Analysis
-
max time kernel
134s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a.exe
Resource
win10v2004-20220901-en
General
-
Target
d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a.exe
-
Size
131KB
-
MD5
96913d6244f6bb0ab29ce62eec1d559e
-
SHA1
819d65aa67cca7eeaf2755c7a73ed4d62f4a9ad8
-
SHA256
d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a
-
SHA512
d2205cc958e39005d5009eb32b9d52e2a9c5d66354160376e4e6568cb1e32359700810d748ec968b8028616457883331237af57747dba13f032771756633c63a
-
SSDEEP
3072:2GW3B+DukJ7F8wg5xamn7ZYj0azIX8LXwDIukqwr1Q9u:2Jq8wg5xp7Z1X8LADIudwr3
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\xeufw.sys kav.exe File created C:\Windows\SysWOW64\drivers\xeufw.sys kav.exe -
Executes dropped EXE 7 IoCs
pid Process 1100 setup.exe 2540 zcgjm.exe 3676 zcgjm.exe 1880 smsetup.exe 1656 kav.exe 4484 mstsvr.exe 4764 mstsvr.exe -
resource yara_rule behavioral2/files/0x0003000000022e07-153.dat upx behavioral2/files/0x0003000000022e07-152.dat upx behavioral2/memory/1656-158-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation smsetup.exe -
Loads dropped DLL 1 IoCs
pid Process 4376 rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 mstsvr.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE zcgjm.exe File opened for modification C:\Windows\SysWOW64\Ic08lG.dll kav.exe File opened for modification C:\Windows\SysWOW64\msconid.ini mstsvr.exe File created C:\Windows\SysWOW64\Ic08lG.dll kav.exe File created C:\Windows\SysWOW64\EpmkBX.bat kav.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 zcgjm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies zcgjm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 zcgjm.exe File opened for modification C:\Windows\SysWOW64\msconid.ini smsetup.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\mssrcid.ini setup.exe File opened for modification C:\Windows\mssrcid.ini zcgjm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix zcgjm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ zcgjm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" zcgjm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" zcgjm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mstsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mstsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mstsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" zcgjm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mstsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mstsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mstsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" zcgjm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mstsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" zcgjm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" zcgjm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mstsvr.exe -
Modifies registry class 31 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0A605DA5-9549-4405-99B0-0953CE7D8F50}\1.0\HELPDIR\ = "C:\\Windows\\SysWOW64\\" zcgjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{BD53EA37-9E35-40af-935B-27C6DB0C2FC5}\LocalService = "usnsvc" zcgjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0A605DA5-9549-4405-99B0-0953CE7D8F50}\1.0\ = "usnsvc 1.0 Type Library" zcgjm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0A605DA5-9549-4405-99B0-0953CE7D8F50}\1.0\0 zcgjm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD88891D-74FB-4505-9717-D579D7A18B90}\1.0\0 mstsvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD88891D-74FB-4505-9717-D579D7A18B90}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\mstsvr.exe" mstsvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD88891D-74FB-4505-9717-D579D7A18B90}\1.0\HELPDIR\ = "C:\\Windows\\SysWOW64\\" mstsvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{BD53EA37-9E35-40af-935B-27C6DB0C2FC5} zcgjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0A605DA5-9549-4405-99B0-0953CE7D8F50}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\zcgjm.exe" zcgjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\usnsvc.EXE\AppID = "{3A2F6FDB-1C41-40aa-ABF0-1B6A4CAF1227}" mstsvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD88891D-74FB-4505-9717-D579D7A18B90}\1.0 mstsvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD88891D-74FB-4505-9717-D579D7A18B90}\1.0\ = "usnsvc 1.0 Type Library" mstsvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{BD53EA37-9E35-40af-935B-27C6DB0C2FC5}\ = "ThunderMan" zcgjm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0A605DA5-9549-4405-99B0-0953CE7D8F50}\1.0\HELPDIR zcgjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{3A2F6FDB-1C41-40aa-ABF0-1B6A4CAF1227}\ = "ctfsvc" mstsvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD88891D-74FB-4505-9717-D579D7A18B90}\1.0\FLAGS\ = "0" mstsvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0A605DA5-9549-4405-99B0-0953CE7D8F50}\1.0\0\win32 zcgjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{3A2F6FDB-1C41-40aa-ABF0-1B6A4CAF1227}\LocalService = "ctfsvc" mstsvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD88891D-74FB-4505-9717-D579D7A18B90} mstsvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0A605DA5-9549-4405-99B0-0953CE7D8F50} zcgjm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0A605DA5-9549-4405-99B0-0953CE7D8F50}\1.0 zcgjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0A605DA5-9549-4405-99B0-0953CE7D8F50}\1.0\FLAGS\ = "0" zcgjm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD88891D-74FB-4505-9717-D579D7A18B90}\1.0\HELPDIR mstsvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\usnsvc.EXE\AppID = "{BD53EA37-9E35-40af-935B-27C6DB0C2FC5}" zcgjm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{3A2F6FDB-1C41-40aa-ABF0-1B6A4CAF1227} mstsvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD88891D-74FB-4505-9717-D579D7A18B90}\1.0\0\win32 mstsvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{BD53EA37-9E35-40af-935B-27C6DB0C2FC5}\ServiceParameters = "-Service" zcgjm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0A605DA5-9549-4405-99B0-0953CE7D8F50}\1.0\FLAGS zcgjm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD88891D-74FB-4505-9717-D579D7A18B90}\1.0\FLAGS mstsvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\usnsvc.EXE zcgjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{3A2F6FDB-1C41-40aa-ABF0-1B6A4CAF1227}\ServiceParameters = "-Service" mstsvr.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4748 PING.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3676 zcgjm.exe 3676 zcgjm.exe 3676 zcgjm.exe 3676 zcgjm.exe 4764 mstsvr.exe 4764 mstsvr.exe 4764 mstsvr.exe 4764 mstsvr.exe 4376 rundll32.exe 4376 rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4376 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4376 rundll32.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1028 wrote to memory of 1100 1028 d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a.exe 83 PID 1028 wrote to memory of 1100 1028 d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a.exe 83 PID 1028 wrote to memory of 1100 1028 d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a.exe 83 PID 1100 wrote to memory of 2540 1100 setup.exe 84 PID 1100 wrote to memory of 2540 1100 setup.exe 84 PID 1100 wrote to memory of 2540 1100 setup.exe 84 PID 1100 wrote to memory of 2364 1100 setup.exe 85 PID 1100 wrote to memory of 2364 1100 setup.exe 85 PID 1100 wrote to memory of 2364 1100 setup.exe 85 PID 2364 wrote to memory of 3684 2364 net.exe 87 PID 2364 wrote to memory of 3684 2364 net.exe 87 PID 2364 wrote to memory of 3684 2364 net.exe 87 PID 1100 wrote to memory of 4208 1100 setup.exe 93 PID 1100 wrote to memory of 4208 1100 setup.exe 93 PID 1100 wrote to memory of 4208 1100 setup.exe 93 PID 1028 wrote to memory of 1880 1028 d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a.exe 95 PID 1028 wrote to memory of 1880 1028 d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a.exe 95 PID 1028 wrote to memory of 1880 1028 d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a.exe 95 PID 1028 wrote to memory of 1656 1028 d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a.exe 96 PID 1028 wrote to memory of 1656 1028 d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a.exe 96 PID 1028 wrote to memory of 1656 1028 d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a.exe 96 PID 1880 wrote to memory of 4484 1880 smsetup.exe 97 PID 1880 wrote to memory of 4484 1880 smsetup.exe 97 PID 1880 wrote to memory of 4484 1880 smsetup.exe 97 PID 1880 wrote to memory of 3460 1880 smsetup.exe 98 PID 1880 wrote to memory of 3460 1880 smsetup.exe 98 PID 1880 wrote to memory of 3460 1880 smsetup.exe 98 PID 1656 wrote to memory of 4348 1656 kav.exe 100 PID 1656 wrote to memory of 4348 1656 kav.exe 100 PID 1656 wrote to memory of 4348 1656 kav.exe 100 PID 3460 wrote to memory of 4616 3460 net.exe 102 PID 3460 wrote to memory of 4616 3460 net.exe 102 PID 3460 wrote to memory of 4616 3460 net.exe 102 PID 4348 wrote to memory of 4748 4348 cmd.exe 104 PID 4348 wrote to memory of 4748 4348 cmd.exe 104 PID 4348 wrote to memory of 4748 4348 cmd.exe 104 PID 1880 wrote to memory of 448 1880 smsetup.exe 107 PID 1880 wrote to memory of 448 1880 smsetup.exe 107 PID 1880 wrote to memory of 448 1880 smsetup.exe 107 PID 3676 wrote to memory of 4376 3676 zcgjm.exe 109 PID 3676 wrote to memory of 4376 3676 zcgjm.exe 109 PID 3676 wrote to memory of 4376 3676 zcgjm.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a.exe"C:\Users\Admin\AppData\Local\Temp\d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Messenger\setup.exe"C:\Users\Admin\AppData\Local\Temp\Messenger\setup.exe" d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\zcgjm.exe"C:\Windows\system32\zcgjm.exe" /service3⤵
- Executes dropped EXE
- Modifies registry class
PID:2540
-
-
C:\Windows\SysWOW64\net.exenet start SENSMGR3⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start SENSMGR4⤵PID:3684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "3⤵PID:4208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Messenger\smsetup.exe"C:\Users\Admin\AppData\Local\Temp\Messenger\smsetup.exe" d47c38a620bc1450f1fea3ad6cd3b722d146b82da977e8a842ce7d55c724bf1a2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\mstsvr.exe"C:\Windows\system32\mstsvr.exe" /service3⤵
- Executes dropped EXE
- Modifies registry class
PID:4484
-
-
C:\Windows\SysWOW64\net.exenet start Nlap3⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Nlap4⤵PID:4616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "3⤵PID:448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Messenger\kav.exeC:\Users\Admin\AppData\Local\Temp\Messenger\kav.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\EpmkBX.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.0.0.14⤵
- Runs ping.exe
PID:4748
-
-
-
-
C:\Windows\SysWOW64\zcgjm.exeC:\Windows\SysWOW64\zcgjm.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\bejnr.dll",DllCanUnloadNow2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4376
-
-
C:\Windows\SysWOW64\mstsvr.exeC:\Windows\SysWOW64\mstsvr.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD55d2fe1176a6b41b3af7169be4bdd0d22
SHA14a221dd55ed5fd193021cd185c5f0b456f7f42b5
SHA2566cab94da67ac03c0bce5da0cb606e8d0b94bdef8d11c6cfd48bcda10349b2084
SHA512537e621a3416f4a50329a559e65d5a1585efb6749d847c78717bead5279c287295cc19c742e056dc80a365ac26d5c30111b8d5b11807fb62c2533d2fbbffdfbf
-
Filesize
35KB
MD55d2fe1176a6b41b3af7169be4bdd0d22
SHA14a221dd55ed5fd193021cd185c5f0b456f7f42b5
SHA2566cab94da67ac03c0bce5da0cb606e8d0b94bdef8d11c6cfd48bcda10349b2084
SHA512537e621a3416f4a50329a559e65d5a1585efb6749d847c78717bead5279c287295cc19c742e056dc80a365ac26d5c30111b8d5b11807fb62c2533d2fbbffdfbf
-
Filesize
44KB
MD52b0d9cb97fe7032f2bb087bc4b417f5a
SHA1a6f577350cbfce58154fdedc4db424c915971607
SHA256c933dfbabfb08b8b93189899aa0c73b8898da6dbbd143fc71b760ce92ad4ba4c
SHA5128f12518c6eba403430175fe41a860a2944e0ffb209cab8d82c8a61f64cc0ad70cc70329674fd3b85fd2ef57940fd83277d9b1ab0089c4d11683668d5d7a7f8cd
-
Filesize
20B
MD59e16c76831e67d996169bebddf8f01f1
SHA19b8336b538857fbe66cb5c7e333e19850f47da8e
SHA2569c1c3335266818b7638f156ac4f58f2e6df333755edbb3dcd73cb57feac77474
SHA51241ad21af8cb02fca88a885b526d44d9f34f2fa46dbe1676d8f751974f06ab7cbd6ccc0c123a445f2cb75044c719493c03dcbc9b258769020987487bf4335d12b
-
Filesize
20B
MD5c6e1afea9716042a2dd1b7ab7a88a8f8
SHA180aa0fc432cba13c16c42e33cacfdcd7e69e9cf2
SHA256170ceda177641ea1400d4a9588c3333b0a8dc7ce2932213d18f37dec0dc28b5d
SHA512225c7a01245028bc8d410d4b6d5bbc1eec0f002ed019a3b20f881f279b789b36f124d4a574927bca91476070e0526862b2b49428a8339a3f0bf2cb34903a1303
-
Filesize
20KB
MD5f8ca8a1bc1b5f8ec1cc8aa483bc8cfa5
SHA16f95991be4dd19b660c6bbe83520b72f37f9e058
SHA256d3e192b70ccdc8dd1bf5eef74de024a23f82fb5165fbb5676e0e3182493ebc33
SHA5125293863222b56d118a58386e3238dcd66f8ae4ba0e2935809b5c5944fb4c2d193611208570f965697410df7bf3fb9e44120f6135da1b83239617f412fee0b817
-
Filesize
20KB
MD5f8ca8a1bc1b5f8ec1cc8aa483bc8cfa5
SHA16f95991be4dd19b660c6bbe83520b72f37f9e058
SHA256d3e192b70ccdc8dd1bf5eef74de024a23f82fb5165fbb5676e0e3182493ebc33
SHA5125293863222b56d118a58386e3238dcd66f8ae4ba0e2935809b5c5944fb4c2d193611208570f965697410df7bf3fb9e44120f6135da1b83239617f412fee0b817
-
Filesize
16KB
MD51e96704f36c96382e2b987059e17e412
SHA150ebf6761290d670db12dd642b102aef7c596ac1
SHA2568ed8287d1c985212e3d19c9bd90ca18d90f086942aca3b86a905f57d88a17ea7
SHA512e14ff0656cc0b45abdb692232d869f95fe11ac0c32b61524df971f7bf82145834254355ca5d7788fbebae0f74aec3496626b1e4f4cb84084410e7b1e641de5b8
-
Filesize
16KB
MD51e96704f36c96382e2b987059e17e412
SHA150ebf6761290d670db12dd642b102aef7c596ac1
SHA2568ed8287d1c985212e3d19c9bd90ca18d90f086942aca3b86a905f57d88a17ea7
SHA512e14ff0656cc0b45abdb692232d869f95fe11ac0c32b61524df971f7bf82145834254355ca5d7788fbebae0f74aec3496626b1e4f4cb84084410e7b1e641de5b8
-
Filesize
72KB
MD56e2a0e9e10d253c3979f081963d78775
SHA1202d30cee7a1529e33ce28b70e184e76b2be0ea6
SHA2564d0df030fd5c18f8ee796a1be36c054315af1ec0c792c31fc6281c7ab7a44ef9
SHA5123a1969e8f3d6ac6bd35b385b996b1ddd109bed92060e173c9e4bc2aa038fe43b24fdab21d10c326c4e64a5d23cfa7deb7092459ef2fa8aceefa04a071de34845
-
Filesize
40KB
MD585881b81b7529804e4aaa215729d1a52
SHA113f2af7a7385fb06a2b6a970f5c0541d640be686
SHA256554b3dae84fd0366baba6131064f411bd2d2ccb894cc14f162ae49a6698c10da
SHA512b16d7a923a4b7c00fc97e848556f2debe1ec68abc3990344cd379743f121e724cc6e56eab5ec4c1a0440b71ed64bec07f1a341605197d7d22b11a43903ec6e44
-
Filesize
252B
MD5e614a4e86cbaa2e3e0bb6964fde8e6e0
SHA1450ea0d48729df612d70de4f582a86929e8d9303
SHA256c9c8a8c494567708d1332f9b8ad77ac2ef48edfe909741edf3b30d73aeb346c1
SHA512c13945e7ca8b39562706a35d9957da4110d094992db1478575d991d9067e48a032d81f9253ddf1802660f2338baca80181cb1af3aefca11374a530cd66cb271f
-
Filesize
256B
MD51f4d87df7755b65591d4b959c62472ff
SHA16116761213271b12f5de0ab88370704cba3d977b
SHA25610497a36394968d187f64d217e560275c52a2df11eda04f5be879348b47e7302
SHA512ae9a9a63edb7bea422fd275f253fe6a209de5d96acba94740195a13d93f1595112b49abaf6b7d7b828f9ec29ef752a93353d455f93a01d7a66311676e2a13340
-
Filesize
183B
MD5125af039fe4019a90a694b9544056014
SHA12815917fd0d3ab6888f5dcf5ecc28f82ab7099f6
SHA256435eb8f6edfb4ba2d832656fa84e6ba2118505d8ece1ef9d90fc23c0e07354d3
SHA512ca0fb765feb66ab769a63bff58e02c27193e2f175516ba3fedf544efe4e09de00a78cf0276d7ca0d7a498bcf6037a95d4382a4acfcf9f43e723f2c218f7e6d17
-
Filesize
44KB
MD52b0d9cb97fe7032f2bb087bc4b417f5a
SHA1a6f577350cbfce58154fdedc4db424c915971607
SHA256c933dfbabfb08b8b93189899aa0c73b8898da6dbbd143fc71b760ce92ad4ba4c
SHA5128f12518c6eba403430175fe41a860a2944e0ffb209cab8d82c8a61f64cc0ad70cc70329674fd3b85fd2ef57940fd83277d9b1ab0089c4d11683668d5d7a7f8cd
-
Filesize
44KB
MD52b0d9cb97fe7032f2bb087bc4b417f5a
SHA1a6f577350cbfce58154fdedc4db424c915971607
SHA256c933dfbabfb08b8b93189899aa0c73b8898da6dbbd143fc71b760ce92ad4ba4c
SHA5128f12518c6eba403430175fe41a860a2944e0ffb209cab8d82c8a61f64cc0ad70cc70329674fd3b85fd2ef57940fd83277d9b1ab0089c4d11683668d5d7a7f8cd
-
Filesize
40KB
MD585881b81b7529804e4aaa215729d1a52
SHA113f2af7a7385fb06a2b6a970f5c0541d640be686
SHA256554b3dae84fd0366baba6131064f411bd2d2ccb894cc14f162ae49a6698c10da
SHA512b16d7a923a4b7c00fc97e848556f2debe1ec68abc3990344cd379743f121e724cc6e56eab5ec4c1a0440b71ed64bec07f1a341605197d7d22b11a43903ec6e44
-
Filesize
40KB
MD585881b81b7529804e4aaa215729d1a52
SHA113f2af7a7385fb06a2b6a970f5c0541d640be686
SHA256554b3dae84fd0366baba6131064f411bd2d2ccb894cc14f162ae49a6698c10da
SHA512b16d7a923a4b7c00fc97e848556f2debe1ec68abc3990344cd379743f121e724cc6e56eab5ec4c1a0440b71ed64bec07f1a341605197d7d22b11a43903ec6e44
-
Filesize
72KB
MD56e2a0e9e10d253c3979f081963d78775
SHA1202d30cee7a1529e33ce28b70e184e76b2be0ea6
SHA2564d0df030fd5c18f8ee796a1be36c054315af1ec0c792c31fc6281c7ab7a44ef9
SHA5123a1969e8f3d6ac6bd35b385b996b1ddd109bed92060e173c9e4bc2aa038fe43b24fdab21d10c326c4e64a5d23cfa7deb7092459ef2fa8aceefa04a071de34845
-
Filesize
99B
MD543af6a24ec74219589d4e4c08396b6dd
SHA1233dc1435df3c4b2dbde93fa073e0efa0a398f4d
SHA256382c663101a66cfe05a13137a90b88a8d97fd8cc93f063bb86dd531392efda49
SHA512b94bf5201ceebc69afbb42350e709aa87db3f00541c70ce489258c3f9411b975acce577370da55f690cc597e396db55a3813f98dc3b03ef4f7b787fbcc2fdd9b