Analysis
-
max time kernel
158s -
max time network
161s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
01-11-2023 03:59
Static task
static1
Behavioral task
behavioral1
Sample
y.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
y.exe
Resource
win10-20231023-en
General
-
Target
y.exe
-
Size
516KB
-
MD5
672c56bcaeedb4f630cda204ed5ef32d
-
SHA1
df8868926293efb2e13339a020a0eefee128d9d7
-
SHA256
448a9d8451178d090723b249ba1b3514539b14bfb14a7b2141dd492f296d1f53
-
SHA512
38f69f8199a664edb278aeb63d33a50d19fa843e1331ba3870f3038cd2620cd41979c02287dfe154031c1d5ea32be70d9f775ae2e2f8c4f8e7fbef36154b21a4
-
SSDEEP
6144:J0aJ41z7pmJyseEgKgPObyIozhRjcerTn:J0aqz79QmI4T
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3004-110-0x00000000034D0000-0x000000000360B000-memory.dmp purplefox_rootkit behavioral2/memory/3004-113-0x0000000003610000-0x00000000037B8000-memory.dmp purplefox_rootkit behavioral2/memory/3004-115-0x0000000003610000-0x00000000037B8000-memory.dmp purplefox_rootkit behavioral2/memory/3004-123-0x0000000003610000-0x00000000037B8000-memory.dmp purplefox_rootkit behavioral2/memory/3004-134-0x0000000003610000-0x00000000037B8000-memory.dmp purplefox_rootkit behavioral2/memory/3004-137-0x0000000003610000-0x00000000037B8000-memory.dmp purplefox_rootkit behavioral2/memory/3004-139-0x0000000003610000-0x00000000037B8000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/3004-110-0x00000000034D0000-0x000000000360B000-memory.dmp family_gh0strat behavioral2/memory/3004-113-0x0000000003610000-0x00000000037B8000-memory.dmp family_gh0strat behavioral2/memory/3004-115-0x0000000003610000-0x00000000037B8000-memory.dmp family_gh0strat behavioral2/memory/3004-123-0x0000000003610000-0x00000000037B8000-memory.dmp family_gh0strat behavioral2/memory/3004-134-0x0000000003610000-0x00000000037B8000-memory.dmp family_gh0strat behavioral2/memory/3004-137-0x0000000003610000-0x00000000037B8000-memory.dmp family_gh0strat behavioral2/memory/3004-139-0x0000000003610000-0x00000000037B8000-memory.dmp family_gh0strat -
Drops startup file 2 IoCs
Processes:
QGqg.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\Embarcaderophi.lnk QGqg.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\Embarcaderophi.lnk QGqg.exe -
Executes dropped EXE 2 IoCs
Processes:
QGqg.exeD9T9T9y.exepid process 4532 QGqg.exe 3004 D9T9T9y.exe -
Loads dropped DLL 1 IoCs
Processes:
D9T9T9y.exepid process 3004 D9T9T9y.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
D9T9T9y.exedescription ioc process File opened (read-only) \??\B: D9T9T9y.exe File opened (read-only) \??\M: D9T9T9y.exe File opened (read-only) \??\Q: D9T9T9y.exe File opened (read-only) \??\W: D9T9T9y.exe File opened (read-only) \??\Z: D9T9T9y.exe File opened (read-only) \??\Y: D9T9T9y.exe File opened (read-only) \??\E: D9T9T9y.exe File opened (read-only) \??\H: D9T9T9y.exe File opened (read-only) \??\J: D9T9T9y.exe File opened (read-only) \??\L: D9T9T9y.exe File opened (read-only) \??\O: D9T9T9y.exe File opened (read-only) \??\U: D9T9T9y.exe File opened (read-only) \??\X: D9T9T9y.exe File opened (read-only) \??\G: D9T9T9y.exe File opened (read-only) \??\I: D9T9T9y.exe File opened (read-only) \??\N: D9T9T9y.exe File opened (read-only) \??\R: D9T9T9y.exe File opened (read-only) \??\T: D9T9T9y.exe File opened (read-only) \??\K: D9T9T9y.exe File opened (read-only) \??\P: D9T9T9y.exe File opened (read-only) \??\S: D9T9T9y.exe File opened (read-only) \??\V: D9T9T9y.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
D9T9T9y.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz D9T9T9y.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 D9T9T9y.exe -
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 32 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 540031000000000061571b201000673730554b4400003e0009000400efbe61571b2061571b202e000000f2ab01000000080000000000000000000000000000002ca1eb0067003700300055004b004400000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 78003100000000005757a8631100557365727300640009000400efbe724a0b5d5757a8632e000000320500000000010000000000000000003a00000000000710ac0055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 780031000000000061571b2011004d7573696300640009000400efbe724a6fa861571b202e000000680500000000010000000000000000003a00000000002ca1eb004d007500730069006300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380030003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Music" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 7c003100000000006157192011005075626c69630000660009000400efbe724a6fa8615719202e000000630500000000010000000000000000003c0000000000302547005000750062006c0069006300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003600000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 3492 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
y.exeD9T9T9y.exepid process 4972 y.exe 4972 y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe 3004 D9T9T9y.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
D9T9T9y.exedescription pid process Token: 33 3004 D9T9T9y.exe Token: SeIncBasePriorityPrivilege 3004 D9T9T9y.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
explorer.exeD9T9T9y.exepid process 3492 explorer.exe 3492 explorer.exe 3004 D9T9T9y.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
y.exeexplorer.exedescription pid process target process PID 4972 wrote to memory of 4104 4972 y.exe explorer.exe PID 4972 wrote to memory of 4104 4972 y.exe explorer.exe PID 3492 wrote to memory of 4532 3492 explorer.exe QGqg.exe PID 3492 wrote to memory of 4532 3492 explorer.exe QGqg.exe PID 3492 wrote to memory of 4532 3492 explorer.exe QGqg.exe PID 3492 wrote to memory of 3004 3492 explorer.exe D9T9T9y.exe PID 3492 wrote to memory of 3004 3492 explorer.exe D9T9T9y.exe PID 3492 wrote to memory of 3004 3492 explorer.exe D9T9T9y.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\y.exe"C:\Users\Admin\AppData\Local\Temp\y.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\explorer.exeC:\Windows\explorer.exe C:\Users\Public\Music\g70UKD2⤵PID:4104
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Roaming\EDUDT\QGqg.exe"C:\Users\Admin\AppData\Roaming\EDUDT\QGqg.exe" -n C:\Users\Admin\AppData\Roaming\EDUDT\NJ0.zip -d C:\Users\Admin\AppData\Roaming2⤵
- Drops startup file
- Executes dropped EXE
PID:4532 -
C:\ProgramData\J2J2M2\D9T9T9y.exe"C:\ProgramData\J2J2M2\D9T9T9y.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3004
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5afd1c09b13ac9d85781c6e4fe07457c7
SHA1bb559602478c9b2e96da8eaa77f0536577aca1df
SHA2569a50ab40120b76695c78d45c64a97f7179033a2a05f5a2e97db36c2a81021806
SHA5121f48829faef6f22836e8946fb610c73b4134f0efa6c5ce0ece6c19606506c6d7fc4db4852b06b38183b1ad58c7775ffba5f0c69f93ce57532d29bff1d88226c4
-
Filesize
2.2MB
MD5afd1c09b13ac9d85781c6e4fe07457c7
SHA1bb559602478c9b2e96da8eaa77f0536577aca1df
SHA2569a50ab40120b76695c78d45c64a97f7179033a2a05f5a2e97db36c2a81021806
SHA5121f48829faef6f22836e8946fb610c73b4134f0efa6c5ce0ece6c19606506c6d7fc4db4852b06b38183b1ad58c7775ffba5f0c69f93ce57532d29bff1d88226c4
-
Filesize
2.2MB
MD5afd1c09b13ac9d85781c6e4fe07457c7
SHA1bb559602478c9b2e96da8eaa77f0536577aca1df
SHA2569a50ab40120b76695c78d45c64a97f7179033a2a05f5a2e97db36c2a81021806
SHA5121f48829faef6f22836e8946fb610c73b4134f0efa6c5ce0ece6c19606506c6d7fc4db4852b06b38183b1ad58c7775ffba5f0c69f93ce57532d29bff1d88226c4
-
Filesize
119KB
MD5e47ce3af60628f795b86b3c3aff8b88f
SHA188051cfdd8fbd780888aba557a35cba97635694e
SHA25640e00f085b691bbf8adbef2adb0ec55d5c6dee808605be4e4fd8ccad65f59c4b
SHA5127ba0870dd4817e24f13a513a3ebd1196b0994f4a54574ac44b8791c52c9cd98260c96ab8368d04889472f4cb0bf08e2affe81f9593f80af43f57762d5f4cf1db
-
Filesize
484KB
MD59f06ceef05be654f331d8771c74b25f0
SHA1656829c09c9b3341afc371932e53271e76f09c23
SHA2566417309e97acc09cbd18f919cd7b767584649ad2867abf613a47cf502da81507
SHA512ca68a814ca42f8d7ffe35e78bbaa40d3d3d49cbc3c46832719d2b4d6566d8eee031f568fbdbc0d872fd5b84bea4f21ba4633baff3513b919789790b3516af5b3
-
Filesize
1.2MB
MD5a70e878d33aedb2062dd6dd99e340ff3
SHA1a46b786c73f1751c998f00a4c41c0ea75f5e88e5
SHA256a822a24f5987587a129a46e15dd905b2d09e605116689197e9222ea811a4e962
SHA51278e196bd3dcbbcc43eedfb3c2cc2532537090c8b755eeeeafeb2a555f8035c14feedcddcfe991ad4c01f99889ca3dcd7e43652a1bf9a36e93400bedd363e6530
-
Filesize
92B
MD51213b2902b1c8b54868828c5a532811c
SHA1ffe38a207b31fac5797c86e43ca3ed5667e96d0e
SHA25667c9bbef4f0e63c67f09b7519f3178a820a0fcfdda5b84998dd8078c3fbd9d08
SHA5123ffa49c5f45c0f2baedc5cd9c326b289b6dd608aea036235040e2f35479d62dfab6a7ecc7d66e1deac67834babee4b7272e7b7e7a0a9a4dff35fb76804c9f193
-
Filesize
102B
MD52e3c18cf89e3995c1caad22622a8633a
SHA11f5b89c2368f2e3974fe951fa087a3a2cd36146d
SHA2560f371f46af350a287c34e785aec5b3d0a52d97e0aeabf548e612b6c3f51f5e79
SHA512e349cd0e0908c7f6ca61402aebe674a34342add6dfd4a7ca03d708746d0d2039bb08aec03f3029a2180cf03ab8cdacfc3ea9bbe42dcfa6f0a70ae12a92b0575c
-
Filesize
797B
MD5461dca61867c11fe76dd1c59abf5cff0
SHA14b769c63d09453a3768f59cdec5d2d86746f3f32
SHA256ce56a4c6a856178906d61dc52b41731cab31b95d2543e4e6648977791e9e534b
SHA5127405f5691b1722d532aa8df97b0ab874a19e50730186b3b96ebb99f9df200432e93d17ab8bac2fe06c26854e90243a189c36c5b61de0217ae4b56bd93bcb744e
-
Filesize
1KB
MD5e6f4fa5abf4182d04ecefe530f924c24
SHA182e34511943cbf2c709b1039c7132372e409faa1
SHA256961127352c35ed055056721ddfd16373190e36495afcbe5fd7a00310413705f0
SHA512a6b4563abdcff9d830e7147f224cbd128f3d1b45cc93e7e48586c9d978f64f076e9fb9d6f2ba35fe63847738f260534cfac866ce43e461aa9cbee16ee2303d8e
-
Filesize
152KB
MD56ffd7c733dde81f2b6b8782e690b044d
SHA119163bb2a519b23757061333da30c734cee7e32e
SHA256cafde9e7d48e330f8edb552e2c026d11a318b8c9ee49bbd1a3dc9af1436e2fbc
SHA512d9a42c9b1953a607f5c65e93bcd9d263ce5bf37f5bad57517848d0e6d7ea601f3378c48b143920fde8cab8626d5abfd97c2500f21bb981441aa0ab555dd1fda3
-
Filesize
152KB
MD56ffd7c733dde81f2b6b8782e690b044d
SHA119163bb2a519b23757061333da30c734cee7e32e
SHA256cafde9e7d48e330f8edb552e2c026d11a318b8c9ee49bbd1a3dc9af1436e2fbc
SHA512d9a42c9b1953a607f5c65e93bcd9d263ce5bf37f5bad57517848d0e6d7ea601f3378c48b143920fde8cab8626d5abfd97c2500f21bb981441aa0ab555dd1fda3
-
Filesize
152KB
MD56ffd7c733dde81f2b6b8782e690b044d
SHA119163bb2a519b23757061333da30c734cee7e32e
SHA256cafde9e7d48e330f8edb552e2c026d11a318b8c9ee49bbd1a3dc9af1436e2fbc
SHA512d9a42c9b1953a607f5c65e93bcd9d263ce5bf37f5bad57517848d0e6d7ea601f3378c48b143920fde8cab8626d5abfd97c2500f21bb981441aa0ab555dd1fda3
-
Filesize
2.8MB
MD5a4545f9052e0f25d388fd08d1f8dc918
SHA114427a5dee047507d72cd4654ccc60db88fc4aae
SHA25637e849c75b1904a47549335a3b72d458c9e28617f18502bdd4860365442f5f86
SHA512102f3ff5784c9b0e65ba708962da79e04a77007d16e00fc67d3496b56c83fca83af65a70cba8bba84e4953659b133e51d484f9b0255205cdb080070c665599a8
-
Filesize
1006B
MD5a6d9ba4204d51d859c77d3da736faa25
SHA165a9d5e13e2be87cf233a64343b84960b8046e9b
SHA256f3fd48fff322b6fea7b57088ccbc9364364e8ede02e1dd205aae21505c7c7cf5
SHA512927801a0fae8c84d049b6dca760b1a0d6bb86d386772e019c119148a8a0ec3fdff62c4d02c97f6aebcbe9e1290e8791b5fe195c5618007b6ffe76d8adf24505a
-
Filesize
67B
MD53f10ebc9f956b4b70a757f7f1b0de5b5
SHA1ce68ca9c8d371b4ba7d8ff9d19c2ff401cc3fae1
SHA2566d8fa24d08a3c6df0b3044e1f12b0684a0968374f9e9964e44b2c294f19ce45d
SHA51204ed07cd824d48670f7d4b511dbb69943f95af52609e42eeb706baadacdfde6069c8bae23e30de7b1320c8b300234d55d16345161ccaa92fa2378fbd650a2597
-
Filesize
67B
MD53f10ebc9f956b4b70a757f7f1b0de5b5
SHA1ce68ca9c8d371b4ba7d8ff9d19c2ff401cc3fae1
SHA2566d8fa24d08a3c6df0b3044e1f12b0684a0968374f9e9964e44b2c294f19ce45d
SHA51204ed07cd824d48670f7d4b511dbb69943f95af52609e42eeb706baadacdfde6069c8bae23e30de7b1320c8b300234d55d16345161ccaa92fa2378fbd650a2597
-
Filesize
1006B
MD5a6d9ba4204d51d859c77d3da736faa25
SHA165a9d5e13e2be87cf233a64343b84960b8046e9b
SHA256f3fd48fff322b6fea7b57088ccbc9364364e8ede02e1dd205aae21505c7c7cf5
SHA512927801a0fae8c84d049b6dca760b1a0d6bb86d386772e019c119148a8a0ec3fdff62c4d02c97f6aebcbe9e1290e8791b5fe195c5618007b6ffe76d8adf24505a
-
Filesize
67B
MD53f10ebc9f956b4b70a757f7f1b0de5b5
SHA1ce68ca9c8d371b4ba7d8ff9d19c2ff401cc3fae1
SHA2566d8fa24d08a3c6df0b3044e1f12b0684a0968374f9e9964e44b2c294f19ce45d
SHA51204ed07cd824d48670f7d4b511dbb69943f95af52609e42eeb706baadacdfde6069c8bae23e30de7b1320c8b300234d55d16345161ccaa92fa2378fbd650a2597
-
Filesize
67B
MD53f10ebc9f956b4b70a757f7f1b0de5b5
SHA1ce68ca9c8d371b4ba7d8ff9d19c2ff401cc3fae1
SHA2566d8fa24d08a3c6df0b3044e1f12b0684a0968374f9e9964e44b2c294f19ce45d
SHA51204ed07cd824d48670f7d4b511dbb69943f95af52609e42eeb706baadacdfde6069c8bae23e30de7b1320c8b300234d55d16345161ccaa92fa2378fbd650a2597
-
Filesize
67B
MD53f10ebc9f956b4b70a757f7f1b0de5b5
SHA1ce68ca9c8d371b4ba7d8ff9d19c2ff401cc3fae1
SHA2566d8fa24d08a3c6df0b3044e1f12b0684a0968374f9e9964e44b2c294f19ce45d
SHA51204ed07cd824d48670f7d4b511dbb69943f95af52609e42eeb706baadacdfde6069c8bae23e30de7b1320c8b300234d55d16345161ccaa92fa2378fbd650a2597
-
Filesize
1006B
MD580f67d67283be78057992098cdd4be8f
SHA136c1903ac7965c6aeb4cf5b3e67586ad5a19a4c0
SHA2566bb48a88cd9c0d434b07ae450603fa7a586597016443edab55e108af1b2c304c
SHA512c9629c29dbf8cc212ddb94d8c68087c559284971eb6056b62e1aeebed10e2750346a70a3d2eb8373bb9ff0b5c5dd10fad1edea921cc570779321eba16d71345d
-
Filesize
67B
MD53f10ebc9f956b4b70a757f7f1b0de5b5
SHA1ce68ca9c8d371b4ba7d8ff9d19c2ff401cc3fae1
SHA2566d8fa24d08a3c6df0b3044e1f12b0684a0968374f9e9964e44b2c294f19ce45d
SHA51204ed07cd824d48670f7d4b511dbb69943f95af52609e42eeb706baadacdfde6069c8bae23e30de7b1320c8b300234d55d16345161ccaa92fa2378fbd650a2597
-
Filesize
67B
MD53f10ebc9f956b4b70a757f7f1b0de5b5
SHA1ce68ca9c8d371b4ba7d8ff9d19c2ff401cc3fae1
SHA2566d8fa24d08a3c6df0b3044e1f12b0684a0968374f9e9964e44b2c294f19ce45d
SHA51204ed07cd824d48670f7d4b511dbb69943f95af52609e42eeb706baadacdfde6069c8bae23e30de7b1320c8b300234d55d16345161ccaa92fa2378fbd650a2597
-
Filesize
1006B
MD5a6d9ba4204d51d859c77d3da736faa25
SHA165a9d5e13e2be87cf233a64343b84960b8046e9b
SHA256f3fd48fff322b6fea7b57088ccbc9364364e8ede02e1dd205aae21505c7c7cf5
SHA512927801a0fae8c84d049b6dca760b1a0d6bb86d386772e019c119148a8a0ec3fdff62c4d02c97f6aebcbe9e1290e8791b5fe195c5618007b6ffe76d8adf24505a
-
Filesize
1006B
MD5a6d9ba4204d51d859c77d3da736faa25
SHA165a9d5e13e2be87cf233a64343b84960b8046e9b
SHA256f3fd48fff322b6fea7b57088ccbc9364364e8ede02e1dd205aae21505c7c7cf5
SHA512927801a0fae8c84d049b6dca760b1a0d6bb86d386772e019c119148a8a0ec3fdff62c4d02c97f6aebcbe9e1290e8791b5fe195c5618007b6ffe76d8adf24505a
-
Filesize
1006B
MD5a6d9ba4204d51d859c77d3da736faa25
SHA165a9d5e13e2be87cf233a64343b84960b8046e9b
SHA256f3fd48fff322b6fea7b57088ccbc9364364e8ede02e1dd205aae21505c7c7cf5
SHA512927801a0fae8c84d049b6dca760b1a0d6bb86d386772e019c119148a8a0ec3fdff62c4d02c97f6aebcbe9e1290e8791b5fe195c5618007b6ffe76d8adf24505a
-
Filesize
1006B
MD5a6d9ba4204d51d859c77d3da736faa25
SHA165a9d5e13e2be87cf233a64343b84960b8046e9b
SHA256f3fd48fff322b6fea7b57088ccbc9364364e8ede02e1dd205aae21505c7c7cf5
SHA512927801a0fae8c84d049b6dca760b1a0d6bb86d386772e019c119148a8a0ec3fdff62c4d02c97f6aebcbe9e1290e8791b5fe195c5618007b6ffe76d8adf24505a
-
Filesize
1006B
MD5a6d9ba4204d51d859c77d3da736faa25
SHA165a9d5e13e2be87cf233a64343b84960b8046e9b
SHA256f3fd48fff322b6fea7b57088ccbc9364364e8ede02e1dd205aae21505c7c7cf5
SHA512927801a0fae8c84d049b6dca760b1a0d6bb86d386772e019c119148a8a0ec3fdff62c4d02c97f6aebcbe9e1290e8791b5fe195c5618007b6ffe76d8adf24505a
-
Filesize
67B
MD53f10ebc9f956b4b70a757f7f1b0de5b5
SHA1ce68ca9c8d371b4ba7d8ff9d19c2ff401cc3fae1
SHA2566d8fa24d08a3c6df0b3044e1f12b0684a0968374f9e9964e44b2c294f19ce45d
SHA51204ed07cd824d48670f7d4b511dbb69943f95af52609e42eeb706baadacdfde6069c8bae23e30de7b1320c8b300234d55d16345161ccaa92fa2378fbd650a2597
-
Filesize
484KB
MD59f06ceef05be654f331d8771c74b25f0
SHA1656829c09c9b3341afc371932e53271e76f09c23
SHA2566417309e97acc09cbd18f919cd7b767584649ad2867abf613a47cf502da81507
SHA512ca68a814ca42f8d7ffe35e78bbaa40d3d3d49cbc3c46832719d2b4d6566d8eee031f568fbdbc0d872fd5b84bea4f21ba4633baff3513b919789790b3516af5b3