Analysis
-
max time kernel
131s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe
Resource
win7-20231215-en
General
-
Target
464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe
-
Size
1.8MB
-
MD5
95e5942aa364c47ab713eda891d00c78
-
SHA1
c2f6fe071f412c37bbd4100652290fd88cfe6874
-
SHA256
464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1
-
SHA512
e76dc76ab377cf54d0551f46b8446353c1777eaf4f29254991c3c0c3e6a9728e87bfd1f3a6d8a26f94bd521fda1b0ab0b6b5f15310d200bac30037e2b5f8825b
-
SSDEEP
49152:0x5SUW/cxUitIGLsF0nb+tJVYleAMz77+WA4xV7RkaNyFnt:0vbjVkjjCAzJJxVmMyn
Malware Config
Signatures
-
Executes dropped EXE 13 IoCs
pid Process 4696 alg.exe 780 DiagnosticsHub.StandardCollector.Service.exe 872 fxssvc.exe 3744 elevation_service.exe 1080 elevation_service.exe 3616 maintenanceservice.exe 4296 msdtc.exe 3980 OSE.EXE 3276 PerceptionSimulationService.exe 1780 perfhost.exe 4888 locator.exe 4876 SensorDataService.exe 3052 snmptrap.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 23 IoCs
description ioc Process File opened for modification C:\Windows\system32\dllhost.exe 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Windows\system32\msiexec.exe 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe File opened for modification C:\Windows\SysWow64\perfhost.exe elevation_service.exe File opened for modification C:\Windows\System32\SensorDataService.exe elevation_service.exe File opened for modification C:\Windows\System32\alg.exe 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\935fe84a5bf65ce.bin DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\locator.exe elevation_service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\System32\snmptrap.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Windows\System32\msdtc.exe 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Windows\system32\msiexec.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe DiagnosticsHub.StandardCollector.Service.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_es-419.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_kn.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe DiagnosticsHub.StandardCollector.Service.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_ru.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_zh-TW.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_108796\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_am.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_cs.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_pt-PT.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe DiagnosticsHub.StandardCollector.Service.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_sv.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe DiagnosticsHub.StandardCollector.Service.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_gu.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_108796\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe DiagnosticsHub.StandardCollector.Service.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_it.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe DiagnosticsHub.StandardCollector.Service.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_hr.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_hu.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe DiagnosticsHub.StandardCollector.Service.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_es.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_ur.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_no.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe DiagnosticsHub.StandardCollector.Service.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\GoogleUpdateComRegisterShell64.exe 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File created C:\Program Files (x86)\Google\Temp\GUMA671.tmp\goopdateres_is.dll 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe DiagnosticsHub.StandardCollector.Service.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 780 DiagnosticsHub.StandardCollector.Service.exe 780 DiagnosticsHub.StandardCollector.Service.exe 780 DiagnosticsHub.StandardCollector.Service.exe 780 DiagnosticsHub.StandardCollector.Service.exe 780 DiagnosticsHub.StandardCollector.Service.exe 780 DiagnosticsHub.StandardCollector.Service.exe 780 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 680 Process not Found 680 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1428 464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe Token: SeAuditPrivilege 872 fxssvc.exe Token: SeDebugPrivilege 780 DiagnosticsHub.StandardCollector.Service.exe Token: SeTakeOwnershipPrivilege 3744 elevation_service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe"C:\Users\Admin\AppData\Local\Temp\464426e480630cf2712337cd5fbe9ec402c56d837446cfe420f934145cf6e8d1.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:4696
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1648
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:872
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1080
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:3616
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4296
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:3980
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:3276
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:1780
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:4888
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵PID:904
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:3052
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
PID:4876
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵PID:5104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:2748
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵PID:4748
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵PID:400
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:4388
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:4412
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4408
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵PID:4048
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 808 812 820 8192 816 7922⤵PID:2040
-
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵PID:4548
-
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365KB
MD5895605ff40f16f19a5df398a2595cae1
SHA1db83b185413eb7c5675d17abf1710dc05e4e5cf1
SHA25695ff13096590448789113d4d6dfe08f2e8196cfcabef7a4f1cdc613e1feb0172
SHA512d6a042804c7fca828f4c2a99099a040c298620ef5a1abc58128f8a9d7d490a4c4802106330a28316a23fd6c576e1d9748c4b5f60b6dcf38d855b8013adfb93cc
-
Filesize
93KB
MD56363bd0c04e5e663e4452bf0b60ae270
SHA19b31a901dc53867e84435bf93cd594123b088974
SHA25637ee6688485dfe9591afcb107f21e94380c3344836c7fddada3ecd3a5664f5e5
SHA512b3f403c5aee66edd4c119a7f9a6318b48c9895f4012b07143040f8da2a1425f1b18b694c4f681edfd34d68ebc6598f0c97225b302d8bc3e18c473cb0162d53e1
-
Filesize
92KB
MD563d1eb1a21b0954bc2810b629c5dd5b9
SHA1d8981d1f3bc7c7f655501e5e84d1d08ded7c9697
SHA256fac57b93ec46d3a86a106c115a65214477f822a322895403960be59ebce7fe98
SHA51294bd24b12edb21c96f88bb681fc08c55a6c3cf8a7cd1a6e07624ea88d0b9828b8e1b293b6bee237b486635d73387eb3a57a8faf680a7cc846310ecf0d2555919
-
Filesize
2.1MB
MD576352e6bb89b43d85addd35a838b310b
SHA11255085e5b6cde0843576528f33c6ec8974a9cae
SHA256533b1f90c4b9b86469219decc99d16ff449c8f2a9a942255dd2bd781194f7a3e
SHA512f524b7e3074b7407a5256571bdfe85dcfce78e4b6ed668519288b634367aed7250d82abde8f618807810bb277625bbd8df8fa7fec4c19ef44e59065c7fe4658e
-
Filesize
199KB
MD5a5808327e116845db09cd5ee9f4ab09a
SHA100ccc9be4a5154bf98fb1fc4f0c7352c3f39abc9
SHA25611133b49143918309afb71d9ad8a44792771e675a7d3e312b54e5f82c10b692a
SHA51279405d13ddada4825bd464cd3607eae5e73b5c35448259397c525a8d915bac0af4eddd9a66ccd3d2341c27d70e1c2c5a38a279130e269cbefcac6e370f804fe6
-
Filesize
1.6MB
MD5c13ce171bd6ad4c0e84b15b5a25aac5b
SHA15a12319fe2dc0b2f3b33898e4350c7e6ff3fd024
SHA256179a07c926d70bd54e4431b40c776442b8068caec897a3d87a6c26b3f5997c23
SHA512f475137006e58f8431506860a9edc2a8e299904cac1beee286c4a18c189f40e7ede2e27e522d9f64dc2b2d6cecdd183907ab7f174377cc6b4413d8d861b114fa
-
Filesize
640KB
MD5385a49ab25b537bf86f11590b720f47e
SHA18021395438138fed2a5e54e2f432596561e6f1e7
SHA256788c6adce32b4cec0949f60ae5aef91289361fa702985c35da5f7c40e4175747
SHA5124aef9f1a68c8eb88d9fc8775c8aaa2b2c6de3332ce647a260a1b520f8fd741382a18996cd0266a280a328f1b066e47afb710ccb8009b311f7c7767ab7e0ae2fe
-
Filesize
1.5MB
MD565fbb2e792add34b70b0edc171772d43
SHA1e2ac721fd7af49118d9dd91ac54fcaf8b4c75298
SHA2562f26e79fd7ecb95597caec0086b97ef4e52471455f755f9c467f0e3eb3302093
SHA5128ce13925eae640a54dd0649101fe715d23cc825297152665603bb40370753fde427573b2bfad56526e520ece40120c420fe6c1816648edc2902c18921e1151c5
-
Filesize
1.4MB
MD59a30f11d9e40d774eb03d86c4aca575d
SHA101c3e808f110e15edbe19c42191ae1090dabcc45
SHA256af891d63019fede25e517830a2c7e0e6360971b3b8596b8ba1c31428cbdefcb8
SHA512d8c5c3cc9aae990780af5396c34d45019a25593bc8346622c56c66be1860ad13294f5083cfec74cbc6b5a641188792293e9f608290b9d56e53f20b54e5b46d6c
-
Filesize
893KB
MD53774651994cb2b43205e12ceee7d20ba
SHA1f75392e7c9a55ef83fc79b605bc4b5458c2b94ab
SHA25653902e061f19af11eac892ae0d109212ebd7c291b6e2059afb72857ddf68deb3
SHA512e5a0ca644979a69304c5e214d4bb0d28d62f0d2563613ed764ca54940943dd2823976b3f4ddaf99aa4186af31b607a1363ca7cd57696fef22168161c3b92c82b
-
Filesize
1024KB
MD5ee5a5718d98354ed5567251e49ce6402
SHA18594d8cc17aa957c56cc54920975543b618d6997
SHA2566cedfbfe98fa5727dab4c75dab7125d018ac9dae6dd4a9935509e8000398afc1
SHA5127bd482d09b5ad380c09a9d7a3557f430e8590994be63f1f22a6b4c1a51cd6ee51bea24a8daf36dccb09dbd765ed11ea48d17e84af7571cd886eb170ac822ec5f
-
Filesize
92KB
MD5164887e147a99dc2fb61846b9ef5d9f8
SHA1e21bf15688327ab53b0dccbf4c9d4adf2fc8ed82
SHA256696768c1579c6d0b5cbd036bda2a9a6fd3df7c36929241c6c9cd939839ca8b82
SHA5121525f4b12cfdd2f3e5fcf0de62866a091e2ad52119baa9153fbf6c5d7e8c7676a44b245e023331b092a03d2b88e09edb9af52bcdad0e0178f613ee3de34bd9ae
-
Filesize
1.6MB
MD5ec9e947f5be29ea18dfc74853af71c40
SHA16ffd263b330df8971f08246449748c6316023834
SHA256144b0d909a4280d8d483d67c5bf2017c5bab651706d20261a950246529302c7c
SHA5122fa8522fb4b47e1eb1b0131c01628551e2d602d50eae5cb15e8c23adf97cbc4cf9fd04248025bae1f5415c5fa85b252b7a8489d38a9beba122c33167c14bb3a9
-
Filesize
348KB
MD50a6fc04fabe8e675f2d5f3d5c3d33317
SHA1a5f9bab65f893eeec844fb5af676ef21c862b16a
SHA2566e355b4857f6f16e02fa4178fcf796c663c3f62d992a5aa37cbc30799dd38a99
SHA5121e3749191be798231d118374b8f3a1ad07f37201ef9f876ec8cdb62aaa75a80167d0a52ccfca151465e7ec71ce5d9bee5a6335504386e654d4e710fec9f8719c
-
Filesize
859KB
MD575af568f02af41df8dd8c9386e87cd51
SHA163c0b8add0f7fdeffdb5bf32169415b698b954a7
SHA2569af472579330fd9f860c0602c60afb7c1b1434d975f59d74a201433641cdacda
SHA5120d82294b2e7a791c37e57bf69febf664625b504b6eeb1ed2622a72dd02f8241a060c40b6b057850b63d4f7a6217c76fa754ecd9acd9fa8add48c571ec28d429b
-
Filesize
92KB
MD52d936596b4e42d62d4f6c4299f0ef6dc
SHA16968c5c487209474946fabed0a232598b3d434dd
SHA25677eefe9d9ea1a6de6e02a6156883b8d9f48bc61e78ae3a2697ccb0ce1a0cd89e
SHA5125b443fcbc1e27d0578e687e73cf1ca2efc8f7f3c6b1761acea613d2512ae5dcc086c127d2da77a932b8a49c6a2928f990669cd6a467f1c0748847b53b84886fa