c494399ad26672f2e5155862b10879cb61de4953c79178d430e44e853e3521ebe4ecabbe0d1f2f7494fd2b2a55377f5bc6e94
-
Filesize
9.6MB
MD54b95bfd392769522f24eebb15f57d443
SHA117878211bb8d7dd27b70ea0161d82983302f0c9a
SHA2569ceb8a702e475b746b7a3eda8b0c29f6c2ce2377f4aa96ea731e1b695bbea6f2
SHA512e5672c945d2b5e44cc60c86d6d2c494399ad26672f2e5155862b10879cb61de4953c79178d430e44e853e3521ebe4ecabbe0d1f2f7494fd2b2a55377f5bc6e94
-
Filesize
19.0MB
MD5a7a3102fc707d5b1ed4975aef74e04ef
SHA1d2375e3cb322ce0e321769d93e766a9afce1cfbd
SHA256ebe16c33f6008edf48852a42099f06f31e1703027596d8894e5987dd50f400aa
SHA512154f4215ef27c5caef18efe82e1898cee338b9f1256d9a5b84d9328ac08f13b302c8f16cd1985d063e77d82453f68adc13df03cb71ea41d659214baa7283f5cd
-
Filesize
19.0MB
MD5a7a3102fc707d5b1ed4975aef74e04ef
SHA1d2375e3cb322ce0e321769d93e766a9afce1cfbd
SHA256ebe16c33f6008edf48852a42099f06f31e1703027596d8894e5987dd50f400aa
SHA512154f4215ef27c5caef18efe82e1898cee338b9f1256d9a5b84d9328ac08f13b302c8f16cd1985d063e77d82453f68adc13df03cb71ea41d659214baa7283f5cd
-
Filesize
19.0MB
MD5a7a3102fc707d5b1ed4975aef74e04ef
SHA1d2375e3cb322ce0e321769d93e766a9afce1cfbd
SHA256ebe16c33f6008edf48852a42099f06f31e1703027596d8894e5987dd50f400aa
SHA512154f4215ef27c5caef18efe82e1898cee338b9f1256d9a5b84d9328ac08f13b302c8f16cd1985d063e77d82453f68adc13df03cb71ea41d659214baa7283f5cd
-
Filesize
320KB
MD50b1692e7805051f47ba445e6610451a3
SHA1aa2298aa88f05c5bf74e652ef001f7969bd15733
SHA256178eb0303d73abfa999857f40fa1b88178f65e403ba3722d8f75a4b561d23b74
SHA512b5556d83f9365de3c85a011ce53d77a07201a6d038ba02a755a26f964961f6271b72db807ecd18db7ca473fd6f3709f1de5ea07cb0fbb5483b0143455e90b252
-
Filesize
192KB
MD543be6cbd336990543f06d51838cc5f2d
SHA14ca58012f345bfd980c52bdced6d0ff5d6417594
SHA25695c2ae1fac5c6008e055f039c7170bf221d08602732d78af2c563f330246eafb
SHA51289c892424b22277be513a63896860fb43873f867d8cd4350e39d3c0783af180b0f1fa4b048e0a1331ea52ff780a3a234a97a4e7e239aaafd48dfbb6f5a93430f
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7