Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15/09/2023, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe
-
Size
1.3MB
-
MD5
9cdddaae7fcc5308b9c486cd48c81c52
-
SHA1
c39b07c7ad7b062c463249235e0962388e0b83e8
-
SHA256
5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726
-
SHA512
45de1f64cc5bbbae89621b086e06b717a7d8eeaa01e8b5d284675d83d7f768581116726fe5b5aaacaf3ec6c1996683bcc32ac0c6725408768a6e3027562330dd
-
SSDEEP
24576:2iuBtZZ/pc64FIMpcnHACqA8O+owwgV23EsttB3osYDsCy87CXUsSbAA2l9OFHIO:luBfZBc6aIMpc38O+owwNhosYDjySIUf
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Extracted
redline
tako
77.91.124.82:19071
-
auth_value
16854b02cdb03e2ff7ae309c47b75f84
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.83
http://5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Extracted
redline
0305
185.215.113.25:10195
-
auth_value
c86205ff1cc37b2da12f0190adfda52c
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral1/memory/3032-446-0x0000000003640000-0x0000000003771000-memory.dmp family_fabookie behavioral1/memory/3032-452-0x0000000003640000-0x0000000003771000-memory.dmp family_fabookie -
Detect Poverty Stealer Payload 3 IoCs
resource yara_rule behavioral1/memory/3048-189-0x0000000000960000-0x0000000000A97000-memory.dmp family_povertystealer behavioral1/memory/1916-191-0x0000000000400000-0x000000000040F000-memory.dmp family_povertystealer behavioral1/memory/3048-199-0x0000000000960000-0x0000000000A97000-memory.dmp family_povertystealer -
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/2476-71-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2476-70-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2476-73-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2476-75-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2476-77-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1676-131-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/1676-132-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/1676-134-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/1676-136-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/1676-142-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 26 IoCs
pid Process 2664 z3669037.exe 2584 z9631560.exe 2628 z2023363.exe 2772 z5494167.exe 2940 q9112251.exe 2132 r0360247.exe 2928 s7047945.exe 2816 t5249095.exe 2864 explonde.exe 2876 u0093234.exe 620 w9532627.exe 3016 legota.exe 1956 build.exe 3048 dv4o7f8.exe 2484 Rocks.exe 2644 oneetx.exe 3032 ss41.exe 1632 deluxe_crypted.exe 800 legota.exe 668 explonde.exe 2036 oneetx.exe 1048 6BFC.exe 296 6F38.exe 2540 oneetx.exe 2660 legota.exe 2980 explonde.exe -
Loads dropped DLL 38 IoCs
pid Process 1792 AppLaunch.exe 2664 z3669037.exe 2664 z3669037.exe 2584 z9631560.exe 2584 z9631560.exe 2628 z2023363.exe 2628 z2023363.exe 2772 z5494167.exe 2772 z5494167.exe 2940 q9112251.exe 2772 z5494167.exe 2132 r0360247.exe 2628 z2023363.exe 2928 s7047945.exe 2584 z9631560.exe 2816 t5249095.exe 2816 t5249095.exe 2864 explonde.exe 2664 z3669037.exe 2876 u0093234.exe 1792 AppLaunch.exe 620 w9532627.exe 3016 legota.exe 3016 legota.exe 3016 legota.exe 3016 legota.exe 2484 Rocks.exe 2644 oneetx.exe 2644 oneetx.exe 3016 legota.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 2008 rundll32.exe 2008 rundll32.exe 2008 rundll32.exe 2008 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9631560.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z2023363.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z5494167.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3669037.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2116 set thread context of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 2940 set thread context of 2476 2940 q9112251.exe 37 PID 2132 set thread context of 1620 2132 r0360247.exe 40 PID 2928 set thread context of 2692 2928 s7047945.exe 44 PID 2876 set thread context of 1676 2876 u0093234.exe 60 PID 3048 set thread context of 1916 3048 dv4o7f8.exe 76 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1836 1620 WerFault.exe 40 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1604 schtasks.exe 2380 schtasks.exe 2520 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 legota.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 legota.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 ss41.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 ss41.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 6BFC.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 legota.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 legota.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 legota.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ss41.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 ss41.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 6BFC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 legota.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2692 AppLaunch.exe 2692 AppLaunch.exe 2476 AppLaunch.exe 2476 AppLaunch.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1956 build.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1956 build.exe 1232 Process not Found 1956 build.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1232 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2692 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2476 AppLaunch.exe Token: SeDebugPrivilege 1956 build.exe Token: SeDebugPrivilege 1632 deluxe_crypted.exe Token: SeShutdownPrivilege 1232 Process not Found Token: SeShutdownPrivilege 1232 Process not Found Token: SeShutdownPrivilege 1232 Process not Found Token: SeDebugPrivilege 1048 6BFC.exe Token: SeDebugPrivilege 296 6F38.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 Rocks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 2116 wrote to memory of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 2116 wrote to memory of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 2116 wrote to memory of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 2116 wrote to memory of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 2116 wrote to memory of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 2116 wrote to memory of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 2116 wrote to memory of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 2116 wrote to memory of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 2116 wrote to memory of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 2116 wrote to memory of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 2116 wrote to memory of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 2116 wrote to memory of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 2116 wrote to memory of 1792 2116 5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe 29 PID 1792 wrote to memory of 2664 1792 AppLaunch.exe 30 PID 1792 wrote to memory of 2664 1792 AppLaunch.exe 30 PID 1792 wrote to memory of 2664 1792 AppLaunch.exe 30 PID 1792 wrote to memory of 2664 1792 AppLaunch.exe 30 PID 1792 wrote to memory of 2664 1792 AppLaunch.exe 30 PID 1792 wrote to memory of 2664 1792 AppLaunch.exe 30 PID 1792 wrote to memory of 2664 1792 AppLaunch.exe 30 PID 2664 wrote to memory of 2584 2664 z3669037.exe 31 PID 2664 wrote to memory of 2584 2664 z3669037.exe 31 PID 2664 wrote to memory of 2584 2664 z3669037.exe 31 PID 2664 wrote to memory of 2584 2664 z3669037.exe 31 PID 2664 wrote to memory of 2584 2664 z3669037.exe 31 PID 2664 wrote to memory of 2584 2664 z3669037.exe 31 PID 2664 wrote to memory of 2584 2664 z3669037.exe 31 PID 2584 wrote to memory of 2628 2584 z9631560.exe 32 PID 2584 wrote to memory of 2628 2584 z9631560.exe 32 PID 2584 wrote to memory of 2628 2584 z9631560.exe 32 PID 2584 wrote to memory of 2628 2584 z9631560.exe 32 PID 2584 wrote to memory of 2628 2584 z9631560.exe 32 PID 2584 wrote to memory of 2628 2584 z9631560.exe 32 PID 2584 wrote to memory of 2628 2584 z9631560.exe 32 PID 2628 wrote to memory of 2772 2628 z2023363.exe 33 PID 2628 wrote to memory of 2772 2628 z2023363.exe 33 PID 2628 wrote to memory of 2772 2628 z2023363.exe 33 PID 2628 wrote to memory of 2772 2628 z2023363.exe 33 PID 2628 wrote to memory of 2772 2628 z2023363.exe 33 PID 2628 wrote to memory of 2772 2628 z2023363.exe 33 PID 2628 wrote to memory of 2772 2628 z2023363.exe 33 PID 2772 wrote to memory of 2940 2772 z5494167.exe 34 PID 2772 wrote to memory of 2940 2772 z5494167.exe 34 PID 2772 wrote to memory of 2940 2772 z5494167.exe 34 PID 2772 wrote to memory of 2940 2772 z5494167.exe 34 PID 2772 wrote to memory of 2940 2772 z5494167.exe 34 PID 2772 wrote to memory of 2940 2772 z5494167.exe 34 PID 2772 wrote to memory of 2940 2772 z5494167.exe 34 PID 2940 wrote to memory of 2588 2940 q9112251.exe 36 PID 2940 wrote to memory of 2588 2940 q9112251.exe 36 PID 2940 wrote to memory of 2588 2940 q9112251.exe 36 PID 2940 wrote to memory of 2588 2940 q9112251.exe 36 PID 2940 wrote to memory of 2588 2940 q9112251.exe 36 PID 2940 wrote to memory of 2588 2940 q9112251.exe 36 PID 2940 wrote to memory of 2588 2940 q9112251.exe 36 PID 2940 wrote to memory of 2476 2940 q9112251.exe 37 PID 2940 wrote to memory of 2476 2940 q9112251.exe 37 PID 2940 wrote to memory of 2476 2940 q9112251.exe 37 PID 2940 wrote to memory of 2476 2940 q9112251.exe 37 PID 2940 wrote to memory of 2476 2940 q9112251.exe 37 PID 2940 wrote to memory of 2476 2940 q9112251.exe 37 PID 2940 wrote to memory of 2476 2940 q9112251.exe 37 PID 2940 wrote to memory of 2476 2940 q9112251.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe"C:\Users\Admin\AppData\Local\Temp\5b51fa7f29828fac3d89b78a1978c0734acec5ea232f84e761f02fa0afca2726_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3669037.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3669037.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9631560.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9631560.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2023363.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2023363.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5494167.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5494167.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9112251.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9112251.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:2588
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0360247.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0360247.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2132 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:1620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 2689⤵
- Program crash
PID:1836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7047945.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7047945.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5249095.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5249095.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2864 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F7⤵
- Creates scheduled task(s)
PID:1604
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit7⤵PID:368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1724
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"8⤵PID:1736
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E8⤵PID:2104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2968
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"8⤵PID:1608
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E8⤵PID:2908
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1892
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0093234.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0093234.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2876 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w9532627.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w9532627.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:620 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:3016 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:2380
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:1512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2964
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:1500
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:1788
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:1984
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000024001\build.exe"C:\Users\Admin\AppData\Local\Temp\1000024001\build.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\1000027001\dv4o7f8.exe"C:\Users\Admin\AppData\Local\Temp\1000027001\dv4o7f8.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"6⤵PID:1916
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000034001\Rocks.exe"C:\Users\Admin\AppData\Local\Temp\1000034001\Rocks.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2644 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:2520
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit7⤵PID:2528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2916
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:1772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:2684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1172
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"8⤵PID:1748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E8⤵PID:1040
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000468001\ss41.exe"C:\Users\Admin\AppData\Local\Temp\1000468001\ss41.exe"7⤵
- Executes dropped EXE
- Modifies system certificate store
PID:3032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000042001\deluxe_crypted.exe"C:\Users\Admin\AppData\Local\Temp\1000042001\deluxe_crypted.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2008
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {6EB8A3AD-0748-4D7C-A5B4-421E634AC1F4} S-1-5-21-2180306848-1874213455-4093218721-1000:XEBBURHY\Admin:Interactive:[1]1⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe2⤵
- Executes dropped EXE
PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe2⤵
- Executes dropped EXE
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe2⤵
- Executes dropped EXE
PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe2⤵
- Executes dropped EXE
PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe2⤵
- Executes dropped EXE
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe2⤵
- Executes dropped EXE
PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\6BFC.exeC:\Users\Admin\AppData\Local\Temp\6BFC.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
C:\Users\Admin\AppData\Local\Temp\6F38.exeC:\Users\Admin\AppData\Local\Temp\6F38.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:296
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Scripting
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ca952645203b48c657db7c09aa9101d
SHA14d0de5e67554d4c57103bda54af409c15fb19735
SHA25651c5fe83ba8a1e06dee4341710a444116c9db64b735d0991cad06e39731b3c5d
SHA51251c321e5a3855700c4cf7753ca3c47d0e812286d8f6ac8f9ecc413473906a0a1d3d45f4fd29992d145a9ec48e8cdb9f4e109d0b9aa6767f742425b3053b1f595
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
910KB
MD586aec1d77c3b004c38d5ee246499728c
SHA10b6c07ea05e33ea59e906f4a07eeb3d6416dd655
SHA256eaa4f4d4e90b308f6cda183dcaef8be9b8fa85404aa2635e8457d0a36bf7e46d
SHA51225cb83f28ecdbc6e4638ca40d6989ea3b0697cfc37c9d5ff11a729fe2aab2511205674379d075170b3981e914575577b0dd450562dc28aeb951b45464ba67a1f
-
Filesize
910KB
MD586aec1d77c3b004c38d5ee246499728c
SHA10b6c07ea05e33ea59e906f4a07eeb3d6416dd655
SHA256eaa4f4d4e90b308f6cda183dcaef8be9b8fa85404aa2635e8457d0a36bf7e46d
SHA51225cb83f28ecdbc6e4638ca40d6989ea3b0697cfc37c9d5ff11a729fe2aab2511205674379d075170b3981e914575577b0dd450562dc28aeb951b45464ba67a1f
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
412KB
MD55200fbe07521eb001f145afb95d40283
SHA1df6cfdf15b58a0bb24255b3902886dc375f3346f
SHA25600c3f29f9a8aec0774256501c562275e2d866f0130a2b8a58d74003c6c77e812
SHA512c38359959ce1083f94d2206d1b4b317e8c5d493168013b4e8c406acb5a55fd4f85ec7ce4d5e400b9105fd82eae3d6301d52346f040a64c09981185c66f2cbf75
-
Filesize
412KB
MD55200fbe07521eb001f145afb95d40283
SHA1df6cfdf15b58a0bb24255b3902886dc375f3346f
SHA25600c3f29f9a8aec0774256501c562275e2d866f0130a2b8a58d74003c6c77e812
SHA512c38359959ce1083f94d2206d1b4b317e8c5d493168013b4e8c406acb5a55fd4f85ec7ce4d5e400b9105fd82eae3d6301d52346f040a64c09981185c66f2cbf75
-
Filesize
503KB
MD51288bfdc55e3095fc002791bf886ee53
SHA146330d4e4feeaf4312b6763fe7269441677b535a
SHA2568d8e4e8aec582156611d8b55e54ed90429da131193db9616a1e75f1a7a6bb1a4
SHA5121000a8953d7884167813a47933af8dcc8d43d85b0bdb2a51fded9c4d5313b47f838d97543aaa8621b0f8af858302e981582b1be8401009ee257ad4de5ecd9ae1
-
Filesize
503KB
MD51288bfdc55e3095fc002791bf886ee53
SHA146330d4e4feeaf4312b6763fe7269441677b535a
SHA2568d8e4e8aec582156611d8b55e54ed90429da131193db9616a1e75f1a7a6bb1a4
SHA5121000a8953d7884167813a47933af8dcc8d43d85b0bdb2a51fded9c4d5313b47f838d97543aaa8621b0f8af858302e981582b1be8401009ee257ad4de5ecd9ae1
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
990KB
MD5b5c38f61362777e3f0b11725df4fcec9
SHA10e451345eff92c47e5214edf9f47c86de09b7177
SHA25660bcc66b98bba4b24d4bd28ebd92ab0df738679494efeecd3f44cfda3b13789a
SHA512127209bd55ca801b6b6dc8aa66377aeee5f7b45e748f123a57bdf837f036361de17b2c3c7947e5d851716563ff66782d32ea53cb9ed685066ef5409697047497
-
Filesize
990KB
MD5b5c38f61362777e3f0b11725df4fcec9
SHA10e451345eff92c47e5214edf9f47c86de09b7177
SHA25660bcc66b98bba4b24d4bd28ebd92ab0df738679494efeecd3f44cfda3b13789a
SHA512127209bd55ca801b6b6dc8aa66377aeee5f7b45e748f123a57bdf837f036361de17b2c3c7947e5d851716563ff66782d32ea53cb9ed685066ef5409697047497
-
Filesize
376KB
MD581b0fe2c92ffc7677d0ee644b1dec99d
SHA10ca95b7885dd2a5e8622986d78d18e72c2830e1f
SHA2562fecfeb836528b8de64d8d790b5fadfe3343c30b85ffe52739bf8dbc0a0df7f6
SHA512ea91ebbc49e555e9b564b325e206570e002ee52ea18523d6c0a94b513b6b5097b1ca2370e0de954f602eac6a86033fde9d7665d0a3c6539e94d84931a1c9a4b2
-
Filesize
376KB
MD581b0fe2c92ffc7677d0ee644b1dec99d
SHA10ca95b7885dd2a5e8622986d78d18e72c2830e1f
SHA2562fecfeb836528b8de64d8d790b5fadfe3343c30b85ffe52739bf8dbc0a0df7f6
SHA512ea91ebbc49e555e9b564b325e206570e002ee52ea18523d6c0a94b513b6b5097b1ca2370e0de954f602eac6a86033fde9d7665d0a3c6539e94d84931a1c9a4b2
-
Filesize
735KB
MD549dc8f15a416aa20c55bc13ad04d4cd2
SHA11a6a5fe99039be0fa1997c7804f4e2f1a8741842
SHA256c430e0fbdef7c5da57a66e467b195e6a26246334b92fe9cd19b5721a9e52552d
SHA512d16d54100d9efc5c2e0b264c55adb33ac96b3a41370779c69ab33c24606605eb0db74967bc777b4671250924d62af0847f0f094b121796c3741ab6556d1ed97a
-
Filesize
735KB
MD549dc8f15a416aa20c55bc13ad04d4cd2
SHA11a6a5fe99039be0fa1997c7804f4e2f1a8741842
SHA256c430e0fbdef7c5da57a66e467b195e6a26246334b92fe9cd19b5721a9e52552d
SHA512d16d54100d9efc5c2e0b264c55adb33ac96b3a41370779c69ab33c24606605eb0db74967bc777b4671250924d62af0847f0f094b121796c3741ab6556d1ed97a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
552KB
MD5ba0d25c78b54efc4ae54faa6f19c6869
SHA17b87bb559d283f0063fb54d1a34a3349e670cd92
SHA2566c319ee3df44e10f9be617704842681518790dc057aca0d8eeaf09c46dc65067
SHA512b5de48bad3c47f8560dce796da1454d9a6dadda15072cbc4f923114a062a2aa652396f5cba2e309d2e1590e5ad1319d60b3c2e4495bb197b4b1d3c7c2bb96b50
-
Filesize
552KB
MD5ba0d25c78b54efc4ae54faa6f19c6869
SHA17b87bb559d283f0063fb54d1a34a3349e670cd92
SHA2566c319ee3df44e10f9be617704842681518790dc057aca0d8eeaf09c46dc65067
SHA512b5de48bad3c47f8560dce796da1454d9a6dadda15072cbc4f923114a062a2aa652396f5cba2e309d2e1590e5ad1319d60b3c2e4495bb197b4b1d3c7c2bb96b50
-
Filesize
232KB
MD5c6417fb6ad74d2545a4642757705bc0c
SHA1b6e884c347791b7c316eb7552a400b6a7514a44c
SHA256c0a85e4b924fa520b1b00982ff154254526908dc0f1a29bba392bcec633f47e1
SHA512e379f09fa38ae9cd4d375fc649bee966dc9ff45d9f0e6e638d41f1d4c580bf44d4493bd2995e7ba4235c13e3d8b8ba18472131606267a3132dfa5579b0872fd0
-
Filesize
232KB
MD5c6417fb6ad74d2545a4642757705bc0c
SHA1b6e884c347791b7c316eb7552a400b6a7514a44c
SHA256c0a85e4b924fa520b1b00982ff154254526908dc0f1a29bba392bcec633f47e1
SHA512e379f09fa38ae9cd4d375fc649bee966dc9ff45d9f0e6e638d41f1d4c580bf44d4493bd2995e7ba4235c13e3d8b8ba18472131606267a3132dfa5579b0872fd0
-
Filesize
328KB
MD52ce2b22c19530551c888b9e300ec7f18
SHA1fe0cbb415ce1c51b2219b910f8c96566bfcbfab2
SHA256ccb9086fc1709485302ec90d7f960e13db4844caef664fe940d4d6def976d1f3
SHA512be5a16f1f066a6590f711940e5758afc0f2354ba195adcefdf6e3dd07ea681a777146b5a9b3d59fdac651716c78754edd9cdf9fbb1974310b90b21d90408b2e1
-
Filesize
328KB
MD52ce2b22c19530551c888b9e300ec7f18
SHA1fe0cbb415ce1c51b2219b910f8c96566bfcbfab2
SHA256ccb9086fc1709485302ec90d7f960e13db4844caef664fe940d4d6def976d1f3
SHA512be5a16f1f066a6590f711940e5758afc0f2354ba195adcefdf6e3dd07ea681a777146b5a9b3d59fdac651716c78754edd9cdf9fbb1974310b90b21d90408b2e1
-
Filesize
213KB
MD5bce3c2ce66d4445f778c762bdd2daf05
SHA1a75f1d0ce58dffc1fb514e803af06b824e08726e
SHA2567da1c38aa827449ae85d420faac841f04c4fe9924f8ec22d1b6e825e5c1f08bb
SHA5124363d0c898af0961c3a81a8168b17f302b359f06a9946911b2f2b262d80aba226cdc264e2edda8809bdaebb44e55c3d3d89058f58c617f13a61fb816f2432fa9
-
Filesize
213KB
MD5bce3c2ce66d4445f778c762bdd2daf05
SHA1a75f1d0ce58dffc1fb514e803af06b824e08726e
SHA2567da1c38aa827449ae85d420faac841f04c4fe9924f8ec22d1b6e825e5c1f08bb
SHA5124363d0c898af0961c3a81a8168b17f302b359f06a9946911b2f2b262d80aba226cdc264e2edda8809bdaebb44e55c3d3d89058f58c617f13a61fb816f2432fa9
-
Filesize
342KB
MD5149a994fbf5e6e414ac9da01dc27e8a2
SHA13a3ac1218ba92ba9488d2489ee3c14f115045a4b
SHA256022e8939826faae426c61668fa793c72712226cc194f693241821f14e703b3f6
SHA512a804d9b727f560596533b6d680b17d4941247be7698b0a4b01a7b844b5bf30980c7810e891d4802b38474c5c619c023d1587701f8541ddd9af9372fd0b148d23
-
Filesize
342KB
MD5149a994fbf5e6e414ac9da01dc27e8a2
SHA13a3ac1218ba92ba9488d2489ee3c14f115045a4b
SHA256022e8939826faae426c61668fa793c72712226cc194f693241821f14e703b3f6
SHA512a804d9b727f560596533b6d680b17d4941247be7698b0a4b01a7b844b5bf30980c7810e891d4802b38474c5c619c023d1587701f8541ddd9af9372fd0b148d23
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
910KB
MD586aec1d77c3b004c38d5ee246499728c
SHA10b6c07ea05e33ea59e906f4a07eeb3d6416dd655
SHA256eaa4f4d4e90b308f6cda183dcaef8be9b8fa85404aa2635e8457d0a36bf7e46d
SHA51225cb83f28ecdbc6e4638ca40d6989ea3b0697cfc37c9d5ff11a729fe2aab2511205674379d075170b3981e914575577b0dd450562dc28aeb951b45464ba67a1f
-
Filesize
910KB
MD586aec1d77c3b004c38d5ee246499728c
SHA10b6c07ea05e33ea59e906f4a07eeb3d6416dd655
SHA256eaa4f4d4e90b308f6cda183dcaef8be9b8fa85404aa2635e8457d0a36bf7e46d
SHA51225cb83f28ecdbc6e4638ca40d6989ea3b0697cfc37c9d5ff11a729fe2aab2511205674379d075170b3981e914575577b0dd450562dc28aeb951b45464ba67a1f
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
412KB
MD55200fbe07521eb001f145afb95d40283
SHA1df6cfdf15b58a0bb24255b3902886dc375f3346f
SHA25600c3f29f9a8aec0774256501c562275e2d866f0130a2b8a58d74003c6c77e812
SHA512c38359959ce1083f94d2206d1b4b317e8c5d493168013b4e8c406acb5a55fd4f85ec7ce4d5e400b9105fd82eae3d6301d52346f040a64c09981185c66f2cbf75
-
Filesize
503KB
MD51288bfdc55e3095fc002791bf886ee53
SHA146330d4e4feeaf4312b6763fe7269441677b535a
SHA2568d8e4e8aec582156611d8b55e54ed90429da131193db9616a1e75f1a7a6bb1a4
SHA5121000a8953d7884167813a47933af8dcc8d43d85b0bdb2a51fded9c4d5313b47f838d97543aaa8621b0f8af858302e981582b1be8401009ee257ad4de5ecd9ae1
-
Filesize
503KB
MD51288bfdc55e3095fc002791bf886ee53
SHA146330d4e4feeaf4312b6763fe7269441677b535a
SHA2568d8e4e8aec582156611d8b55e54ed90429da131193db9616a1e75f1a7a6bb1a4
SHA5121000a8953d7884167813a47933af8dcc8d43d85b0bdb2a51fded9c4d5313b47f838d97543aaa8621b0f8af858302e981582b1be8401009ee257ad4de5ecd9ae1
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
990KB
MD5b5c38f61362777e3f0b11725df4fcec9
SHA10e451345eff92c47e5214edf9f47c86de09b7177
SHA25660bcc66b98bba4b24d4bd28ebd92ab0df738679494efeecd3f44cfda3b13789a
SHA512127209bd55ca801b6b6dc8aa66377aeee5f7b45e748f123a57bdf837f036361de17b2c3c7947e5d851716563ff66782d32ea53cb9ed685066ef5409697047497
-
Filesize
990KB
MD5b5c38f61362777e3f0b11725df4fcec9
SHA10e451345eff92c47e5214edf9f47c86de09b7177
SHA25660bcc66b98bba4b24d4bd28ebd92ab0df738679494efeecd3f44cfda3b13789a
SHA512127209bd55ca801b6b6dc8aa66377aeee5f7b45e748f123a57bdf837f036361de17b2c3c7947e5d851716563ff66782d32ea53cb9ed685066ef5409697047497
-
Filesize
376KB
MD581b0fe2c92ffc7677d0ee644b1dec99d
SHA10ca95b7885dd2a5e8622986d78d18e72c2830e1f
SHA2562fecfeb836528b8de64d8d790b5fadfe3343c30b85ffe52739bf8dbc0a0df7f6
SHA512ea91ebbc49e555e9b564b325e206570e002ee52ea18523d6c0a94b513b6b5097b1ca2370e0de954f602eac6a86033fde9d7665d0a3c6539e94d84931a1c9a4b2
-
Filesize
376KB
MD581b0fe2c92ffc7677d0ee644b1dec99d
SHA10ca95b7885dd2a5e8622986d78d18e72c2830e1f
SHA2562fecfeb836528b8de64d8d790b5fadfe3343c30b85ffe52739bf8dbc0a0df7f6
SHA512ea91ebbc49e555e9b564b325e206570e002ee52ea18523d6c0a94b513b6b5097b1ca2370e0de954f602eac6a86033fde9d7665d0a3c6539e94d84931a1c9a4b2
-
Filesize
735KB
MD549dc8f15a416aa20c55bc13ad04d4cd2
SHA11a6a5fe99039be0fa1997c7804f4e2f1a8741842
SHA256c430e0fbdef7c5da57a66e467b195e6a26246334b92fe9cd19b5721a9e52552d
SHA512d16d54100d9efc5c2e0b264c55adb33ac96b3a41370779c69ab33c24606605eb0db74967bc777b4671250924d62af0847f0f094b121796c3741ab6556d1ed97a
-
Filesize
735KB
MD549dc8f15a416aa20c55bc13ad04d4cd2
SHA11a6a5fe99039be0fa1997c7804f4e2f1a8741842
SHA256c430e0fbdef7c5da57a66e467b195e6a26246334b92fe9cd19b5721a9e52552d
SHA512d16d54100d9efc5c2e0b264c55adb33ac96b3a41370779c69ab33c24606605eb0db74967bc777b4671250924d62af0847f0f094b121796c3741ab6556d1ed97a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
552KB
MD5ba0d25c78b54efc4ae54faa6f19c6869
SHA17b87bb559d283f0063fb54d1a34a3349e670cd92
SHA2566c319ee3df44e10f9be617704842681518790dc057aca0d8eeaf09c46dc65067
SHA512b5de48bad3c47f8560dce796da1454d9a6dadda15072cbc4f923114a062a2aa652396f5cba2e309d2e1590e5ad1319d60b3c2e4495bb197b4b1d3c7c2bb96b50
-
Filesize
552KB
MD5ba0d25c78b54efc4ae54faa6f19c6869
SHA17b87bb559d283f0063fb54d1a34a3349e670cd92
SHA2566c319ee3df44e10f9be617704842681518790dc057aca0d8eeaf09c46dc65067
SHA512b5de48bad3c47f8560dce796da1454d9a6dadda15072cbc4f923114a062a2aa652396f5cba2e309d2e1590e5ad1319d60b3c2e4495bb197b4b1d3c7c2bb96b50
-
Filesize
232KB
MD5c6417fb6ad74d2545a4642757705bc0c
SHA1b6e884c347791b7c316eb7552a400b6a7514a44c
SHA256c0a85e4b924fa520b1b00982ff154254526908dc0f1a29bba392bcec633f47e1
SHA512e379f09fa38ae9cd4d375fc649bee966dc9ff45d9f0e6e638d41f1d4c580bf44d4493bd2995e7ba4235c13e3d8b8ba18472131606267a3132dfa5579b0872fd0
-
Filesize
232KB
MD5c6417fb6ad74d2545a4642757705bc0c
SHA1b6e884c347791b7c316eb7552a400b6a7514a44c
SHA256c0a85e4b924fa520b1b00982ff154254526908dc0f1a29bba392bcec633f47e1
SHA512e379f09fa38ae9cd4d375fc649bee966dc9ff45d9f0e6e638d41f1d4c580bf44d4493bd2995e7ba4235c13e3d8b8ba18472131606267a3132dfa5579b0872fd0
-
Filesize
328KB
MD52ce2b22c19530551c888b9e300ec7f18
SHA1fe0cbb415ce1c51b2219b910f8c96566bfcbfab2
SHA256ccb9086fc1709485302ec90d7f960e13db4844caef664fe940d4d6def976d1f3
SHA512be5a16f1f066a6590f711940e5758afc0f2354ba195adcefdf6e3dd07ea681a777146b5a9b3d59fdac651716c78754edd9cdf9fbb1974310b90b21d90408b2e1
-
Filesize
328KB
MD52ce2b22c19530551c888b9e300ec7f18
SHA1fe0cbb415ce1c51b2219b910f8c96566bfcbfab2
SHA256ccb9086fc1709485302ec90d7f960e13db4844caef664fe940d4d6def976d1f3
SHA512be5a16f1f066a6590f711940e5758afc0f2354ba195adcefdf6e3dd07ea681a777146b5a9b3d59fdac651716c78754edd9cdf9fbb1974310b90b21d90408b2e1
-
Filesize
213KB
MD5bce3c2ce66d4445f778c762bdd2daf05
SHA1a75f1d0ce58dffc1fb514e803af06b824e08726e
SHA2567da1c38aa827449ae85d420faac841f04c4fe9924f8ec22d1b6e825e5c1f08bb
SHA5124363d0c898af0961c3a81a8168b17f302b359f06a9946911b2f2b262d80aba226cdc264e2edda8809bdaebb44e55c3d3d89058f58c617f13a61fb816f2432fa9
-
Filesize
213KB
MD5bce3c2ce66d4445f778c762bdd2daf05
SHA1a75f1d0ce58dffc1fb514e803af06b824e08726e
SHA2567da1c38aa827449ae85d420faac841f04c4fe9924f8ec22d1b6e825e5c1f08bb
SHA5124363d0c898af0961c3a81a8168b17f302b359f06a9946911b2f2b262d80aba226cdc264e2edda8809bdaebb44e55c3d3d89058f58c617f13a61fb816f2432fa9
-
Filesize
342KB
MD5149a994fbf5e6e414ac9da01dc27e8a2
SHA13a3ac1218ba92ba9488d2489ee3c14f115045a4b
SHA256022e8939826faae426c61668fa793c72712226cc194f693241821f14e703b3f6
SHA512a804d9b727f560596533b6d680b17d4941247be7698b0a4b01a7b844b5bf30980c7810e891d4802b38474c5c619c023d1587701f8541ddd9af9372fd0b148d23
-
Filesize
342KB
MD5149a994fbf5e6e414ac9da01dc27e8a2
SHA13a3ac1218ba92ba9488d2489ee3c14f115045a4b
SHA256022e8939826faae426c61668fa793c72712226cc194f693241821f14e703b3f6
SHA512a804d9b727f560596533b6d680b17d4941247be7698b0a4b01a7b844b5bf30980c7810e891d4802b38474c5c619c023d1587701f8541ddd9af9372fd0b148d23
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a