Analysis
-
max time kernel
32s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2023, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230221-en
General
-
Target
setup.exe
-
Size
364KB
-
MD5
48f30b9ce79f2837b931d030e0c53b47
-
SHA1
d68dd947a11810c8ba111e1a5bc027e959e0898e
-
SHA256
ceee4a6ad525c4f19fa728f00864cfae805a4e76d3c450679c2d0ff0161be253
-
SHA512
615ae2d0c42742a8ad4a106ff83f215e5f62929070dd901278f5a364c35e2294188038f6638f3457c2cd0661a089c12037a98634499316ee0283cb9f811f595e
-
SSDEEP
3072:aud3ZaBOPct6lyatj3YdgJctuTeCyenSS3aeMBsyMrkx4dr2mJUvinYMa:auMXNdOoufyenSAwBs3e40mJUvU1
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
djvu
http://zexeq.com/test2/get.php
http://zexeq.com/lancer/get.php
-
extension
.tywd
-
offline_id
Yao2o6f5vNghOpgVBhEIA8O96SC5vLcgITgaRMt1
-
payload_url
http://uaery.top/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-f8UEvx4T0A Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0671IsjO
Extracted
smokeloader
pub1
Extracted
amadey
3.65
77.73.134.27/8bmdh3Slb2/index.php
Extracted
smokeloader
sprg
Signatures
-
Detected Djvu ransomware 30 IoCs
resource yara_rule behavioral2/memory/4956-151-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4956-153-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/400-154-0x0000000004960000-0x0000000004A7B000-memory.dmp family_djvu behavioral2/memory/4956-155-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4956-156-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/732-162-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/732-164-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2140-165-0x0000000002280000-0x000000000239B000-memory.dmp family_djvu behavioral2/memory/732-166-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/732-174-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4956-193-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/732-192-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1248-232-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1488-237-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1248-238-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1488-245-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1488-234-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1896-225-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1896-224-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1248-247-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1896-249-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1896-290-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1896-291-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1248-292-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1896-303-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1488-297-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1248-293-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1248-318-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1896-312-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1248-324-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 400 D95D.exe 2140 DB81.exe 4956 D95D.exe 364 E045.exe 732 DB81.exe 1584 E20B.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2040 icacls.exe 3224 icacls.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\1cf45b89-32d7-4188-9fa6-8ac227b73d86\\D95D.exe\" --AutoStart" D95D.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\684846b0-d455-494d-86f4-4978a7148f11\\DB81.exe\" --AutoStart" DB81.exe -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 86 api.2ip.ua 54 api.2ip.ua 55 api.2ip.ua 58 api.2ip.ua 84 api.2ip.ua 85 api.2ip.ua -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 400 set thread context of 4956 400 D95D.exe 97 PID 2140 set thread context of 732 2140 DB81.exe 99 -
Program crash 3 IoCs
pid pid_target Process procid_target 2312 1584 WerFault.exe 101 4500 4432 WerFault.exe 117 4860 2700 WerFault.exe 112 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E045.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E045.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E045.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1584 setup.exe 1584 setup.exe 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1584 setup.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3128 Process not Found Token: SeCreatePagefilePrivilege 3128 Process not Found Token: SeShutdownPrivilege 3128 Process not Found Token: SeCreatePagefilePrivilege 3128 Process not Found -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3128 wrote to memory of 400 3128 Process not Found 95 PID 3128 wrote to memory of 400 3128 Process not Found 95 PID 3128 wrote to memory of 400 3128 Process not Found 95 PID 3128 wrote to memory of 2140 3128 Process not Found 96 PID 3128 wrote to memory of 2140 3128 Process not Found 96 PID 3128 wrote to memory of 2140 3128 Process not Found 96 PID 400 wrote to memory of 4956 400 D95D.exe 97 PID 400 wrote to memory of 4956 400 D95D.exe 97 PID 400 wrote to memory of 4956 400 D95D.exe 97 PID 400 wrote to memory of 4956 400 D95D.exe 97 PID 400 wrote to memory of 4956 400 D95D.exe 97 PID 400 wrote to memory of 4956 400 D95D.exe 97 PID 400 wrote to memory of 4956 400 D95D.exe 97 PID 400 wrote to memory of 4956 400 D95D.exe 97 PID 400 wrote to memory of 4956 400 D95D.exe 97 PID 400 wrote to memory of 4956 400 D95D.exe 97 PID 3128 wrote to memory of 364 3128 Process not Found 100 PID 3128 wrote to memory of 364 3128 Process not Found 100 PID 3128 wrote to memory of 364 3128 Process not Found 100 PID 2140 wrote to memory of 732 2140 DB81.exe 99 PID 2140 wrote to memory of 732 2140 DB81.exe 99 PID 2140 wrote to memory of 732 2140 DB81.exe 99 PID 2140 wrote to memory of 732 2140 DB81.exe 99 PID 2140 wrote to memory of 732 2140 DB81.exe 99 PID 2140 wrote to memory of 732 2140 DB81.exe 99 PID 2140 wrote to memory of 732 2140 DB81.exe 99 PID 2140 wrote to memory of 732 2140 DB81.exe 99 PID 2140 wrote to memory of 732 2140 DB81.exe 99 PID 2140 wrote to memory of 732 2140 DB81.exe 99 PID 3128 wrote to memory of 1584 3128 Process not Found 101 PID 3128 wrote to memory of 1584 3128 Process not Found 101 PID 3128 wrote to memory of 1584 3128 Process not Found 101 PID 4956 wrote to memory of 3224 4956 D95D.exe 103 PID 4956 wrote to memory of 3224 4956 D95D.exe 103 PID 4956 wrote to memory of 3224 4956 D95D.exe 103 PID 732 wrote to memory of 2040 732 DB81.exe 102 PID 732 wrote to memory of 2040 732 DB81.exe 102 PID 732 wrote to memory of 2040 732 DB81.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1584
-
C:\Users\Admin\AppData\Local\Temp\D95D.exeC:\Users\Admin\AppData\Local\Temp\D95D.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\D95D.exeC:\Users\Admin\AppData\Local\Temp\D95D.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\1cf45b89-32d7-4188-9fa6-8ac227b73d86" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:3224
-
-
C:\Users\Admin\AppData\Local\Temp\D95D.exe"C:\Users\Admin\AppData\Local\Temp\D95D.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\D95D.exe"C:\Users\Admin\AppData\Local\Temp\D95D.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:1248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DB81.exeC:\Users\Admin\AppData\Local\Temp\DB81.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\DB81.exeC:\Users\Admin\AppData\Local\Temp\DB81.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\684846b0-d455-494d-86f4-4978a7148f11" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\DB81.exe"C:\Users\Admin\AppData\Local\Temp\DB81.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\DB81.exe"C:\Users\Admin\AppData\Local\Temp\DB81.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:1896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E045.exeC:\Users\Admin\AppData\Local\Temp\E045.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:364
-
C:\Users\Admin\AppData\Local\Temp\E20B.exeC:\Users\Admin\AppData\Local\Temp\E20B.exe1⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 3402⤵
- Program crash
PID:2312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1584 -ip 15841⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\15AF.exeC:\Users\Admin\AppData\Local\Temp\15AF.exe1⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\15AF.exeC:\Users\Admin\AppData\Local\Temp\15AF.exe2⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\15AF.exe"C:\Users\Admin\AppData\Local\Temp\15AF.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:904
-
-
-
C:\Users\Admin\AppData\Local\Temp\3E94.exeC:\Users\Admin\AppData\Local\Temp\3E94.exe1⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\40F7.exeC:\Users\Admin\AppData\Local\Temp\40F7.exe1⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 3402⤵
- Program crash
PID:4860
-
-
C:\Users\Admin\AppData\Local\Temp\45AB.exeC:\Users\Admin\AppData\Local\Temp\45AB.exe1⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\jgzhang.exe"C:\Users\Admin\AppData\Local\Temp\jgzhang.exe"2⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\jgzhang.exe"C:\Users\Admin\AppData\Local\Temp\jgzhang.exe" -h3⤵PID:3672
-
-
-
C:\Users\Admin\AppData\Local\Temp\ss31.exe"C:\Users\Admin\AppData\Local\Temp\ss31.exe"2⤵PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\Player3.exe"C:\Users\Admin\AppData\Local\Temp\Player3.exe"2⤵PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\489A.exeC:\Users\Admin\AppData\Local\Temp\489A.exe1⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 14922⤵
- Program crash
PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\Player3.exe"C:\Users\Admin\AppData\Local\Temp\Player3.exe"2⤵PID:1812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2700 -ip 27001⤵PID:1704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4432 -ip 44321⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe"1⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe"1⤵PID:3340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD5bd5d58331e17240d5f73c19b7f90e8bf
SHA18fd19638524be87617e1314117280ab599a730aa
SHA256a70449869b5be298d22f68a65b896e7138a443467e747f462179d59a7d96bf0e
SHA5128fc552a3c3bc9df549dc886ff68966f5aa5fb8b105186e86cc308ce9999fe6dcb48526896d05c9aad3e25eac91eafa8aa590e55261f5f58689e43a0b29fbcc16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD584770e5e2da7dbc35f74f1301910fea1
SHA1bd6156f63c93c2bc668dbd796d27474700cbff84
SHA25697a616430f4f8b8a76004f3ffab182f6a01870267c53387960f71f56c3dae1c5
SHA5126241fec66ad5219fa31ad47fdd93dea2ef079cfd600d3ec1ca48fe64d028d76a82984113a5052b74de8d678d183e2bafb965f3c6111f3cdf139239b07dfee941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD546695bc8561a32e1833a6d99a77181a0
SHA1b3c30e212f13fe612567d1a0d590ea400225bde2
SHA2568acf929c15a9d787e72809586a1c01d53cd344207ed8f5b5d2f325f4a25f708e
SHA51259a20f6594e628fb465ca887c4987656757d6b479c9fc72995c1bbe4c7ab89a8e60969aa68d7472b8a06bbfa99c01fdd0e87608fef95133463034bc21744e304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD50d67a3ecc557e1204a991884fed40041
SHA1fd4fbc8edb97d5f60f09516bd20493bd1984bb2d
SHA2569d322c5ea7f47fee9afabd6e9b95bab06c43b4a6085eea0c935038fb6ae79c25
SHA51226cd4f53cb212d838772317bac25d025664086532d0f376c422c6d5dc5b237ed8c27d2b8ee574e9ac4d65e44e7a4cc2613d5895254a6f0d8a9e99295ebd15326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5f35440d115cb7fc051558cf2042c284e
SHA177f6c1f17c3abb2719983b139442c2b1a6f7d32d
SHA256be748f1f1af1dbc3c96c7df7da02ca081e6618ece525e9900382f6bf623a1b70
SHA512f22a0d2f2b5321e6249e15ef6a779c6d6b4761c368e5e1a928905af17e5da8d885c181a42c08b6cb2b3f2f6ffe0711e65237e7d035dbaaa6c482d557591f3178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD580574ae0b20cf0acfd98d185e5f81f8f
SHA1e17b177c0b2d468adbe433ded9a38739f5c793db
SHA25610e0f93cfe31e274111e38ad2e8b543b050a37811e01482f01507d4ca03ea666
SHA512c543534641db99289789363784adefa2a39de9bca38f6f585a18d2acac40e5d0301547947ed868cc5a3ccdea5882b208699de40c1c61dafb49bcab74e1c449b2
-
Filesize
757KB
MD5644fe68426d5ea6660a8f6e4afc46c8f
SHA13aa1ead49c63992595ec6c96887cb8fa79fee758
SHA2567b66937aa53c2d41ff581294c755c0398d9b0e908ceeb90294a08342645269d5
SHA512211aadef4620757ad6fc10006e84fe8daa2093d4e1b332bf01520cda329bb9ec7f604db1b26af96f9ce49e5b1cc40e88f162e762dfb229fdea0bf01b2fa1c118
-
Filesize
868KB
MD5edf37ee1ecb7b987698b628566655b8b
SHA19bbf7982c932ed02d34c07e1fee9d54f0e86f4cb
SHA2562b4df758116281f2f2009dcb1a1790515d6494aab55fc0ea5f7939fa35ee1139
SHA5128e4c0b194d827362d094a4d3403b472ee3eb12e8d78b6bdfdca0c96b8b2719bbd5fdf2cc1dff1872601f6bbb9723d69217661a76f3f6d0c781145fc71e924645
-
Filesize
757KB
MD5644fe68426d5ea6660a8f6e4afc46c8f
SHA13aa1ead49c63992595ec6c96887cb8fa79fee758
SHA2567b66937aa53c2d41ff581294c755c0398d9b0e908ceeb90294a08342645269d5
SHA512211aadef4620757ad6fc10006e84fe8daa2093d4e1b332bf01520cda329bb9ec7f604db1b26af96f9ce49e5b1cc40e88f162e762dfb229fdea0bf01b2fa1c118
-
Filesize
757KB
MD5644fe68426d5ea6660a8f6e4afc46c8f
SHA13aa1ead49c63992595ec6c96887cb8fa79fee758
SHA2567b66937aa53c2d41ff581294c755c0398d9b0e908ceeb90294a08342645269d5
SHA512211aadef4620757ad6fc10006e84fe8daa2093d4e1b332bf01520cda329bb9ec7f604db1b26af96f9ce49e5b1cc40e88f162e762dfb229fdea0bf01b2fa1c118
-
Filesize
757KB
MD5644fe68426d5ea6660a8f6e4afc46c8f
SHA13aa1ead49c63992595ec6c96887cb8fa79fee758
SHA2567b66937aa53c2d41ff581294c755c0398d9b0e908ceeb90294a08342645269d5
SHA512211aadef4620757ad6fc10006e84fe8daa2093d4e1b332bf01520cda329bb9ec7f604db1b26af96f9ce49e5b1cc40e88f162e762dfb229fdea0bf01b2fa1c118
-
Filesize
757KB
MD5644fe68426d5ea6660a8f6e4afc46c8f
SHA13aa1ead49c63992595ec6c96887cb8fa79fee758
SHA2567b66937aa53c2d41ff581294c755c0398d9b0e908ceeb90294a08342645269d5
SHA512211aadef4620757ad6fc10006e84fe8daa2093d4e1b332bf01520cda329bb9ec7f604db1b26af96f9ce49e5b1cc40e88f162e762dfb229fdea0bf01b2fa1c118
-
Filesize
757KB
MD5644fe68426d5ea6660a8f6e4afc46c8f
SHA13aa1ead49c63992595ec6c96887cb8fa79fee758
SHA2567b66937aa53c2d41ff581294c755c0398d9b0e908ceeb90294a08342645269d5
SHA512211aadef4620757ad6fc10006e84fe8daa2093d4e1b332bf01520cda329bb9ec7f604db1b26af96f9ce49e5b1cc40e88f162e762dfb229fdea0bf01b2fa1c118
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
247KB
MD5196089db791f0ae40e8c2e8dfabd8808
SHA137056f187730562c28d9cfc2a5a38131e30c129a
SHA2563058c4866121911e1e0ea1cbef3a1b89f4b6e2b4e4f3bd921a7c89a190b2f3f0
SHA5121b3f8628396710661bc53a98375af946bec92163c858017504e417b37d3ea038f399a62836160bd60aec5b24c740ff37edc93d736077625233afb6aecd0d70d4
-
Filesize
247KB
MD5196089db791f0ae40e8c2e8dfabd8808
SHA137056f187730562c28d9cfc2a5a38131e30c129a
SHA2563058c4866121911e1e0ea1cbef3a1b89f4b6e2b4e4f3bd921a7c89a190b2f3f0
SHA5121b3f8628396710661bc53a98375af946bec92163c858017504e417b37d3ea038f399a62836160bd60aec5b24c740ff37edc93d736077625233afb6aecd0d70d4
-
Filesize
388KB
MD5d6aa94945dea8e0661e3294884010cfa
SHA15ef28930cde4e9a86f984afc16bb2f1a01ecd503
SHA256b39e67c2cd9ebd133f44a646abca8142630c0eeb149c7521a46b1d281fe6b171
SHA512139a160676522bc172f2e54fadcd3e06cebe46eebded7f36fd12751723ca2297bb33f2cb995de63c4a24c0ddf46fef2f9302e0552e8503d9e5f2d8cf820ce101
-
Filesize
388KB
MD5d6aa94945dea8e0661e3294884010cfa
SHA15ef28930cde4e9a86f984afc16bb2f1a01ecd503
SHA256b39e67c2cd9ebd133f44a646abca8142630c0eeb149c7521a46b1d281fe6b171
SHA512139a160676522bc172f2e54fadcd3e06cebe46eebded7f36fd12751723ca2297bb33f2cb995de63c4a24c0ddf46fef2f9302e0552e8503d9e5f2d8cf820ce101
-
Filesize
1.1MB
MD5ba218b60cb97c3532b8b9c796d954622
SHA1ae18137fb0809f61797b7448bb139840d1f49e99
SHA2568bee3d713fc207a8ca82e8eaf85396b55fcd29fe9214a83ce9399fa48ac4bd4b
SHA51206b0ac48d4dad3253a817a7f6bc34437a748e3d885328986f652347c8cbc72f2fc5aebdc3e3781357887da74b77f2eb6b57a816d16d96e6b713e3c3aab1ba158
-
Filesize
1.1MB
MD5ba218b60cb97c3532b8b9c796d954622
SHA1ae18137fb0809f61797b7448bb139840d1f49e99
SHA2568bee3d713fc207a8ca82e8eaf85396b55fcd29fe9214a83ce9399fa48ac4bd4b
SHA51206b0ac48d4dad3253a817a7f6bc34437a748e3d885328986f652347c8cbc72f2fc5aebdc3e3781357887da74b77f2eb6b57a816d16d96e6b713e3c3aab1ba158
-
Filesize
1.1MB
MD5ba218b60cb97c3532b8b9c796d954622
SHA1ae18137fb0809f61797b7448bb139840d1f49e99
SHA2568bee3d713fc207a8ca82e8eaf85396b55fcd29fe9214a83ce9399fa48ac4bd4b
SHA51206b0ac48d4dad3253a817a7f6bc34437a748e3d885328986f652347c8cbc72f2fc5aebdc3e3781357887da74b77f2eb6b57a816d16d96e6b713e3c3aab1ba158
-
Filesize
1.1MB
MD5ba218b60cb97c3532b8b9c796d954622
SHA1ae18137fb0809f61797b7448bb139840d1f49e99
SHA2568bee3d713fc207a8ca82e8eaf85396b55fcd29fe9214a83ce9399fa48ac4bd4b
SHA51206b0ac48d4dad3253a817a7f6bc34437a748e3d885328986f652347c8cbc72f2fc5aebdc3e3781357887da74b77f2eb6b57a816d16d96e6b713e3c3aab1ba158
-
Filesize
757KB
MD5644fe68426d5ea6660a8f6e4afc46c8f
SHA13aa1ead49c63992595ec6c96887cb8fa79fee758
SHA2567b66937aa53c2d41ff581294c755c0398d9b0e908ceeb90294a08342645269d5
SHA512211aadef4620757ad6fc10006e84fe8daa2093d4e1b332bf01520cda329bb9ec7f604db1b26af96f9ce49e5b1cc40e88f162e762dfb229fdea0bf01b2fa1c118
-
Filesize
757KB
MD5644fe68426d5ea6660a8f6e4afc46c8f
SHA13aa1ead49c63992595ec6c96887cb8fa79fee758
SHA2567b66937aa53c2d41ff581294c755c0398d9b0e908ceeb90294a08342645269d5
SHA512211aadef4620757ad6fc10006e84fe8daa2093d4e1b332bf01520cda329bb9ec7f604db1b26af96f9ce49e5b1cc40e88f162e762dfb229fdea0bf01b2fa1c118
-
Filesize
757KB
MD5644fe68426d5ea6660a8f6e4afc46c8f
SHA13aa1ead49c63992595ec6c96887cb8fa79fee758
SHA2567b66937aa53c2d41ff581294c755c0398d9b0e908ceeb90294a08342645269d5
SHA512211aadef4620757ad6fc10006e84fe8daa2093d4e1b332bf01520cda329bb9ec7f604db1b26af96f9ce49e5b1cc40e88f162e762dfb229fdea0bf01b2fa1c118
-
Filesize
757KB
MD5644fe68426d5ea6660a8f6e4afc46c8f
SHA13aa1ead49c63992595ec6c96887cb8fa79fee758
SHA2567b66937aa53c2d41ff581294c755c0398d9b0e908ceeb90294a08342645269d5
SHA512211aadef4620757ad6fc10006e84fe8daa2093d4e1b332bf01520cda329bb9ec7f604db1b26af96f9ce49e5b1cc40e88f162e762dfb229fdea0bf01b2fa1c118
-
Filesize
757KB
MD5644fe68426d5ea6660a8f6e4afc46c8f
SHA13aa1ead49c63992595ec6c96887cb8fa79fee758
SHA2567b66937aa53c2d41ff581294c755c0398d9b0e908ceeb90294a08342645269d5
SHA512211aadef4620757ad6fc10006e84fe8daa2093d4e1b332bf01520cda329bb9ec7f604db1b26af96f9ce49e5b1cc40e88f162e762dfb229fdea0bf01b2fa1c118
-
Filesize
868KB
MD5edf37ee1ecb7b987698b628566655b8b
SHA19bbf7982c932ed02d34c07e1fee9d54f0e86f4cb
SHA2562b4df758116281f2f2009dcb1a1790515d6494aab55fc0ea5f7939fa35ee1139
SHA5128e4c0b194d827362d094a4d3403b472ee3eb12e8d78b6bdfdca0c96b8b2719bbd5fdf2cc1dff1872601f6bbb9723d69217661a76f3f6d0c781145fc71e924645
-
Filesize
868KB
MD5edf37ee1ecb7b987698b628566655b8b
SHA19bbf7982c932ed02d34c07e1fee9d54f0e86f4cb
SHA2562b4df758116281f2f2009dcb1a1790515d6494aab55fc0ea5f7939fa35ee1139
SHA5128e4c0b194d827362d094a4d3403b472ee3eb12e8d78b6bdfdca0c96b8b2719bbd5fdf2cc1dff1872601f6bbb9723d69217661a76f3f6d0c781145fc71e924645
-
Filesize
868KB
MD5edf37ee1ecb7b987698b628566655b8b
SHA19bbf7982c932ed02d34c07e1fee9d54f0e86f4cb
SHA2562b4df758116281f2f2009dcb1a1790515d6494aab55fc0ea5f7939fa35ee1139
SHA5128e4c0b194d827362d094a4d3403b472ee3eb12e8d78b6bdfdca0c96b8b2719bbd5fdf2cc1dff1872601f6bbb9723d69217661a76f3f6d0c781145fc71e924645
-
Filesize
868KB
MD5edf37ee1ecb7b987698b628566655b8b
SHA19bbf7982c932ed02d34c07e1fee9d54f0e86f4cb
SHA2562b4df758116281f2f2009dcb1a1790515d6494aab55fc0ea5f7939fa35ee1139
SHA5128e4c0b194d827362d094a4d3403b472ee3eb12e8d78b6bdfdca0c96b8b2719bbd5fdf2cc1dff1872601f6bbb9723d69217661a76f3f6d0c781145fc71e924645
-
Filesize
868KB
MD5edf37ee1ecb7b987698b628566655b8b
SHA19bbf7982c932ed02d34c07e1fee9d54f0e86f4cb
SHA2562b4df758116281f2f2009dcb1a1790515d6494aab55fc0ea5f7939fa35ee1139
SHA5128e4c0b194d827362d094a4d3403b472ee3eb12e8d78b6bdfdca0c96b8b2719bbd5fdf2cc1dff1872601f6bbb9723d69217661a76f3f6d0c781145fc71e924645
-
Filesize
247KB
MD54301e1547ca676ccf1c86b00bc3c2da5
SHA150b9e8a77d43f755a5c7919ff71141dc1ae23d83
SHA256c689296785b9c4f001b6d2e3f3393b0ccf6e4f1ff9a5b84f97d8716e0e9d5ce1
SHA5125bdfcc62666599775a0006da41d6fd2c51ae6d3fb5d13c0cd3255edb77a1cc37f0e9be1dce89820b70ae3779e0981b1c4da1bab75f904283811b94c420c38678
-
Filesize
247KB
MD54301e1547ca676ccf1c86b00bc3c2da5
SHA150b9e8a77d43f755a5c7919ff71141dc1ae23d83
SHA256c689296785b9c4f001b6d2e3f3393b0ccf6e4f1ff9a5b84f97d8716e0e9d5ce1
SHA5125bdfcc62666599775a0006da41d6fd2c51ae6d3fb5d13c0cd3255edb77a1cc37f0e9be1dce89820b70ae3779e0981b1c4da1bab75f904283811b94c420c38678
-
Filesize
387KB
MD5b90b4daafc631da3f5d7da118d48ddea
SHA1abd36f9eb76bcafd9478000905eafec991da1f55
SHA256d682f5e9671e271c8d80b2db4fdd0d14b68a4a17bbe192cd1d0abf0b057e8f46
SHA512bd780c02518fda8fc338bceab8bc862c6faba5e49ca758dee162ce4c43a739f701f4024ae0956701df3cf4e9d9d58002899e32a669dc4ef25e1567ac425ad7ad
-
Filesize
387KB
MD5b90b4daafc631da3f5d7da118d48ddea
SHA1abd36f9eb76bcafd9478000905eafec991da1f55
SHA256d682f5e9671e271c8d80b2db4fdd0d14b68a4a17bbe192cd1d0abf0b057e8f46
SHA512bd780c02518fda8fc338bceab8bc862c6faba5e49ca758dee162ce4c43a739f701f4024ae0956701df3cf4e9d9d58002899e32a669dc4ef25e1567ac425ad7ad
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
328KB
MD5bbaa394e6b0ecb7808722986b90d290c
SHA1682e835d7ea19c9aa3d464436d673e5c89ab2bb6
SHA256baa3acf778b3bcf4b7be932384799e8c95a5dc56c0faea8cbf7a33195ab47e73
SHA5122f3ef8921f36beaedf364d72f01af70aaa16acd3804343a1c5ff4f72b91333b4489d15c33c08b05695b216cbd024fc8783676dd98a907be3af8cb8a56c075f4f
-
Filesize
328KB
MD5bbaa394e6b0ecb7808722986b90d290c
SHA1682e835d7ea19c9aa3d464436d673e5c89ab2bb6
SHA256baa3acf778b3bcf4b7be932384799e8c95a5dc56c0faea8cbf7a33195ab47e73
SHA5122f3ef8921f36beaedf364d72f01af70aaa16acd3804343a1c5ff4f72b91333b4489d15c33c08b05695b216cbd024fc8783676dd98a907be3af8cb8a56c075f4f
-
Filesize
328KB
MD5bbaa394e6b0ecb7808722986b90d290c
SHA1682e835d7ea19c9aa3d464436d673e5c89ab2bb6
SHA256baa3acf778b3bcf4b7be932384799e8c95a5dc56c0faea8cbf7a33195ab47e73
SHA5122f3ef8921f36beaedf364d72f01af70aaa16acd3804343a1c5ff4f72b91333b4489d15c33c08b05695b216cbd024fc8783676dd98a907be3af8cb8a56c075f4f
-
Filesize
328KB
MD5bbaa394e6b0ecb7808722986b90d290c
SHA1682e835d7ea19c9aa3d464436d673e5c89ab2bb6
SHA256baa3acf778b3bcf4b7be932384799e8c95a5dc56c0faea8cbf7a33195ab47e73
SHA5122f3ef8921f36beaedf364d72f01af70aaa16acd3804343a1c5ff4f72b91333b4489d15c33c08b05695b216cbd024fc8783676dd98a907be3af8cb8a56c075f4f
-
Filesize
579KB
MD5ecf708ffb402f5956e63e73313d8c46f
SHA19333f29c771a162cdf3b00a07ea6a94623e33762
SHA25657c011aeceb54ab58d9d2ea21a115ca66145c445e172492ace12cce697c0852e
SHA512f89cccaddff10ebe4200dbd9becc56327277522e32b6b0425ef57e334e806d26888c6f07ea76dd7c152fc83b173a2975006e61f84b0a5348687d1e256bd00c91
-
Filesize
579KB
MD5ecf708ffb402f5956e63e73313d8c46f
SHA19333f29c771a162cdf3b00a07ea6a94623e33762
SHA25657c011aeceb54ab58d9d2ea21a115ca66145c445e172492ace12cce697c0852e
SHA512f89cccaddff10ebe4200dbd9becc56327277522e32b6b0425ef57e334e806d26888c6f07ea76dd7c152fc83b173a2975006e61f84b0a5348687d1e256bd00c91
-
Filesize
579KB
MD5ecf708ffb402f5956e63e73313d8c46f
SHA19333f29c771a162cdf3b00a07ea6a94623e33762
SHA25657c011aeceb54ab58d9d2ea21a115ca66145c445e172492ace12cce697c0852e
SHA512f89cccaddff10ebe4200dbd9becc56327277522e32b6b0425ef57e334e806d26888c6f07ea76dd7c152fc83b173a2975006e61f84b0a5348687d1e256bd00c91
-
Filesize
559B
MD526f46db1233de6727079d7a2a95ea4b6
SHA15e0535394a608411c1a1c6cb1d5b4d6b52e1364d
SHA256fb1b78c5bdcfedc3c928847a89411870bfd5b69c3c0054db272c84b8d282cdab
SHA51281cf0bdf4215aa51c93ec0a581d2a35eda53f3d496b9dc4d6c720512b13301639d97bccd5a13570786301b552185a1afab2ea88606a2d536e6895024eaea1b4b
-
Filesize
247KB
MD5196089db791f0ae40e8c2e8dfabd8808
SHA137056f187730562c28d9cfc2a5a38131e30c129a
SHA2563058c4866121911e1e0ea1cbef3a1b89f4b6e2b4e4f3bd921a7c89a190b2f3f0
SHA5121b3f8628396710661bc53a98375af946bec92163c858017504e417b37d3ea038f399a62836160bd60aec5b24c740ff37edc93d736077625233afb6aecd0d70d4
-
Filesize
247KB
MD54301e1547ca676ccf1c86b00bc3c2da5
SHA150b9e8a77d43f755a5c7919ff71141dc1ae23d83
SHA256c689296785b9c4f001b6d2e3f3393b0ccf6e4f1ff9a5b84f97d8716e0e9d5ce1
SHA5125bdfcc62666599775a0006da41d6fd2c51ae6d3fb5d13c0cd3255edb77a1cc37f0e9be1dce89820b70ae3779e0981b1c4da1bab75f904283811b94c420c38678