Analysis
-
max time kernel
192s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733.exe
Resource
win10v2004-20221111-en
General
-
Target
c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733.exe
-
Size
4.6MB
-
MD5
0386b46bd77a171de84d04acd787a6e7
-
SHA1
3662012e42e8581d162078ffdc669c7741c3ced4
-
SHA256
c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
-
SHA512
989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
SSDEEP
98304:JrtitfrtitStbrtitStErtitjrtitdrtitfrtitStgrtit:D0h0El0Eg0t0v0h0EE0
Malware Config
Signatures
-
Executes dropped EXE 23 IoCs
pid Process 5056 notpad.exe 4464 tmp240605562.exe 364 tmp240605796.exe 884 notpad.exe 4092 tmp240606640.exe 3320 notpad.exe 3220 tmp240607968.exe 2812 tmp240644796.exe 2844 tmp240630390.exe 3784 tmp240660062.exe 208 tmp240660078.exe 3568 tmp240661515.exe 2144 tmp240689828.exe 2204 notpad.exe 2100 tmp240700984.exe 1080 tmp240702531.exe 1320 tmp240702796.exe 2384 tmp240703234.exe 2680 notpad.exe 4840 tmp240703421.exe 2704 notpad.exe 4536 tmp240705203.exe 4268 tmp240710765.exe -
resource yara_rule behavioral2/files/0x0009000000022d31-133.dat upx behavioral2/files/0x0009000000022d31-134.dat upx behavioral2/memory/5056-143-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000400000001e706-139.dat upx behavioral2/memory/5056-136-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000c000000022e2e-146.dat upx behavioral2/files/0x000c000000022e2e-145.dat upx behavioral2/memory/884-148-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000400000001e706-151.dat upx behavioral2/memory/884-153-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000c000000022e2e-155.dat upx behavioral2/memory/3320-156-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/884-159-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000022e36-160.dat upx behavioral2/files/0x0008000000022e36-158.dat upx behavioral2/memory/3220-161-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000400000001e706-168.dat upx behavioral2/memory/3220-172-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3320-176-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000022e3d-175.dat upx behavioral2/files/0x0008000000022e3d-174.dat upx behavioral2/memory/208-177-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/208-182-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000c000000022e2e-185.dat upx behavioral2/memory/2204-186-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000400000001e706-190.dat upx behavioral2/files/0x0007000000022e77-194.dat upx behavioral2/files/0x0007000000022e77-193.dat upx behavioral2/memory/2204-195-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000c000000022e2e-203.dat upx behavioral2/memory/1080-202-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2680-204-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000400000001e706-208.dat upx behavioral2/files/0x000c000000022e2e-211.dat upx behavioral2/memory/2704-212-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2680-213-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2704-214-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022ea0-219.dat upx behavioral2/memory/4536-220-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2680-217-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022ea0-216.dat upx -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation tmp240605562.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation tmp240606640.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation tmp240630390.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation tmp240700984.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation tmp240703421.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fsb.tmp c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240605562.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240630390.exe File created C:\Windows\SysWOW64\notpad.exe tmp240700984.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240630390.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240703421.exe File created C:\Windows\SysWOW64\notpad.exe c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240605562.exe File created C:\Windows\SysWOW64\notpad.exe tmp240605562.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240606640.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240606640.exe File created C:\Windows\SysWOW64\notpad.exe tmp240606640.exe File created C:\Windows\SysWOW64\notpad.exe tmp240630390.exe File created C:\Windows\SysWOW64\fsb.tmp c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733.exe File created C:\Windows\SysWOW64\notpad.exe- c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240700984.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240700984.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240703421.exe File created C:\Windows\SysWOW64\notpad.exe tmp240703421.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240630390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240700984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240703421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240605562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240606640.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1752 wrote to memory of 5056 1752 c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733.exe 81 PID 1752 wrote to memory of 5056 1752 c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733.exe 81 PID 1752 wrote to memory of 5056 1752 c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733.exe 81 PID 5056 wrote to memory of 4464 5056 notpad.exe 82 PID 5056 wrote to memory of 4464 5056 notpad.exe 82 PID 5056 wrote to memory of 4464 5056 notpad.exe 82 PID 5056 wrote to memory of 364 5056 notpad.exe 83 PID 5056 wrote to memory of 364 5056 notpad.exe 83 PID 5056 wrote to memory of 364 5056 notpad.exe 83 PID 4464 wrote to memory of 884 4464 tmp240605562.exe 84 PID 4464 wrote to memory of 884 4464 tmp240605562.exe 84 PID 4464 wrote to memory of 884 4464 tmp240605562.exe 84 PID 884 wrote to memory of 4092 884 notpad.exe 85 PID 884 wrote to memory of 4092 884 notpad.exe 85 PID 884 wrote to memory of 4092 884 notpad.exe 85 PID 4092 wrote to memory of 3320 4092 tmp240606640.exe 87 PID 4092 wrote to memory of 3320 4092 tmp240606640.exe 87 PID 4092 wrote to memory of 3320 4092 tmp240606640.exe 87 PID 884 wrote to memory of 3220 884 notpad.exe 88 PID 884 wrote to memory of 3220 884 notpad.exe 88 PID 884 wrote to memory of 3220 884 notpad.exe 88 PID 3320 wrote to memory of 2844 3320 notpad.exe 92 PID 3320 wrote to memory of 2844 3320 notpad.exe 92 PID 3320 wrote to memory of 2844 3320 notpad.exe 92 PID 3220 wrote to memory of 2812 3220 tmp240607968.exe 93 PID 3220 wrote to memory of 2812 3220 tmp240607968.exe 93 PID 3220 wrote to memory of 2812 3220 tmp240607968.exe 93 PID 3220 wrote to memory of 3784 3220 tmp240607968.exe 94 PID 3220 wrote to memory of 3784 3220 tmp240607968.exe 94 PID 3220 wrote to memory of 3784 3220 tmp240607968.exe 94 PID 3320 wrote to memory of 208 3320 notpad.exe 95 PID 3320 wrote to memory of 208 3320 notpad.exe 95 PID 3320 wrote to memory of 208 3320 notpad.exe 95 PID 208 wrote to memory of 3568 208 tmp240660078.exe 96 PID 208 wrote to memory of 3568 208 tmp240660078.exe 96 PID 208 wrote to memory of 3568 208 tmp240660078.exe 96 PID 208 wrote to memory of 2144 208 tmp240660078.exe 97 PID 208 wrote to memory of 2144 208 tmp240660078.exe 97 PID 208 wrote to memory of 2144 208 tmp240660078.exe 97 PID 2844 wrote to memory of 2204 2844 tmp240630390.exe 98 PID 2844 wrote to memory of 2204 2844 tmp240630390.exe 98 PID 2844 wrote to memory of 2204 2844 tmp240630390.exe 98 PID 2204 wrote to memory of 2100 2204 notpad.exe 99 PID 2204 wrote to memory of 2100 2204 notpad.exe 99 PID 2204 wrote to memory of 2100 2204 notpad.exe 99 PID 2204 wrote to memory of 1080 2204 notpad.exe 100 PID 2204 wrote to memory of 1080 2204 notpad.exe 100 PID 2204 wrote to memory of 1080 2204 notpad.exe 100 PID 1080 wrote to memory of 1320 1080 tmp240702531.exe 101 PID 1080 wrote to memory of 1320 1080 tmp240702531.exe 101 PID 1080 wrote to memory of 1320 1080 tmp240702531.exe 101 PID 1080 wrote to memory of 2384 1080 tmp240702531.exe 102 PID 1080 wrote to memory of 2384 1080 tmp240702531.exe 102 PID 1080 wrote to memory of 2384 1080 tmp240702531.exe 102 PID 2100 wrote to memory of 2680 2100 tmp240700984.exe 103 PID 2100 wrote to memory of 2680 2100 tmp240700984.exe 103 PID 2100 wrote to memory of 2680 2100 tmp240700984.exe 103 PID 2680 wrote to memory of 4840 2680 notpad.exe 104 PID 2680 wrote to memory of 4840 2680 notpad.exe 104 PID 2680 wrote to memory of 4840 2680 notpad.exe 104 PID 4840 wrote to memory of 2704 4840 tmp240703421.exe 105 PID 4840 wrote to memory of 2704 4840 tmp240703421.exe 105 PID 4840 wrote to memory of 2704 4840 tmp240703421.exe 105 PID 2680 wrote to memory of 4536 2680 notpad.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733.exe"C:\Users\Admin\AppData\Local\Temp\c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\tmp240605562.exeC:\Users\Admin\AppData\Local\Temp\tmp240605562.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\tmp240606640.exeC:\Users\Admin\AppData\Local\Temp\tmp240606640.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\tmp240630390.exeC:\Users\Admin\AppData\Local\Temp\tmp240630390.exe7⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\tmp240700984.exeC:\Users\Admin\AppData\Local\Temp\tmp240700984.exe9⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\tmp240703421.exeC:\Users\Admin\AppData\Local\Temp\tmp240703421.exe11⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"12⤵
- Executes dropped EXE
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\tmp240710765.exeC:\Users\Admin\AppData\Local\Temp\tmp240710765.exe13⤵
- Executes dropped EXE
PID:4268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240705203.exeC:\Users\Admin\AppData\Local\Temp\tmp240705203.exe11⤵
- Executes dropped EXE
PID:4536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240702531.exeC:\Users\Admin\AppData\Local\Temp\tmp240702531.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\tmp240702796.exeC:\Users\Admin\AppData\Local\Temp\tmp240702796.exe10⤵
- Executes dropped EXE
PID:1320
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240703234.exeC:\Users\Admin\AppData\Local\Temp\tmp240703234.exe10⤵
- Executes dropped EXE
PID:2384
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240660078.exeC:\Users\Admin\AppData\Local\Temp\tmp240660078.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\tmp240661515.exeC:\Users\Admin\AppData\Local\Temp\tmp240661515.exe8⤵
- Executes dropped EXE
PID:3568
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240689828.exeC:\Users\Admin\AppData\Local\Temp\tmp240689828.exe8⤵
- Executes dropped EXE
PID:2144
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240607968.exeC:\Users\Admin\AppData\Local\Temp\tmp240607968.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\tmp240644796.exeC:\Users\Admin\AppData\Local\Temp\tmp240644796.exe6⤵
- Executes dropped EXE
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240660062.exeC:\Users\Admin\AppData\Local\Temp\tmp240660062.exe6⤵
- Executes dropped EXE
PID:3784
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240605796.exeC:\Users\Admin\AppData\Local\Temp\tmp240605796.exe3⤵
- Executes dropped EXE
PID:364
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
162KB
MD5e92d3a824a0578a50d2dd81b5060145f
SHA150ef7c645fd5cbb95d50fbaddf6213800f9296ec
SHA25687f53bc444c05230ce439dbb127c03f2e374067d6fb08e91c834371fd9ecf661
SHA51240d0ac6fa5a424b099923fcdb465e9a2f44569af1c75cf05323315a8720517316a7e8627be248cff3a83382fb6db1cf026161f627a39bc1908e63f67a34c0fd5
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.8MB
MD53e97a127e7d3e09e5d693f9d6af4fa48
SHA184947460a9e50d8a5de42001b5a0f17ffc3a5566
SHA25669961808e746b163c4c9b08c4c5654e923c003bda21f7d672c08cc3e499ec0b4
SHA512eb0ebe0f0a4200b6e3ef165d0d518354e62f98d1fd6becbb9b88c112e74925244635c6ce1d685aec966a8ea4f985e1a6b4362a7c18f364e13eb6c813c47fe234
-
Filesize
4.8MB
MD53e97a127e7d3e09e5d693f9d6af4fa48
SHA184947460a9e50d8a5de42001b5a0f17ffc3a5566
SHA25669961808e746b163c4c9b08c4c5654e923c003bda21f7d672c08cc3e499ec0b4
SHA512eb0ebe0f0a4200b6e3ef165d0d518354e62f98d1fd6becbb9b88c112e74925244635c6ce1d685aec966a8ea4f985e1a6b4362a7c18f364e13eb6c813c47fe234
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
162KB
MD5e92d3a824a0578a50d2dd81b5060145f
SHA150ef7c645fd5cbb95d50fbaddf6213800f9296ec
SHA25687f53bc444c05230ce439dbb127c03f2e374067d6fb08e91c834371fd9ecf661
SHA51240d0ac6fa5a424b099923fcdb465e9a2f44569af1c75cf05323315a8720517316a7e8627be248cff3a83382fb6db1cf026161f627a39bc1908e63f67a34c0fd5
-
Filesize
4.8MB
MD53e97a127e7d3e09e5d693f9d6af4fa48
SHA184947460a9e50d8a5de42001b5a0f17ffc3a5566
SHA25669961808e746b163c4c9b08c4c5654e923c003bda21f7d672c08cc3e499ec0b4
SHA512eb0ebe0f0a4200b6e3ef165d0d518354e62f98d1fd6becbb9b88c112e74925244635c6ce1d685aec966a8ea4f985e1a6b4362a7c18f364e13eb6c813c47fe234
-
Filesize
4.8MB
MD53e97a127e7d3e09e5d693f9d6af4fa48
SHA184947460a9e50d8a5de42001b5a0f17ffc3a5566
SHA25669961808e746b163c4c9b08c4c5654e923c003bda21f7d672c08cc3e499ec0b4
SHA512eb0ebe0f0a4200b6e3ef165d0d518354e62f98d1fd6becbb9b88c112e74925244635c6ce1d685aec966a8ea4f985e1a6b4362a7c18f364e13eb6c813c47fe234
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
162KB
MD5e92d3a824a0578a50d2dd81b5060145f
SHA150ef7c645fd5cbb95d50fbaddf6213800f9296ec
SHA25687f53bc444c05230ce439dbb127c03f2e374067d6fb08e91c834371fd9ecf661
SHA51240d0ac6fa5a424b099923fcdb465e9a2f44569af1c75cf05323315a8720517316a7e8627be248cff3a83382fb6db1cf026161f627a39bc1908e63f67a34c0fd5
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.8MB
MD53e97a127e7d3e09e5d693f9d6af4fa48
SHA184947460a9e50d8a5de42001b5a0f17ffc3a5566
SHA25669961808e746b163c4c9b08c4c5654e923c003bda21f7d672c08cc3e499ec0b4
SHA512eb0ebe0f0a4200b6e3ef165d0d518354e62f98d1fd6becbb9b88c112e74925244635c6ce1d685aec966a8ea4f985e1a6b4362a7c18f364e13eb6c813c47fe234
-
Filesize
4.8MB
MD53e97a127e7d3e09e5d693f9d6af4fa48
SHA184947460a9e50d8a5de42001b5a0f17ffc3a5566
SHA25669961808e746b163c4c9b08c4c5654e923c003bda21f7d672c08cc3e499ec0b4
SHA512eb0ebe0f0a4200b6e3ef165d0d518354e62f98d1fd6becbb9b88c112e74925244635c6ce1d685aec966a8ea4f985e1a6b4362a7c18f364e13eb6c813c47fe234
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
162KB
MD5e92d3a824a0578a50d2dd81b5060145f
SHA150ef7c645fd5cbb95d50fbaddf6213800f9296ec
SHA25687f53bc444c05230ce439dbb127c03f2e374067d6fb08e91c834371fd9ecf661
SHA51240d0ac6fa5a424b099923fcdb465e9a2f44569af1c75cf05323315a8720517316a7e8627be248cff3a83382fb6db1cf026161f627a39bc1908e63f67a34c0fd5
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
3.6MB
MD59838e5d31edfde850770a34d32dc20f5
SHA1f8a01d813d3efaee1f608f1a5fa44ce3cb1fa00b
SHA256b57f95927f49ab257603c311bee8a8eda5ceecc637009c4ded1fce338c3baf02
SHA51294fc93eea3a3237a918fb52b91d4b27ac42d2026327b196063c32601c192a110145a4b63fbc5df2dd4f5c7456e8b756d7881cdf83efb9584a4e9b4d1e51dfcb7
-
Filesize
3.9MB
MD5468c564d4373dcc4f6ebd88338da3f5d
SHA1c708b3e164c60ca434ef797187f030ec8f8efb7c
SHA256bd28ac4dd54016acc08aa3e200de5b31aebc0769ba769206bac78acfcc66bd34
SHA51294cff28f1e7d68e7c46c81b8077cc7c3303ee6e2e79767a775988ed3fd95dd8ea7989b3b01cea4196b8c472d07fe2a03e3bdced899a38ae6985023426facc1a7
-
Filesize
3.3MB
MD5c929ce9d02c0f867cdc1e67b1091daa7
SHA1ea06599096da6f11a0ba37a24c7a204468e0c52e
SHA25653bb0e1b956805bec5099a29e2c145adc2a671a1091b0f2f63ef0e5009a36102
SHA512601e95c4b5def9a429952744b97286c005e2ef1c2522ed7f564bd71ad0690e32e70acffb9475e0a6e2d7f09e93c7508fc83358d8e5ef288a71a59c5a027ed4e5
-
Filesize
3.3MB
MD52caeee40e38fd8965573325ec670a0f1
SHA13f257752e999531364907cf0ad661eda9a6988fe
SHA256e6d9b9589a030130c27e1db7a1dbaa33373ef69e48c96247583a7358cf1787d5
SHA512613ea372a4c21ff839bc87ab211e878e0fda9f1a48ca519115ba4ae419038562cc3dce3a3e1b6481055ca54f9c801787c30cd3245ab17a488a633a12d83815e2
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.6MB
MD50386b46bd77a171de84d04acd787a6e7
SHA13662012e42e8581d162078ffdc669c7741c3ced4
SHA256c8f7854a530776ec85ee1da194582cb4b628f3fce13b407ea520b527b652e733
SHA512989c1e5c77d628848a36ac8d097bccebc3daeb30e092e254fea4b7bbcdf675422b8a50094214de81f8bf28bb426e052b04fc6a5b77af7cd01181fab8c28edc90
-
Filesize
4.6MB
MD53370c3a81675b974d243ca310c019fc1
SHA1c2c2742a00d292fc8ec8a9e21131f7b3bcc3c53f
SHA256002c51f416c95f4c3cc0ddd3a3a153e04018f855a021175e7e1857898d6c30a1
SHA512825c4010e7a4dbe356a86ab527c828a2a455f1c30f9c499c6476cf9f578f26bccab76c80b4d96e70efcfc82a0193e021172f7cfdd61ef0d56c90a78c5295cf01
-
Filesize
4.8MB
MD53e97a127e7d3e09e5d693f9d6af4fa48
SHA184947460a9e50d8a5de42001b5a0f17ffc3a5566
SHA25669961808e746b163c4c9b08c4c5654e923c003bda21f7d672c08cc3e499ec0b4
SHA512eb0ebe0f0a4200b6e3ef165d0d518354e62f98d1fd6becbb9b88c112e74925244635c6ce1d685aec966a8ea4f985e1a6b4362a7c18f364e13eb6c813c47fe234
-
Filesize
4.8MB
MD53e97a127e7d3e09e5d693f9d6af4fa48
SHA184947460a9e50d8a5de42001b5a0f17ffc3a5566
SHA25669961808e746b163c4c9b08c4c5654e923c003bda21f7d672c08cc3e499ec0b4
SHA512eb0ebe0f0a4200b6e3ef165d0d518354e62f98d1fd6becbb9b88c112e74925244635c6ce1d685aec966a8ea4f985e1a6b4362a7c18f364e13eb6c813c47fe234
-
Filesize
9.4MB
MD5be9f6a4bba97737eb28b6d180ba39362
SHA14234a30cd366679e51c1334a66d58aff9e2f78d5
SHA256689ffa46a998ff494bfde17c5dc2eafd5f855f16d2e7b34dc0dafd87119037aa
SHA512ca7b139d90b6be1dbdf6999d66d9229233d2ebf1323dbab35b03ff272e4b39e4a7d554130682c1025692b97710d59072bbb86282aaa6b08288cfa1e104ff06e5
-
Filesize
9.4MB
MD5be9f6a4bba97737eb28b6d180ba39362
SHA14234a30cd366679e51c1334a66d58aff9e2f78d5
SHA256689ffa46a998ff494bfde17c5dc2eafd5f855f16d2e7b34dc0dafd87119037aa
SHA512ca7b139d90b6be1dbdf6999d66d9229233d2ebf1323dbab35b03ff272e4b39e4a7d554130682c1025692b97710d59072bbb86282aaa6b08288cfa1e104ff06e5
-
Filesize
9.4MB
MD5be9f6a4bba97737eb28b6d180ba39362
SHA14234a30cd366679e51c1334a66d58aff9e2f78d5
SHA256689ffa46a998ff494bfde17c5dc2eafd5f855f16d2e7b34dc0dafd87119037aa
SHA512ca7b139d90b6be1dbdf6999d66d9229233d2ebf1323dbab35b03ff272e4b39e4a7d554130682c1025692b97710d59072bbb86282aaa6b08288cfa1e104ff06e5
-
Filesize
9.4MB
MD5be9f6a4bba97737eb28b6d180ba39362
SHA14234a30cd366679e51c1334a66d58aff9e2f78d5
SHA256689ffa46a998ff494bfde17c5dc2eafd5f855f16d2e7b34dc0dafd87119037aa
SHA512ca7b139d90b6be1dbdf6999d66d9229233d2ebf1323dbab35b03ff272e4b39e4a7d554130682c1025692b97710d59072bbb86282aaa6b08288cfa1e104ff06e5
-
Filesize
9.4MB
MD5be9f6a4bba97737eb28b6d180ba39362
SHA14234a30cd366679e51c1334a66d58aff9e2f78d5
SHA256689ffa46a998ff494bfde17c5dc2eafd5f855f16d2e7b34dc0dafd87119037aa
SHA512ca7b139d90b6be1dbdf6999d66d9229233d2ebf1323dbab35b03ff272e4b39e4a7d554130682c1025692b97710d59072bbb86282aaa6b08288cfa1e104ff06e5
-
Filesize
9.4MB
MD5be9f6a4bba97737eb28b6d180ba39362
SHA14234a30cd366679e51c1334a66d58aff9e2f78d5
SHA256689ffa46a998ff494bfde17c5dc2eafd5f855f16d2e7b34dc0dafd87119037aa
SHA512ca7b139d90b6be1dbdf6999d66d9229233d2ebf1323dbab35b03ff272e4b39e4a7d554130682c1025692b97710d59072bbb86282aaa6b08288cfa1e104ff06e5
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7