Analysis
-
max time kernel
114s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/04/2023, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
General
-
Target
file.exe
-
Size
1.4MB
-
MD5
436bc065809c7b80ee713bca5f95389f
-
SHA1
1fc9c2e15ebc71a851c3e60b38d60697378a5abb
-
SHA256
99682f04669cc3fdfbe48e3ac0a25bf107f3a8e07f3f30d192fd2d246f41c4fd
-
SHA512
0dc01c9e1c602a50c1fd36b88eab68b4da84c8a692c9a745ab0ce82182e0780cfe50c0084121f016146db2924cc70864e4bf8898de76b3e5210a9c56f2112238
-
SSDEEP
24576:4yoOwsNNs0OFZwXuDj54SMT+50ClZPZLYGdsT1lpJSgnMVOF5cRQczis2:/RtNiTj3d0EZL5yT1ZdgOryQc
Malware Config
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az500318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az500318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bu067079.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bu067079.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bu067079.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az500318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az500318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az500318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bu067079.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bu067079.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az500318.exe -
Executes dropped EXE 13 IoCs
pid Process 1468 ki629412.exe 1156 ki378675.exe 268 ki428151.exe 1240 ki221952.exe 1848 az500318.exe 1852 bu067079.exe 340 co846843.exe 1612 diJ52t40.exe 684 oneetx.exe 1484 ft887915.exe 1088 ge330794.exe 1236 oneetx.exe 548 oneetx.exe -
Loads dropped DLL 28 IoCs
pid Process 1480 file.exe 1468 ki629412.exe 1468 ki629412.exe 1156 ki378675.exe 1156 ki378675.exe 268 ki428151.exe 268 ki428151.exe 1240 ki221952.exe 1240 ki221952.exe 1240 ki221952.exe 1240 ki221952.exe 1852 bu067079.exe 268 ki428151.exe 268 ki428151.exe 340 co846843.exe 1156 ki378675.exe 1612 diJ52t40.exe 1612 diJ52t40.exe 684 oneetx.exe 1468 ki629412.exe 1484 ft887915.exe 1480 file.exe 1480 file.exe 1088 ge330794.exe 304 rundll32.exe 304 rundll32.exe 304 rundll32.exe 304 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" bu067079.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features az500318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az500318.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features bu067079.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ki428151.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ki221952.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ki629412.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ki428151.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ki221952.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ki629412.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ki378675.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ki378675.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1848 az500318.exe 1848 az500318.exe 1852 bu067079.exe 1852 bu067079.exe 340 co846843.exe 340 co846843.exe 1484 ft887915.exe 1484 ft887915.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1848 az500318.exe Token: SeDebugPrivilege 1852 bu067079.exe Token: SeDebugPrivilege 340 co846843.exe Token: SeDebugPrivilege 1484 ft887915.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 diJ52t40.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1468 1480 file.exe 28 PID 1480 wrote to memory of 1468 1480 file.exe 28 PID 1480 wrote to memory of 1468 1480 file.exe 28 PID 1480 wrote to memory of 1468 1480 file.exe 28 PID 1480 wrote to memory of 1468 1480 file.exe 28 PID 1480 wrote to memory of 1468 1480 file.exe 28 PID 1480 wrote to memory of 1468 1480 file.exe 28 PID 1468 wrote to memory of 1156 1468 ki629412.exe 29 PID 1468 wrote to memory of 1156 1468 ki629412.exe 29 PID 1468 wrote to memory of 1156 1468 ki629412.exe 29 PID 1468 wrote to memory of 1156 1468 ki629412.exe 29 PID 1468 wrote to memory of 1156 1468 ki629412.exe 29 PID 1468 wrote to memory of 1156 1468 ki629412.exe 29 PID 1468 wrote to memory of 1156 1468 ki629412.exe 29 PID 1156 wrote to memory of 268 1156 ki378675.exe 30 PID 1156 wrote to memory of 268 1156 ki378675.exe 30 PID 1156 wrote to memory of 268 1156 ki378675.exe 30 PID 1156 wrote to memory of 268 1156 ki378675.exe 30 PID 1156 wrote to memory of 268 1156 ki378675.exe 30 PID 1156 wrote to memory of 268 1156 ki378675.exe 30 PID 1156 wrote to memory of 268 1156 ki378675.exe 30 PID 268 wrote to memory of 1240 268 ki428151.exe 31 PID 268 wrote to memory of 1240 268 ki428151.exe 31 PID 268 wrote to memory of 1240 268 ki428151.exe 31 PID 268 wrote to memory of 1240 268 ki428151.exe 31 PID 268 wrote to memory of 1240 268 ki428151.exe 31 PID 268 wrote to memory of 1240 268 ki428151.exe 31 PID 268 wrote to memory of 1240 268 ki428151.exe 31 PID 1240 wrote to memory of 1848 1240 ki221952.exe 32 PID 1240 wrote to memory of 1848 1240 ki221952.exe 32 PID 1240 wrote to memory of 1848 1240 ki221952.exe 32 PID 1240 wrote to memory of 1848 1240 ki221952.exe 32 PID 1240 wrote to memory of 1848 1240 ki221952.exe 32 PID 1240 wrote to memory of 1848 1240 ki221952.exe 32 PID 1240 wrote to memory of 1848 1240 ki221952.exe 32 PID 1240 wrote to memory of 1852 1240 ki221952.exe 33 PID 1240 wrote to memory of 1852 1240 ki221952.exe 33 PID 1240 wrote to memory of 1852 1240 ki221952.exe 33 PID 1240 wrote to memory of 1852 1240 ki221952.exe 33 PID 1240 wrote to memory of 1852 1240 ki221952.exe 33 PID 1240 wrote to memory of 1852 1240 ki221952.exe 33 PID 1240 wrote to memory of 1852 1240 ki221952.exe 33 PID 268 wrote to memory of 340 268 ki428151.exe 34 PID 268 wrote to memory of 340 268 ki428151.exe 34 PID 268 wrote to memory of 340 268 ki428151.exe 34 PID 268 wrote to memory of 340 268 ki428151.exe 34 PID 268 wrote to memory of 340 268 ki428151.exe 34 PID 268 wrote to memory of 340 268 ki428151.exe 34 PID 268 wrote to memory of 340 268 ki428151.exe 34 PID 1156 wrote to memory of 1612 1156 ki378675.exe 36 PID 1156 wrote to memory of 1612 1156 ki378675.exe 36 PID 1156 wrote to memory of 1612 1156 ki378675.exe 36 PID 1156 wrote to memory of 1612 1156 ki378675.exe 36 PID 1156 wrote to memory of 1612 1156 ki378675.exe 36 PID 1156 wrote to memory of 1612 1156 ki378675.exe 36 PID 1156 wrote to memory of 1612 1156 ki378675.exe 36 PID 1612 wrote to memory of 684 1612 diJ52t40.exe 37 PID 1612 wrote to memory of 684 1612 diJ52t40.exe 37 PID 1612 wrote to memory of 684 1612 diJ52t40.exe 37 PID 1612 wrote to memory of 684 1612 diJ52t40.exe 37 PID 1612 wrote to memory of 684 1612 diJ52t40.exe 37 PID 1612 wrote to memory of 684 1612 diJ52t40.exe 37 PID 1612 wrote to memory of 684 1612 diJ52t40.exe 37 PID 1468 wrote to memory of 1484 1468 ki629412.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki629412.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki629412.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki378675.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki378675.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki428151.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki428151.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki221952.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki221952.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az500318.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az500318.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu067079.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu067079.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\co846843.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\co846843.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:340
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\diJ52t40.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\diJ52t40.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:684 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F6⤵
- Creates scheduled task(s)
PID:936
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:304
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ft887915.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ft887915.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge330794.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge330794.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1088
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {47A4FA9F-3FA7-4E7F-9BCF-CC3FD7BF3910} S-1-5-21-1283023626-844874658-3193756055-1000:THEQWNRW\Admin:Interactive:[1]1⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe2⤵
- Executes dropped EXE
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe2⤵
- Executes dropped EXE
PID:548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD53718a5e999765010d03667a3fc32cfc4
SHA1d2228490f11fc2cf3112d18603a59b5e95e66f59
SHA2561a446e94fbd7b1b6cb0d07857e777dfc8feea501aa1d78d4c03bd42cb8526307
SHA51206b1bf58c7476ed991e6e38d16ce212d70afdaafcc27b800cc2fa5df81dcf8c11db2e709ad78e4d4382aedb3624344611ca6ac07d2b800c3b797705d85f7aed5
-
Filesize
229KB
MD53718a5e999765010d03667a3fc32cfc4
SHA1d2228490f11fc2cf3112d18603a59b5e95e66f59
SHA2561a446e94fbd7b1b6cb0d07857e777dfc8feea501aa1d78d4c03bd42cb8526307
SHA51206b1bf58c7476ed991e6e38d16ce212d70afdaafcc27b800cc2fa5df81dcf8c11db2e709ad78e4d4382aedb3624344611ca6ac07d2b800c3b797705d85f7aed5
-
Filesize
229KB
MD53718a5e999765010d03667a3fc32cfc4
SHA1d2228490f11fc2cf3112d18603a59b5e95e66f59
SHA2561a446e94fbd7b1b6cb0d07857e777dfc8feea501aa1d78d4c03bd42cb8526307
SHA51206b1bf58c7476ed991e6e38d16ce212d70afdaafcc27b800cc2fa5df81dcf8c11db2e709ad78e4d4382aedb3624344611ca6ac07d2b800c3b797705d85f7aed5
-
Filesize
229KB
MD53718a5e999765010d03667a3fc32cfc4
SHA1d2228490f11fc2cf3112d18603a59b5e95e66f59
SHA2561a446e94fbd7b1b6cb0d07857e777dfc8feea501aa1d78d4c03bd42cb8526307
SHA51206b1bf58c7476ed991e6e38d16ce212d70afdaafcc27b800cc2fa5df81dcf8c11db2e709ad78e4d4382aedb3624344611ca6ac07d2b800c3b797705d85f7aed5
-
Filesize
229KB
MD53718a5e999765010d03667a3fc32cfc4
SHA1d2228490f11fc2cf3112d18603a59b5e95e66f59
SHA2561a446e94fbd7b1b6cb0d07857e777dfc8feea501aa1d78d4c03bd42cb8526307
SHA51206b1bf58c7476ed991e6e38d16ce212d70afdaafcc27b800cc2fa5df81dcf8c11db2e709ad78e4d4382aedb3624344611ca6ac07d2b800c3b797705d85f7aed5
-
Filesize
390KB
MD565607330953575adbdc695c97a2ad43a
SHA18d91528bf5e1a2e489caf46449ed890456f2bfc7
SHA256d47e1a80623c3c06e6e253242033087617c3d572a6d8578f759a1758def88353
SHA512b5e59c143a7c0d56a58aafce683870e9f0cfa247a6be6fb640afe69950ec073b772170cf0c3b66334f051b8bdcfd5683f08f34710ca5ec8b2be43095706f47b0
-
Filesize
390KB
MD565607330953575adbdc695c97a2ad43a
SHA18d91528bf5e1a2e489caf46449ed890456f2bfc7
SHA256d47e1a80623c3c06e6e253242033087617c3d572a6d8578f759a1758def88353
SHA512b5e59c143a7c0d56a58aafce683870e9f0cfa247a6be6fb640afe69950ec073b772170cf0c3b66334f051b8bdcfd5683f08f34710ca5ec8b2be43095706f47b0
-
Filesize
390KB
MD565607330953575adbdc695c97a2ad43a
SHA18d91528bf5e1a2e489caf46449ed890456f2bfc7
SHA256d47e1a80623c3c06e6e253242033087617c3d572a6d8578f759a1758def88353
SHA512b5e59c143a7c0d56a58aafce683870e9f0cfa247a6be6fb640afe69950ec073b772170cf0c3b66334f051b8bdcfd5683f08f34710ca5ec8b2be43095706f47b0
-
Filesize
1.1MB
MD51793725ad28d2de63f314133cbf9b6d6
SHA1cbb69d1bebde7feec0d5260fc54df3249360ef9a
SHA25608874f9a5f03b92d2ca7271ba0373053bb2b87e2913d114252bebd259fd768c2
SHA512ab178f29d03073032aaa5fcd13b310ac0f2c36c316a1f1a7d0ac53dce3cb0f84ba4ad9525af2816ca5bb784fea2c6d0f7fe8a54d1dd09a4a70f3fc03a5719b0f
-
Filesize
1.1MB
MD51793725ad28d2de63f314133cbf9b6d6
SHA1cbb69d1bebde7feec0d5260fc54df3249360ef9a
SHA25608874f9a5f03b92d2ca7271ba0373053bb2b87e2913d114252bebd259fd768c2
SHA512ab178f29d03073032aaa5fcd13b310ac0f2c36c316a1f1a7d0ac53dce3cb0f84ba4ad9525af2816ca5bb784fea2c6d0f7fe8a54d1dd09a4a70f3fc03a5719b0f
-
Filesize
136KB
MD5ea72439e3e2f957f4b2ec177e5a3616b
SHA1cf845680e8e7372e517bee8ecad43289cf4752d4
SHA25678bbb55472c909a81e950e99d00a23b8d21e0f80091a4d99dd322583b6a76dac
SHA5122cb8f782083fb00a1afdac630cff406bd18df72a5838497674620d1c2936101ba0f5ed4d48117438fd3d635cb6a77ee0c75cc5e0b5bac4d7ac5457479eaf6dd7
-
Filesize
136KB
MD5ea72439e3e2f957f4b2ec177e5a3616b
SHA1cf845680e8e7372e517bee8ecad43289cf4752d4
SHA25678bbb55472c909a81e950e99d00a23b8d21e0f80091a4d99dd322583b6a76dac
SHA5122cb8f782083fb00a1afdac630cff406bd18df72a5838497674620d1c2936101ba0f5ed4d48117438fd3d635cb6a77ee0c75cc5e0b5bac4d7ac5457479eaf6dd7
-
Filesize
988KB
MD58947aca3702e8b41c64f3794da8d71c8
SHA1f5fdebd6db5da4b197a552e83d950ec8222bf542
SHA256ebff92d00f257feb0d0be1ac611f486c8bd1c7242f4f7d2fb613c22eb29322c2
SHA5122917ca3a4c24bb62dbb7924f17f79d58e9925df390b21da38a63341e815c478e54374085bab3ccd75c05eb47c93910658ef1c5ff2e360233807cd9f834a7012d
-
Filesize
988KB
MD58947aca3702e8b41c64f3794da8d71c8
SHA1f5fdebd6db5da4b197a552e83d950ec8222bf542
SHA256ebff92d00f257feb0d0be1ac611f486c8bd1c7242f4f7d2fb613c22eb29322c2
SHA5122917ca3a4c24bb62dbb7924f17f79d58e9925df390b21da38a63341e815c478e54374085bab3ccd75c05eb47c93910658ef1c5ff2e360233807cd9f834a7012d
-
Filesize
229KB
MD53718a5e999765010d03667a3fc32cfc4
SHA1d2228490f11fc2cf3112d18603a59b5e95e66f59
SHA2561a446e94fbd7b1b6cb0d07857e777dfc8feea501aa1d78d4c03bd42cb8526307
SHA51206b1bf58c7476ed991e6e38d16ce212d70afdaafcc27b800cc2fa5df81dcf8c11db2e709ad78e4d4382aedb3624344611ca6ac07d2b800c3b797705d85f7aed5
-
Filesize
229KB
MD53718a5e999765010d03667a3fc32cfc4
SHA1d2228490f11fc2cf3112d18603a59b5e95e66f59
SHA2561a446e94fbd7b1b6cb0d07857e777dfc8feea501aa1d78d4c03bd42cb8526307
SHA51206b1bf58c7476ed991e6e38d16ce212d70afdaafcc27b800cc2fa5df81dcf8c11db2e709ad78e4d4382aedb3624344611ca6ac07d2b800c3b797705d85f7aed5
-
Filesize
804KB
MD54d0563494e1fc78b0a447f3fa6c71004
SHA12089e4dfda369f315c170a47b2422b59cfbca891
SHA256fa3afff9a0ee8e1b9ba752e09e2829978c8e9213b356713959d81f14ee8a1c88
SHA512441390ad3c14cd541a899adc2558475ee0a031c369ef8a0403361c5891538da16f38029a18b93eed64a95c4e5a29e53f7fbe40eb253fa4335b5285903fc51b66
-
Filesize
804KB
MD54d0563494e1fc78b0a447f3fa6c71004
SHA12089e4dfda369f315c170a47b2422b59cfbca891
SHA256fa3afff9a0ee8e1b9ba752e09e2829978c8e9213b356713959d81f14ee8a1c88
SHA512441390ad3c14cd541a899adc2558475ee0a031c369ef8a0403361c5891538da16f38029a18b93eed64a95c4e5a29e53f7fbe40eb253fa4335b5285903fc51b66
-
Filesize
481KB
MD57154de41a1df4951ce4e278accb00d05
SHA18d22a9ffebe8845e74821ffbe8f564af8a37c286
SHA25629a43e853a0709927fb14bd7959b3fec405ab6faba55069bb02d23a3c73a94be
SHA51263e453f4237659c2619e9f6e158a8d858e592b2dd327d3c5c60a28dd97c602220e80a5bd8c41ddc84c10072c4fbe159af080ea8719190ed44e4599cfca0adc8a
-
Filesize
481KB
MD57154de41a1df4951ce4e278accb00d05
SHA18d22a9ffebe8845e74821ffbe8f564af8a37c286
SHA25629a43e853a0709927fb14bd7959b3fec405ab6faba55069bb02d23a3c73a94be
SHA51263e453f4237659c2619e9f6e158a8d858e592b2dd327d3c5c60a28dd97c602220e80a5bd8c41ddc84c10072c4fbe159af080ea8719190ed44e4599cfca0adc8a
-
Filesize
481KB
MD57154de41a1df4951ce4e278accb00d05
SHA18d22a9ffebe8845e74821ffbe8f564af8a37c286
SHA25629a43e853a0709927fb14bd7959b3fec405ab6faba55069bb02d23a3c73a94be
SHA51263e453f4237659c2619e9f6e158a8d858e592b2dd327d3c5c60a28dd97c602220e80a5bd8c41ddc84c10072c4fbe159af080ea8719190ed44e4599cfca0adc8a
-
Filesize
387KB
MD586df9d1999bd393c4cb9fe38c9da9199
SHA18dd98aef4783c769d01b7f02356176dfea3d4cf4
SHA256b5dd08fb772a8fc6c20adba82cc56134af9a1fbfb8cd35291db1490f19b99ecd
SHA512e0ee4ae8d7c44f2f1e8e65d6eda6bff6026c80bda972a1a1c367f67798c98dd67a0d7a3990c1e3e1b03425669e8aecb72cb8bf596e992e23763272de492948e1
-
Filesize
387KB
MD586df9d1999bd393c4cb9fe38c9da9199
SHA18dd98aef4783c769d01b7f02356176dfea3d4cf4
SHA256b5dd08fb772a8fc6c20adba82cc56134af9a1fbfb8cd35291db1490f19b99ecd
SHA512e0ee4ae8d7c44f2f1e8e65d6eda6bff6026c80bda972a1a1c367f67798c98dd67a0d7a3990c1e3e1b03425669e8aecb72cb8bf596e992e23763272de492948e1
-
Filesize
12KB
MD52bcc070dc52f97c3b135f57a44d67150
SHA16810763bb99c524659a2b65064b9ccc830d5b886
SHA256c22847a348d8baaadb479e0e89f50feda557526a5e07573aa8977a2b55e2fecc
SHA512b7f7d72b9600082f38c57e7b2c4298c8f7d03c9851e834fc73e29306d5ea6759efc419a204be434a5d4466d49a6c7aa1b8b8e1ae8ce112d57d438647d90d28f3
-
Filesize
12KB
MD52bcc070dc52f97c3b135f57a44d67150
SHA16810763bb99c524659a2b65064b9ccc830d5b886
SHA256c22847a348d8baaadb479e0e89f50feda557526a5e07573aa8977a2b55e2fecc
SHA512b7f7d72b9600082f38c57e7b2c4298c8f7d03c9851e834fc73e29306d5ea6759efc419a204be434a5d4466d49a6c7aa1b8b8e1ae8ce112d57d438647d90d28f3
-
Filesize
399KB
MD54fa6594208f2d646f4982de0e07c81d7
SHA13c74b4532835329c4deec7e4c3ff5d944d084ce6
SHA2562a7d882309e7c3e541a047a2e6a0c31482cb8d97e42098025376ed82ec74ab2c
SHA51294ae789dc2519abdaadbc93af706bf5f41b7ac25e2c84870e5330bd50c90e31f38a8da1ba9ec391cb861bbb8451d8aca7c7ea74d5166491db71a12ee1f4d5d57
-
Filesize
399KB
MD54fa6594208f2d646f4982de0e07c81d7
SHA13c74b4532835329c4deec7e4c3ff5d944d084ce6
SHA2562a7d882309e7c3e541a047a2e6a0c31482cb8d97e42098025376ed82ec74ab2c
SHA51294ae789dc2519abdaadbc93af706bf5f41b7ac25e2c84870e5330bd50c90e31f38a8da1ba9ec391cb861bbb8451d8aca7c7ea74d5166491db71a12ee1f4d5d57
-
Filesize
399KB
MD54fa6594208f2d646f4982de0e07c81d7
SHA13c74b4532835329c4deec7e4c3ff5d944d084ce6
SHA2562a7d882309e7c3e541a047a2e6a0c31482cb8d97e42098025376ed82ec74ab2c
SHA51294ae789dc2519abdaadbc93af706bf5f41b7ac25e2c84870e5330bd50c90e31f38a8da1ba9ec391cb861bbb8451d8aca7c7ea74d5166491db71a12ee1f4d5d57
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
229KB
MD53718a5e999765010d03667a3fc32cfc4
SHA1d2228490f11fc2cf3112d18603a59b5e95e66f59
SHA2561a446e94fbd7b1b6cb0d07857e777dfc8feea501aa1d78d4c03bd42cb8526307
SHA51206b1bf58c7476ed991e6e38d16ce212d70afdaafcc27b800cc2fa5df81dcf8c11db2e709ad78e4d4382aedb3624344611ca6ac07d2b800c3b797705d85f7aed5
-
Filesize
229KB
MD53718a5e999765010d03667a3fc32cfc4
SHA1d2228490f11fc2cf3112d18603a59b5e95e66f59
SHA2561a446e94fbd7b1b6cb0d07857e777dfc8feea501aa1d78d4c03bd42cb8526307
SHA51206b1bf58c7476ed991e6e38d16ce212d70afdaafcc27b800cc2fa5df81dcf8c11db2e709ad78e4d4382aedb3624344611ca6ac07d2b800c3b797705d85f7aed5
-
Filesize
390KB
MD565607330953575adbdc695c97a2ad43a
SHA18d91528bf5e1a2e489caf46449ed890456f2bfc7
SHA256d47e1a80623c3c06e6e253242033087617c3d572a6d8578f759a1758def88353
SHA512b5e59c143a7c0d56a58aafce683870e9f0cfa247a6be6fb640afe69950ec073b772170cf0c3b66334f051b8bdcfd5683f08f34710ca5ec8b2be43095706f47b0
-
Filesize
390KB
MD565607330953575adbdc695c97a2ad43a
SHA18d91528bf5e1a2e489caf46449ed890456f2bfc7
SHA256d47e1a80623c3c06e6e253242033087617c3d572a6d8578f759a1758def88353
SHA512b5e59c143a7c0d56a58aafce683870e9f0cfa247a6be6fb640afe69950ec073b772170cf0c3b66334f051b8bdcfd5683f08f34710ca5ec8b2be43095706f47b0
-
Filesize
390KB
MD565607330953575adbdc695c97a2ad43a
SHA18d91528bf5e1a2e489caf46449ed890456f2bfc7
SHA256d47e1a80623c3c06e6e253242033087617c3d572a6d8578f759a1758def88353
SHA512b5e59c143a7c0d56a58aafce683870e9f0cfa247a6be6fb640afe69950ec073b772170cf0c3b66334f051b8bdcfd5683f08f34710ca5ec8b2be43095706f47b0
-
Filesize
1.1MB
MD51793725ad28d2de63f314133cbf9b6d6
SHA1cbb69d1bebde7feec0d5260fc54df3249360ef9a
SHA25608874f9a5f03b92d2ca7271ba0373053bb2b87e2913d114252bebd259fd768c2
SHA512ab178f29d03073032aaa5fcd13b310ac0f2c36c316a1f1a7d0ac53dce3cb0f84ba4ad9525af2816ca5bb784fea2c6d0f7fe8a54d1dd09a4a70f3fc03a5719b0f
-
Filesize
1.1MB
MD51793725ad28d2de63f314133cbf9b6d6
SHA1cbb69d1bebde7feec0d5260fc54df3249360ef9a
SHA25608874f9a5f03b92d2ca7271ba0373053bb2b87e2913d114252bebd259fd768c2
SHA512ab178f29d03073032aaa5fcd13b310ac0f2c36c316a1f1a7d0ac53dce3cb0f84ba4ad9525af2816ca5bb784fea2c6d0f7fe8a54d1dd09a4a70f3fc03a5719b0f
-
Filesize
136KB
MD5ea72439e3e2f957f4b2ec177e5a3616b
SHA1cf845680e8e7372e517bee8ecad43289cf4752d4
SHA25678bbb55472c909a81e950e99d00a23b8d21e0f80091a4d99dd322583b6a76dac
SHA5122cb8f782083fb00a1afdac630cff406bd18df72a5838497674620d1c2936101ba0f5ed4d48117438fd3d635cb6a77ee0c75cc5e0b5bac4d7ac5457479eaf6dd7
-
Filesize
136KB
MD5ea72439e3e2f957f4b2ec177e5a3616b
SHA1cf845680e8e7372e517bee8ecad43289cf4752d4
SHA25678bbb55472c909a81e950e99d00a23b8d21e0f80091a4d99dd322583b6a76dac
SHA5122cb8f782083fb00a1afdac630cff406bd18df72a5838497674620d1c2936101ba0f5ed4d48117438fd3d635cb6a77ee0c75cc5e0b5bac4d7ac5457479eaf6dd7
-
Filesize
988KB
MD58947aca3702e8b41c64f3794da8d71c8
SHA1f5fdebd6db5da4b197a552e83d950ec8222bf542
SHA256ebff92d00f257feb0d0be1ac611f486c8bd1c7242f4f7d2fb613c22eb29322c2
SHA5122917ca3a4c24bb62dbb7924f17f79d58e9925df390b21da38a63341e815c478e54374085bab3ccd75c05eb47c93910658ef1c5ff2e360233807cd9f834a7012d
-
Filesize
988KB
MD58947aca3702e8b41c64f3794da8d71c8
SHA1f5fdebd6db5da4b197a552e83d950ec8222bf542
SHA256ebff92d00f257feb0d0be1ac611f486c8bd1c7242f4f7d2fb613c22eb29322c2
SHA5122917ca3a4c24bb62dbb7924f17f79d58e9925df390b21da38a63341e815c478e54374085bab3ccd75c05eb47c93910658ef1c5ff2e360233807cd9f834a7012d
-
Filesize
229KB
MD53718a5e999765010d03667a3fc32cfc4
SHA1d2228490f11fc2cf3112d18603a59b5e95e66f59
SHA2561a446e94fbd7b1b6cb0d07857e777dfc8feea501aa1d78d4c03bd42cb8526307
SHA51206b1bf58c7476ed991e6e38d16ce212d70afdaafcc27b800cc2fa5df81dcf8c11db2e709ad78e4d4382aedb3624344611ca6ac07d2b800c3b797705d85f7aed5
-
Filesize
229KB
MD53718a5e999765010d03667a3fc32cfc4
SHA1d2228490f11fc2cf3112d18603a59b5e95e66f59
SHA2561a446e94fbd7b1b6cb0d07857e777dfc8feea501aa1d78d4c03bd42cb8526307
SHA51206b1bf58c7476ed991e6e38d16ce212d70afdaafcc27b800cc2fa5df81dcf8c11db2e709ad78e4d4382aedb3624344611ca6ac07d2b800c3b797705d85f7aed5
-
Filesize
804KB
MD54d0563494e1fc78b0a447f3fa6c71004
SHA12089e4dfda369f315c170a47b2422b59cfbca891
SHA256fa3afff9a0ee8e1b9ba752e09e2829978c8e9213b356713959d81f14ee8a1c88
SHA512441390ad3c14cd541a899adc2558475ee0a031c369ef8a0403361c5891538da16f38029a18b93eed64a95c4e5a29e53f7fbe40eb253fa4335b5285903fc51b66
-
Filesize
804KB
MD54d0563494e1fc78b0a447f3fa6c71004
SHA12089e4dfda369f315c170a47b2422b59cfbca891
SHA256fa3afff9a0ee8e1b9ba752e09e2829978c8e9213b356713959d81f14ee8a1c88
SHA512441390ad3c14cd541a899adc2558475ee0a031c369ef8a0403361c5891538da16f38029a18b93eed64a95c4e5a29e53f7fbe40eb253fa4335b5285903fc51b66
-
Filesize
481KB
MD57154de41a1df4951ce4e278accb00d05
SHA18d22a9ffebe8845e74821ffbe8f564af8a37c286
SHA25629a43e853a0709927fb14bd7959b3fec405ab6faba55069bb02d23a3c73a94be
SHA51263e453f4237659c2619e9f6e158a8d858e592b2dd327d3c5c60a28dd97c602220e80a5bd8c41ddc84c10072c4fbe159af080ea8719190ed44e4599cfca0adc8a
-
Filesize
481KB
MD57154de41a1df4951ce4e278accb00d05
SHA18d22a9ffebe8845e74821ffbe8f564af8a37c286
SHA25629a43e853a0709927fb14bd7959b3fec405ab6faba55069bb02d23a3c73a94be
SHA51263e453f4237659c2619e9f6e158a8d858e592b2dd327d3c5c60a28dd97c602220e80a5bd8c41ddc84c10072c4fbe159af080ea8719190ed44e4599cfca0adc8a
-
Filesize
481KB
MD57154de41a1df4951ce4e278accb00d05
SHA18d22a9ffebe8845e74821ffbe8f564af8a37c286
SHA25629a43e853a0709927fb14bd7959b3fec405ab6faba55069bb02d23a3c73a94be
SHA51263e453f4237659c2619e9f6e158a8d858e592b2dd327d3c5c60a28dd97c602220e80a5bd8c41ddc84c10072c4fbe159af080ea8719190ed44e4599cfca0adc8a
-
Filesize
387KB
MD586df9d1999bd393c4cb9fe38c9da9199
SHA18dd98aef4783c769d01b7f02356176dfea3d4cf4
SHA256b5dd08fb772a8fc6c20adba82cc56134af9a1fbfb8cd35291db1490f19b99ecd
SHA512e0ee4ae8d7c44f2f1e8e65d6eda6bff6026c80bda972a1a1c367f67798c98dd67a0d7a3990c1e3e1b03425669e8aecb72cb8bf596e992e23763272de492948e1
-
Filesize
387KB
MD586df9d1999bd393c4cb9fe38c9da9199
SHA18dd98aef4783c769d01b7f02356176dfea3d4cf4
SHA256b5dd08fb772a8fc6c20adba82cc56134af9a1fbfb8cd35291db1490f19b99ecd
SHA512e0ee4ae8d7c44f2f1e8e65d6eda6bff6026c80bda972a1a1c367f67798c98dd67a0d7a3990c1e3e1b03425669e8aecb72cb8bf596e992e23763272de492948e1
-
Filesize
12KB
MD52bcc070dc52f97c3b135f57a44d67150
SHA16810763bb99c524659a2b65064b9ccc830d5b886
SHA256c22847a348d8baaadb479e0e89f50feda557526a5e07573aa8977a2b55e2fecc
SHA512b7f7d72b9600082f38c57e7b2c4298c8f7d03c9851e834fc73e29306d5ea6759efc419a204be434a5d4466d49a6c7aa1b8b8e1ae8ce112d57d438647d90d28f3
-
Filesize
399KB
MD54fa6594208f2d646f4982de0e07c81d7
SHA13c74b4532835329c4deec7e4c3ff5d944d084ce6
SHA2562a7d882309e7c3e541a047a2e6a0c31482cb8d97e42098025376ed82ec74ab2c
SHA51294ae789dc2519abdaadbc93af706bf5f41b7ac25e2c84870e5330bd50c90e31f38a8da1ba9ec391cb861bbb8451d8aca7c7ea74d5166491db71a12ee1f4d5d57
-
Filesize
399KB
MD54fa6594208f2d646f4982de0e07c81d7
SHA13c74b4532835329c4deec7e4c3ff5d944d084ce6
SHA2562a7d882309e7c3e541a047a2e6a0c31482cb8d97e42098025376ed82ec74ab2c
SHA51294ae789dc2519abdaadbc93af706bf5f41b7ac25e2c84870e5330bd50c90e31f38a8da1ba9ec391cb861bbb8451d8aca7c7ea74d5166491db71a12ee1f4d5d57
-
Filesize
399KB
MD54fa6594208f2d646f4982de0e07c81d7
SHA13c74b4532835329c4deec7e4c3ff5d944d084ce6
SHA2562a7d882309e7c3e541a047a2e6a0c31482cb8d97e42098025376ed82ec74ab2c
SHA51294ae789dc2519abdaadbc93af706bf5f41b7ac25e2c84870e5330bd50c90e31f38a8da1ba9ec391cb861bbb8451d8aca7c7ea74d5166491db71a12ee1f4d5d57
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f