Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 03:59
Static task
static1
Behavioral task
behavioral1
Sample
y.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
y.exe
Resource
win10-20231023-en
General
-
Target
y.exe
-
Size
516KB
-
MD5
672c56bcaeedb4f630cda204ed5ef32d
-
SHA1
df8868926293efb2e13339a020a0eefee128d9d7
-
SHA256
448a9d8451178d090723b249ba1b3514539b14bfb14a7b2141dd492f296d1f53
-
SHA512
38f69f8199a664edb278aeb63d33a50d19fa843e1331ba3870f3038cd2620cd41979c02287dfe154031c1d5ea32be70d9f775ae2e2f8c4f8e7fbef36154b21a4
-
SSDEEP
6144:J0aJ41z7pmJyseEgKgPObyIozhRjcerTn:J0aqz79QmI4T
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral3/memory/636-112-0x00000000038B0000-0x00000000039EB000-memory.dmp purplefox_rootkit behavioral3/memory/636-113-0x00000000039F0000-0x0000000003B98000-memory.dmp purplefox_rootkit behavioral3/memory/636-115-0x00000000039F0000-0x0000000003B98000-memory.dmp purplefox_rootkit behavioral3/memory/636-123-0x00000000039F0000-0x0000000003B98000-memory.dmp purplefox_rootkit behavioral3/memory/636-135-0x00000000039F0000-0x0000000003B98000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 5 IoCs
Processes:
resource yara_rule behavioral3/memory/636-112-0x00000000038B0000-0x00000000039EB000-memory.dmp family_gh0strat behavioral3/memory/636-113-0x00000000039F0000-0x0000000003B98000-memory.dmp family_gh0strat behavioral3/memory/636-115-0x00000000039F0000-0x0000000003B98000-memory.dmp family_gh0strat behavioral3/memory/636-123-0x00000000039F0000-0x0000000003B98000-memory.dmp family_gh0strat behavioral3/memory/636-135-0x00000000039F0000-0x0000000003B98000-memory.dmp family_gh0strat -
Drops startup file 2 IoCs
Processes:
Cmc6.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\Embarcaderophi.lnk Cmc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\Embarcaderophi.lnk Cmc6.exe -
Executes dropped EXE 2 IoCs
Processes:
Cmc6.exe4K3N3Ny.exepid process 3228 Cmc6.exe 636 4K3N3Ny.exe -
Loads dropped DLL 1 IoCs
Processes:
4K3N3Ny.exepid process 636 4K3N3Ny.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
4K3N3Ny.exedescription ioc process File opened (read-only) \??\W: 4K3N3Ny.exe File opened (read-only) \??\Y: 4K3N3Ny.exe File opened (read-only) \??\G: 4K3N3Ny.exe File opened (read-only) \??\I: 4K3N3Ny.exe File opened (read-only) \??\J: 4K3N3Ny.exe File opened (read-only) \??\V: 4K3N3Ny.exe File opened (read-only) \??\Q: 4K3N3Ny.exe File opened (read-only) \??\T: 4K3N3Ny.exe File opened (read-only) \??\B: 4K3N3Ny.exe File opened (read-only) \??\E: 4K3N3Ny.exe File opened (read-only) \??\M: 4K3N3Ny.exe File opened (read-only) \??\P: 4K3N3Ny.exe File opened (read-only) \??\K: 4K3N3Ny.exe File opened (read-only) \??\R: 4K3N3Ny.exe File opened (read-only) \??\X: 4K3N3Ny.exe File opened (read-only) \??\Z: 4K3N3Ny.exe File opened (read-only) \??\S: 4K3N3Ny.exe File opened (read-only) \??\U: 4K3N3Ny.exe File opened (read-only) \??\H: 4K3N3Ny.exe File opened (read-only) \??\L: 4K3N3Ny.exe File opened (read-only) \??\N: 4K3N3Ny.exe File opened (read-only) \??\O: 4K3N3Ny.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
4K3N3Ny.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4K3N3Ny.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 4K3N3Ny.exe -
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 32 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 7800310000000000545754881100557365727300640009000400efbe874f774861570e202e000000c70500000000010000000000000000003a0000000000c6c5230055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Music" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 7c003100000000006157162011005075626c69630000660009000400efbe874fdb49615718202e000000f80500000000010000000000000000003c000000000016ec0f005000750062006c0069006300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003600000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 78003100000000006157182011004d7573696300640009000400efbe874fdb49615718202e000000fd0500000000010000000000000000003a00000000005ca7af004d007500730069006300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380030003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 5400310000000000615718201000663859534c4300003e0009000400efbe61571820615718202e0000003a2e02000000070000000000000000000000000000005ca7af0066003800590053004c004300000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 2460 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
y.exe4K3N3Ny.exepid process 2584 y.exe 2584 y.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe 636 4K3N3Ny.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
4K3N3Ny.exedescription pid process Token: 33 636 4K3N3Ny.exe Token: SeIncBasePriorityPrivilege 636 4K3N3Ny.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
explorer.exe4K3N3Ny.exepid process 2460 explorer.exe 2460 explorer.exe 636 4K3N3Ny.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
y.exeexplorer.exedescription pid process target process PID 2584 wrote to memory of 2468 2584 y.exe explorer.exe PID 2584 wrote to memory of 2468 2584 y.exe explorer.exe PID 2460 wrote to memory of 3228 2460 explorer.exe Cmc6.exe PID 2460 wrote to memory of 3228 2460 explorer.exe Cmc6.exe PID 2460 wrote to memory of 3228 2460 explorer.exe Cmc6.exe PID 2460 wrote to memory of 636 2460 explorer.exe 4K3N3Ny.exe PID 2460 wrote to memory of 636 2460 explorer.exe 4K3N3Ny.exe PID 2460 wrote to memory of 636 2460 explorer.exe 4K3N3Ny.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\y.exe"C:\Users\Admin\AppData\Local\Temp\y.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\explorer.exeC:\Windows\explorer.exe C:\Users\Public\Music\f8YSLC2⤵PID:2468
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Roaming\4O7O7\Cmc6.exe"C:\Users\Admin\AppData\Roaming\4O7O7\Cmc6.exe" -n C:\Users\Admin\AppData\Roaming\4O7O7\51L.zip -d C:\Users\Admin\AppData\Roaming2⤵
- Drops startup file
- Executes dropped EXE
PID:3228 -
C:\ProgramData\VEYEYH\4K3N3Ny.exe"C:\ProgramData\VEYEYH\4K3N3Ny.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:636
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5a70e878d33aedb2062dd6dd99e340ff3
SHA1a46b786c73f1751c998f00a4c41c0ea75f5e88e5
SHA256a822a24f5987587a129a46e15dd905b2d09e605116689197e9222ea811a4e962
SHA51278e196bd3dcbbcc43eedfb3c2cc2532537090c8b755eeeeafeb2a555f8035c14feedcddcfe991ad4c01f99889ca3dcd7e43652a1bf9a36e93400bedd363e6530
-
Filesize
92B
MD51213b2902b1c8b54868828c5a532811c
SHA1ffe38a207b31fac5797c86e43ca3ed5667e96d0e
SHA25667c9bbef4f0e63c67f09b7519f3178a820a0fcfdda5b84998dd8078c3fbd9d08
SHA5123ffa49c5f45c0f2baedc5cd9c326b289b6dd608aea036235040e2f35479d62dfab6a7ecc7d66e1deac67834babee4b7272e7b7e7a0a9a4dff35fb76804c9f193
-
Filesize
102B
MD52e3c18cf89e3995c1caad22622a8633a
SHA11f5b89c2368f2e3974fe951fa087a3a2cd36146d
SHA2560f371f46af350a287c34e785aec5b3d0a52d97e0aeabf548e612b6c3f51f5e79
SHA512e349cd0e0908c7f6ca61402aebe674a34342add6dfd4a7ca03d708746d0d2039bb08aec03f3029a2180cf03ab8cdacfc3ea9bbe42dcfa6f0a70ae12a92b0575c
-
Filesize
2.2MB
MD5afd1c09b13ac9d85781c6e4fe07457c7
SHA1bb559602478c9b2e96da8eaa77f0536577aca1df
SHA2569a50ab40120b76695c78d45c64a97f7179033a2a05f5a2e97db36c2a81021806
SHA5121f48829faef6f22836e8946fb610c73b4134f0efa6c5ce0ece6c19606506c6d7fc4db4852b06b38183b1ad58c7775ffba5f0c69f93ce57532d29bff1d88226c4
-
Filesize
2.2MB
MD5afd1c09b13ac9d85781c6e4fe07457c7
SHA1bb559602478c9b2e96da8eaa77f0536577aca1df
SHA2569a50ab40120b76695c78d45c64a97f7179033a2a05f5a2e97db36c2a81021806
SHA5121f48829faef6f22836e8946fb610c73b4134f0efa6c5ce0ece6c19606506c6d7fc4db4852b06b38183b1ad58c7775ffba5f0c69f93ce57532d29bff1d88226c4
-
Filesize
2.2MB
MD5afd1c09b13ac9d85781c6e4fe07457c7
SHA1bb559602478c9b2e96da8eaa77f0536577aca1df
SHA2569a50ab40120b76695c78d45c64a97f7179033a2a05f5a2e97db36c2a81021806
SHA5121f48829faef6f22836e8946fb610c73b4134f0efa6c5ce0ece6c19606506c6d7fc4db4852b06b38183b1ad58c7775ffba5f0c69f93ce57532d29bff1d88226c4
-
Filesize
119KB
MD5e47ce3af60628f795b86b3c3aff8b88f
SHA188051cfdd8fbd780888aba557a35cba97635694e
SHA25640e00f085b691bbf8adbef2adb0ec55d5c6dee808605be4e4fd8ccad65f59c4b
SHA5127ba0870dd4817e24f13a513a3ebd1196b0994f4a54574ac44b8791c52c9cd98260c96ab8368d04889472f4cb0bf08e2affe81f9593f80af43f57762d5f4cf1db
-
Filesize
484KB
MD59f06ceef05be654f331d8771c74b25f0
SHA1656829c09c9b3341afc371932e53271e76f09c23
SHA2566417309e97acc09cbd18f919cd7b767584649ad2867abf613a47cf502da81507
SHA512ca68a814ca42f8d7ffe35e78bbaa40d3d3d49cbc3c46832719d2b4d6566d8eee031f568fbdbc0d872fd5b84bea4f21ba4633baff3513b919789790b3516af5b3
-
Filesize
484KB
MD59f06ceef05be654f331d8771c74b25f0
SHA1656829c09c9b3341afc371932e53271e76f09c23
SHA2566417309e97acc09cbd18f919cd7b767584649ad2867abf613a47cf502da81507
SHA512ca68a814ca42f8d7ffe35e78bbaa40d3d3d49cbc3c46832719d2b4d6566d8eee031f568fbdbc0d872fd5b84bea4f21ba4633baff3513b919789790b3516af5b3
-
Filesize
1KB
MD57655335695a6b48685060b472f6a207c
SHA1a0fd7f41f67ace4a07668c58388761c94d48439f
SHA25620cef5129a77bdc4155b8fcdf38097dabaeba17d105a566044c8dfa43aaa141a
SHA512237f21800d4393234ceb4bb5d95a7ecebfab8a061e50ab24d8a6beb31bbb33150e637127e675e8d2b53c7fde67fd3d4d68c8610cd9999564a38bb76ea3f9e96f
-
Filesize
152KB
MD56ffd7c733dde81f2b6b8782e690b044d
SHA119163bb2a519b23757061333da30c734cee7e32e
SHA256cafde9e7d48e330f8edb552e2c026d11a318b8c9ee49bbd1a3dc9af1436e2fbc
SHA512d9a42c9b1953a607f5c65e93bcd9d263ce5bf37f5bad57517848d0e6d7ea601f3378c48b143920fde8cab8626d5abfd97c2500f21bb981441aa0ab555dd1fda3
-
Filesize
152KB
MD56ffd7c733dde81f2b6b8782e690b044d
SHA119163bb2a519b23757061333da30c734cee7e32e
SHA256cafde9e7d48e330f8edb552e2c026d11a318b8c9ee49bbd1a3dc9af1436e2fbc
SHA512d9a42c9b1953a607f5c65e93bcd9d263ce5bf37f5bad57517848d0e6d7ea601f3378c48b143920fde8cab8626d5abfd97c2500f21bb981441aa0ab555dd1fda3
-
Filesize
152KB
MD56ffd7c733dde81f2b6b8782e690b044d
SHA119163bb2a519b23757061333da30c734cee7e32e
SHA256cafde9e7d48e330f8edb552e2c026d11a318b8c9ee49bbd1a3dc9af1436e2fbc
SHA512d9a42c9b1953a607f5c65e93bcd9d263ce5bf37f5bad57517848d0e6d7ea601f3378c48b143920fde8cab8626d5abfd97c2500f21bb981441aa0ab555dd1fda3
-
Filesize
797B
MD5fe12ea498a38f4d8fd5cd06b4d71a13c
SHA13b83aa066f36b542f468d177045fac4bf41ec8ba
SHA256d26652afdc004b237f4fa0ca59875d217af850a36095e7a2a668284551ce6dbe
SHA512d14dc894c06888f96d59354ceb8ef97c29f2b099645f7f4615372a9e99c056f04d83a423b6191e7fd03247ce0c56f85be8cc81419abebb6b682106db594bafd7
-
Filesize
2.8MB
MD5a4545f9052e0f25d388fd08d1f8dc918
SHA114427a5dee047507d72cd4654ccc60db88fc4aae
SHA25637e849c75b1904a47549335a3b72d458c9e28617f18502bdd4860365442f5f86
SHA512102f3ff5784c9b0e65ba708962da79e04a77007d16e00fc67d3496b56c83fca83af65a70cba8bba84e4953659b133e51d484f9b0255205cdb080070c665599a8
-
Filesize
1006B
MD5ba910fc9d5e0cc66daa2cbd37122ff6a
SHA1e649be5d32c2c972691a4ab5410fe1583c8e215f
SHA256cf1f7f1a0de2c5ee0f88d4a9cb1b518c3799551136dcb40f84118bb690caef08
SHA512f294cbce6a9a8eb2821be4514c1bbe2d67bf8d342bea50c40cf0a3a883e58f8b6fdec6926b85ac099e4c90333cd0a820db76dbccd572947276609a5d8459a035
-
Filesize
67B
MD53f76c0675a3c08d4b643b3987a50528f
SHA1c6789d5772f882794de748f4ae1397d1019d0d87
SHA2562d3c8667cb8cfe02a22fd2a33819232359cb9d827ed5431eceb24080f9bcd37f
SHA51224e8c23e2621461735fb124db9fe230f76dd9c8385b15ce4d1bd4c098ad5c95c7917a4bc8352501f78ae08f007daeca72d162dcf69968635bac61a9f268c9c6c
-
Filesize
1006B
MD53c5971f2241fd250bb4d216a595835a2
SHA177d8d831c86dc2fea9b96d16fc4edd2024ac6a17
SHA25686943c36fd3f72feefec4267fe8645ebe4db39575e565c67e1bdc18dafdd4f1d
SHA5124456bc4c014fbf262f985f281a0ff5c437c5209b4dd234650fb76b83b48f3906a83653355ddf12552d9d6545fa9afa208f4a1e18ada3497441497dc579c21496
-
Filesize
67B
MD53f76c0675a3c08d4b643b3987a50528f
SHA1c6789d5772f882794de748f4ae1397d1019d0d87
SHA2562d3c8667cb8cfe02a22fd2a33819232359cb9d827ed5431eceb24080f9bcd37f
SHA51224e8c23e2621461735fb124db9fe230f76dd9c8385b15ce4d1bd4c098ad5c95c7917a4bc8352501f78ae08f007daeca72d162dcf69968635bac61a9f268c9c6c
-
Filesize
1006B
MD53e4fe26cbc297043d0e89df2c00a22f5
SHA12ca57b2863cb5f68a6e7f8e57db6f78941408154
SHA256ba8f89d3f2fb1b20e22b9623612602c36450d6552e250228230388db3d16d349
SHA512659dc818b06fd5445f0d1974fdb68bea8d5a07bfac1c552f26579a2348cc12307655385fd3ae6f42aa828fa5610452b5ce86685f0d62b1660b7ac7e6b1b070d2
-
Filesize
67B
MD53f76c0675a3c08d4b643b3987a50528f
SHA1c6789d5772f882794de748f4ae1397d1019d0d87
SHA2562d3c8667cb8cfe02a22fd2a33819232359cb9d827ed5431eceb24080f9bcd37f
SHA51224e8c23e2621461735fb124db9fe230f76dd9c8385b15ce4d1bd4c098ad5c95c7917a4bc8352501f78ae08f007daeca72d162dcf69968635bac61a9f268c9c6c
-
Filesize
1006B
MD5d9aebffbf2c573a3781deecc5deee3a6
SHA1c914c402a54ca0006ec3ee6ee6462fd23842ce70
SHA256eb7d04625a7e697b43e8378991c2f347e171a019fb35642da21e73ce70631468
SHA51215a8d4fc69704cb9fbc78ff1021f261c52d97cc75898e5c35db2f2520d548b4af11115893fdf150387b8a2be6550374152c08bb92ff4a04e2071f521118f02a4
-
Filesize
67B
MD53f76c0675a3c08d4b643b3987a50528f
SHA1c6789d5772f882794de748f4ae1397d1019d0d87
SHA2562d3c8667cb8cfe02a22fd2a33819232359cb9d827ed5431eceb24080f9bcd37f
SHA51224e8c23e2621461735fb124db9fe230f76dd9c8385b15ce4d1bd4c098ad5c95c7917a4bc8352501f78ae08f007daeca72d162dcf69968635bac61a9f268c9c6c
-
Filesize
67B
MD53f76c0675a3c08d4b643b3987a50528f
SHA1c6789d5772f882794de748f4ae1397d1019d0d87
SHA2562d3c8667cb8cfe02a22fd2a33819232359cb9d827ed5431eceb24080f9bcd37f
SHA51224e8c23e2621461735fb124db9fe230f76dd9c8385b15ce4d1bd4c098ad5c95c7917a4bc8352501f78ae08f007daeca72d162dcf69968635bac61a9f268c9c6c
-
Filesize
67B
MD53f76c0675a3c08d4b643b3987a50528f
SHA1c6789d5772f882794de748f4ae1397d1019d0d87
SHA2562d3c8667cb8cfe02a22fd2a33819232359cb9d827ed5431eceb24080f9bcd37f
SHA51224e8c23e2621461735fb124db9fe230f76dd9c8385b15ce4d1bd4c098ad5c95c7917a4bc8352501f78ae08f007daeca72d162dcf69968635bac61a9f268c9c6c
-
Filesize
1006B
MD5ebf8ce30042c9a049130da871162df7e
SHA1b2239e6a75458b9906fdbd37b5d718d671ca763c
SHA256755b48138ef958bb5414cbb08b6f8ba4cbfca2b12fc730e4857ce496ae3d1cc1
SHA5120506c6593c341de42af7d266fc815f972a4da9c83be6f7e2438d2671f1a8ea7811696e14945864c53fa430900a8f223a087e69420ca4e8fef1173140e18d3c9d
-
Filesize
1006B
MD53eab583983ab1978238fe77502a5160e
SHA1a6d2ae0e541bd206387ea4357f4903c2cc3fd8bb
SHA256cec83f4878a44c85f76d7a6ff4ec722020314687d5b1c1e5363c986ea64c1ef4
SHA51270ceaff0772cc65349320c36cfeae23e0fcf58aa8bb416965530674995eb5aabad44b919e41f3649ce6485a43174325737a4156af5a82a103f21a57347030287
-
Filesize
1006B
MD5011fb2f0ba8b2b1c0a257a00c8991f96
SHA1d2d823b1fb95af407a5b23e8f846ffe9c8e985b9
SHA256b9e9dfacef734d5d846465ab9c7bf447d6d9cad5a87a728abcbcdead0a794b25
SHA5128189d445fdb28939cfe27d6545b2faa230af16ffd627ebda20ef7fb8017ab1e947364e4509ffc04f40c9456c6d54b412d5697521490d87da65d301ada775d05a
-
Filesize
67B
MD53f76c0675a3c08d4b643b3987a50528f
SHA1c6789d5772f882794de748f4ae1397d1019d0d87
SHA2562d3c8667cb8cfe02a22fd2a33819232359cb9d827ed5431eceb24080f9bcd37f
SHA51224e8c23e2621461735fb124db9fe230f76dd9c8385b15ce4d1bd4c098ad5c95c7917a4bc8352501f78ae08f007daeca72d162dcf69968635bac61a9f268c9c6c
-
Filesize
67B
MD53f76c0675a3c08d4b643b3987a50528f
SHA1c6789d5772f882794de748f4ae1397d1019d0d87
SHA2562d3c8667cb8cfe02a22fd2a33819232359cb9d827ed5431eceb24080f9bcd37f
SHA51224e8c23e2621461735fb124db9fe230f76dd9c8385b15ce4d1bd4c098ad5c95c7917a4bc8352501f78ae08f007daeca72d162dcf69968635bac61a9f268c9c6c