Overview
overview
8Static
static
37cb7086237...28.exe
windows7-x64
87cb7086237...28.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...it.dll
windows7-x64
1$PROGRAMFI...it.dll
windows10-2004-x64
1$PROGRAMFI...ge.dll
windows7-x64
1$PROGRAMFI...ge.dll
windows10-2004-x64
1$PROGRAMFI...er.dll
windows7-x64
1$PROGRAMFI...er.dll
windows10-2004-x64
1fuk.exe
windows7-x64
7fuk.exe
windows10-2004-x64
7vts.exe
windows7-x64
8vts.exe
windows10-2004-x64
8Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
7cb7086237327a68a89f9ffebbe5a228.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7cb7086237327a68a89f9ffebbe5a228.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
fuk.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
fuk.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
vts.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
vts.exe
Resource
win10v2004-20231215-en
General
-
Target
7cb7086237327a68a89f9ffebbe5a228.exe
-
Size
1.0MB
-
MD5
7cb7086237327a68a89f9ffebbe5a228
-
SHA1
7384435fe71c6c8275fb5204218da4900ef27f48
-
SHA256
621130bec2ab9105386df86d03072ec6762e510b5706614678555137cf8603c6
-
SHA512
469f2078bb1851a502e89639528484e9e175576f0bfac30cfcca259b7d5d740ac8c1787242f65c2f54f7fa3419003750171c8797ed99bd6b11cde7839e503c41
-
SSDEEP
24576:la81Z/0sin7rvPmds+nx9XkOFDlerCkGhQZ8t/4wPVii9WA:V1ZHin7rx+xFkoBerCkGhjbVinA
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 9 1548 WScript.exe 11 1548 WScript.exe 13 1548 WScript.exe 15 1548 WScript.exe 17 1548 WScript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk fuk.exe -
Executes dropped EXE 5 IoCs
pid Process 2216 vts.exe 1660 fuk.exe 3040 Larghe.exe.com 2936 Larghe.exe.com 2648 SmartClock.exe -
Loads dropped DLL 17 IoCs
pid Process 2288 7cb7086237327a68a89f9ffebbe5a228.exe 2288 7cb7086237327a68a89f9ffebbe5a228.exe 2288 7cb7086237327a68a89f9ffebbe5a228.exe 2288 7cb7086237327a68a89f9ffebbe5a228.exe 2216 vts.exe 2216 vts.exe 1660 fuk.exe 1660 fuk.exe 1660 fuk.exe 3044 cmd.exe 3040 Larghe.exe.com 1660 fuk.exe 1660 fuk.exe 1660 fuk.exe 2648 SmartClock.exe 2648 SmartClock.exe 2648 SmartClock.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" vts.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 iplogger.org 9 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\foler\olader\acppage.dll 7cb7086237327a68a89f9ffebbe5a228.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll 7cb7086237327a68a89f9ffebbe5a228.exe File created C:\Program Files (x86)\foler\olader\acledit.dll 7cb7086237327a68a89f9ffebbe5a228.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Larghe.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Larghe.exe.com -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2528 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2648 SmartClock.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3040 Larghe.exe.com 3040 Larghe.exe.com 3040 Larghe.exe.com 2936 Larghe.exe.com 2936 Larghe.exe.com 2936 Larghe.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3040 Larghe.exe.com 3040 Larghe.exe.com 3040 Larghe.exe.com 2936 Larghe.exe.com 2936 Larghe.exe.com 2936 Larghe.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2216 2288 7cb7086237327a68a89f9ffebbe5a228.exe 28 PID 2288 wrote to memory of 2216 2288 7cb7086237327a68a89f9ffebbe5a228.exe 28 PID 2288 wrote to memory of 2216 2288 7cb7086237327a68a89f9ffebbe5a228.exe 28 PID 2288 wrote to memory of 2216 2288 7cb7086237327a68a89f9ffebbe5a228.exe 28 PID 2288 wrote to memory of 2216 2288 7cb7086237327a68a89f9ffebbe5a228.exe 28 PID 2288 wrote to memory of 2216 2288 7cb7086237327a68a89f9ffebbe5a228.exe 28 PID 2288 wrote to memory of 2216 2288 7cb7086237327a68a89f9ffebbe5a228.exe 28 PID 2288 wrote to memory of 1660 2288 7cb7086237327a68a89f9ffebbe5a228.exe 29 PID 2288 wrote to memory of 1660 2288 7cb7086237327a68a89f9ffebbe5a228.exe 29 PID 2288 wrote to memory of 1660 2288 7cb7086237327a68a89f9ffebbe5a228.exe 29 PID 2288 wrote to memory of 1660 2288 7cb7086237327a68a89f9ffebbe5a228.exe 29 PID 2288 wrote to memory of 1660 2288 7cb7086237327a68a89f9ffebbe5a228.exe 29 PID 2288 wrote to memory of 1660 2288 7cb7086237327a68a89f9ffebbe5a228.exe 29 PID 2288 wrote to memory of 1660 2288 7cb7086237327a68a89f9ffebbe5a228.exe 29 PID 2216 wrote to memory of 2760 2216 vts.exe 30 PID 2216 wrote to memory of 2760 2216 vts.exe 30 PID 2216 wrote to memory of 2760 2216 vts.exe 30 PID 2216 wrote to memory of 2760 2216 vts.exe 30 PID 2216 wrote to memory of 2760 2216 vts.exe 30 PID 2216 wrote to memory of 2760 2216 vts.exe 30 PID 2216 wrote to memory of 2760 2216 vts.exe 30 PID 2216 wrote to memory of 2732 2216 vts.exe 32 PID 2216 wrote to memory of 2732 2216 vts.exe 32 PID 2216 wrote to memory of 2732 2216 vts.exe 32 PID 2216 wrote to memory of 2732 2216 vts.exe 32 PID 2216 wrote to memory of 2732 2216 vts.exe 32 PID 2216 wrote to memory of 2732 2216 vts.exe 32 PID 2216 wrote to memory of 2732 2216 vts.exe 32 PID 2732 wrote to memory of 3044 2732 cmd.exe 34 PID 2732 wrote to memory of 3044 2732 cmd.exe 34 PID 2732 wrote to memory of 3044 2732 cmd.exe 34 PID 2732 wrote to memory of 3044 2732 cmd.exe 34 PID 2732 wrote to memory of 3044 2732 cmd.exe 34 PID 2732 wrote to memory of 3044 2732 cmd.exe 34 PID 2732 wrote to memory of 3044 2732 cmd.exe 34 PID 3044 wrote to memory of 2864 3044 cmd.exe 33 PID 3044 wrote to memory of 2864 3044 cmd.exe 33 PID 3044 wrote to memory of 2864 3044 cmd.exe 33 PID 3044 wrote to memory of 2864 3044 cmd.exe 33 PID 3044 wrote to memory of 2864 3044 cmd.exe 33 PID 3044 wrote to memory of 2864 3044 cmd.exe 33 PID 3044 wrote to memory of 2864 3044 cmd.exe 33 PID 3044 wrote to memory of 3040 3044 cmd.exe 37 PID 3044 wrote to memory of 3040 3044 cmd.exe 37 PID 3044 wrote to memory of 3040 3044 cmd.exe 37 PID 3044 wrote to memory of 3040 3044 cmd.exe 37 PID 3044 wrote to memory of 3040 3044 cmd.exe 37 PID 3044 wrote to memory of 3040 3044 cmd.exe 37 PID 3044 wrote to memory of 3040 3044 cmd.exe 37 PID 3044 wrote to memory of 2528 3044 cmd.exe 36 PID 3044 wrote to memory of 2528 3044 cmd.exe 36 PID 3044 wrote to memory of 2528 3044 cmd.exe 36 PID 3044 wrote to memory of 2528 3044 cmd.exe 36 PID 3044 wrote to memory of 2528 3044 cmd.exe 36 PID 3044 wrote to memory of 2528 3044 cmd.exe 36 PID 3044 wrote to memory of 2528 3044 cmd.exe 36 PID 3040 wrote to memory of 2936 3040 Larghe.exe.com 35 PID 3040 wrote to memory of 2936 3040 Larghe.exe.com 35 PID 3040 wrote to memory of 2936 3040 Larghe.exe.com 35 PID 3040 wrote to memory of 2936 3040 Larghe.exe.com 35 PID 3040 wrote to memory of 2936 3040 Larghe.exe.com 35 PID 3040 wrote to memory of 2936 3040 Larghe.exe.com 35 PID 3040 wrote to memory of 2936 3040 Larghe.exe.com 35 PID 1660 wrote to memory of 2648 1660 fuk.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cb7086237327a68a89f9ffebbe5a228.exe"C:\Users\Admin\AppData\Local\Temp\7cb7086237327a68a89f9ffebbe5a228.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\yankee\vts.exe"C:\Users\Admin\AppData\Local\Temp\yankee\vts.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe3⤵PID:2760
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Parve.vss3⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\PING.EXEping SFVRQGEO -n 305⤵
- Runs ping.exe
PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Larghe.exe.comLarghe.exe.com V5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\yankee\fuk.exe"C:\Users\Admin\AppData\Local\Temp\yankee\fuk.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
PID:2648
-
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^LMdJCxRSRoddjdlTxyoqClWafTdkkbEWYdXeiJSojeIIDRNHLutVIRNBQXzJtFGzDxaWziMKjZNmBhOnyJAyaIhuCcjpdprGvgtpm$" Puramente.vss1⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Larghe.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Larghe.exe.com V1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2936 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ajnccmopfit.vbs"2⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:1548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51210772421f5bfdfae770749d1e6d457
SHA16bf7da5d4b6ca9472b6315764fd20ecc160c7ff9
SHA256cc5604e30c541a9cbd8162d005cf1b0c174efd318700110f02f4dd985a388694
SHA512a67bdb271dc63590bce013d96654d93f87fa9e036f61322b7b8c96bdba990b21e541e866410c6ef0a936a07ed6689dc84d4f2a243bf9d3cfb8c743ae6efa5c4b
-
Filesize
313B
MD5bee55e52500f967c3d9402e05dd57f65
SHA1d8dc65ec97c6288e1fd10b8c4f8502e5a8a5bbf6
SHA256b90eae4b05d321efc4519963349c1775dcea8e3b0ae53b50285545380b6539c0
SHA512b8624a934fb74760f5b231ca97e89074b227ad9fe3bb08b01a81cf35760f06b346f395cf6683df5881dc429ae77af0d0a07cfeb9c9ec127e4e917191bf8c91da
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
223KB
MD512a330c34e1bda7aa421d72dd2656d5e
SHA123fb018c0eeade43e3fb322251887b0063d785ed
SHA256d290788c24980937079a4125c383014574254c33ddf210c7ebf8e8ca45851dc1
SHA512c749654169becc4945bbacdd2ea13c5c59b7cb619882a9ab3bbe9fe0a9a22e3ed97e22ba3c3cc8fab4d5d948c69f967c346e2f9c62628eec66e6a65763e4e222
-
Filesize
202KB
MD5c58265791b1600e7526c2ed37caf250e
SHA15b03100acf879994d2e72ebe1e09150aa353dd26
SHA256893a89ef4270229685a3d1eab888044ae706fcf1b93d6e37b09fda3ff1eb6efd
SHA51231e96bae07eabf8c006a3be594c3ec058f776009aef9752d67299245f3d3ad3c9a82cee8c353c970702f3a12e7bbd0f12801b3a58745c13c42464e222cf09b27
-
Filesize
195KB
MD59a34aab1230b55ad1f6129a7d805c2ac
SHA1e358e526a5a4ffd9ed7e5f21e00bc8f2b4b54b6d
SHA2560a211ace20797833465699112574c32f3ed8244c28c31a37028d278febe7b36d
SHA51228a352ca982a472403323428cde11b8d9fa6094987c213c404d4c7b6ade67f8b8d653871f4af69069800e9dfd569b957fa10705b809c2f30d4c84ab0c395911c
-
Filesize
491B
MD56193206b845ad943cc6711d8fc9a4a96
SHA1f04440a3e4596312a9090450aed7bf1c1dfec347
SHA2568a8e1bb6d656364da887d31555ca97a5173c71c8bd18a317f2ac8c4eac094079
SHA512371523630141d273b575d87ade03829c1a08a2d17d44a8a5b8a4313ccd71d26ba8badd524bbbe59d9d4dd474355f2e70aa40b204f79053ba8802418f0c600f81
-
Filesize
201KB
MD52bc7247bc58bfd7e8f82f39f6770ac0b
SHA169524905cfacb03a842d99bc8db24175bc27f470
SHA2566942c8cbdd27704c5fa96965c95614bca0ff1802cfb92971a83947eb2593be0d
SHA512fa54464cdb3aeb5a40249a572b21605d722d534b05a80c0ac23605439d54880ad212e6365defc9695e7faf60250abe9ef5ac069c0b176b6ea64171e8e88e04fa
-
Filesize
226KB
MD5816aa27032848f367aed6c9d2f460612
SHA1fc60bee64990bbe486b2145ff14eda54c75f378d
SHA256fb8fd9c123d4f5ffb4778350bbfd9aeb00773c57abd5135a081718c3a3cc9017
SHA5129f99df08ec715ff78e833adf04ab0beba8ac966293359d729f6cb9b9da385b6c35a8a2869094f794c0b30b9978929aa1c603fb68c00bf338e8f10556280bedb4
-
Filesize
168KB
MD5002efbf6fee261b5869e70ca674e1a4f
SHA1b9f2a9d0f0da6d61edd0f10c35d3faa837684141
SHA256a35b7ab3731059780f781843e10e10f884410cc4da397daa8788fc049ad3da75
SHA5124d6762ff6c2e9d886f2fd021480afe843d1c448d44783593447e5d87667e93d830bfedde78cc22dca9248fe84ee47c841b01c7a6c9c22d874f28d0e5fda3e628
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
142B
MD5bd6efe57becd19949b4cc4c8ac156c7d
SHA11594757ef60cb6553cf8e14f9562e9d2f066246c
SHA2563bdfa7071cda9ce39a635febe85ea23e8f2442a154e72ab264704209ffb68eee
SHA5124db90ae5395ffdfb6fcd29eb2c3d6dfc1265ee40605a62869cfbf3e51b79ae69b6a9021565c2986242be0a0e8935d530eb712585c2ed85f8103181edaf010af4
-
Filesize
218KB
MD57720971ea4782428345eae074826042f
SHA18d969d356796515404af0de6f7e5d1f6ca14e6f0
SHA256808e03a1e50168f509c6548654998e1c65485dfefaadd087e5660d42a43ae3f9
SHA51220353434e1c2f25bf6c6a321f3f266671ada3622818c0c75f6a7f8c428abb26ab6932f51c0398dc4e7958dea1dca17d0503a0dedbaeec98ad08401e1dfeda39e
-
Filesize
218KB
MD58284aa67338fa1778e410577eac1f8c0
SHA1c7760abeba4402dce940500588bba2e570c140d3
SHA256115be02e611cef1e2de3b91da2275db2f8863f67187b747409efeb6ca50c963a
SHA512ff8ce870d6a8c60b5d973bc8efdd4fa5ed8b64864c8cd536e637947282ceed43dd94deb86a9e660d59889873436aa72400586f9ff4d5e4527db8a11bb24e7b6d
-
Filesize
201KB
MD5cb8ac4eab7500aa412ed85e25d0a2957
SHA160e4374c8049ccebc821c405dcaa5a3518c594e8
SHA256a368193d58ba1da8d6695a7ca809ebe99d86398369c998f74ef731533d0caa27
SHA512ba0f394cabd48ddbfd33d5b71bb548aab472149ebc50e11eaa463c24475832d7527a889782c7daa26999a32d5776ab85e44c8a3e2e5df2cc628e8a569363264b
-
Filesize
312KB
MD510aa59417e4fb1e477dfc149e0760fb8
SHA1b9b5606e1807833fd871ff848e976c6c0ef9bbdb
SHA25652d3e917e71e8dffe0d86d8d11b5564310fa321ffdf4a3d637d2a4e0971411d4
SHA512575182de19d906452f25d424153affd227ff979035529a291daa2a75106dc5a392d348a0903fe857b29461066605cf7a8c03be121194eb6aacd030ff8d9d4870
-
Filesize
254KB
MD51f89b5d996f631bb7421e963809d5c4f
SHA1dd653bc6fa23ffcdce29f8702862f222720d4f2e
SHA256d6ac27f5e932c128e602fb3ed4a52b17114bc668560668f15356e6d3817aa3e9
SHA5120dafa17144e98c7aa4168ab162ed7aabcf4e352f867813a9a2a1963b3ee9838082a9f16824715ae2d154363b1e275dcd24ae429155ce2946128a52cf21570741
-
Filesize
146KB
MD5f0d181ffc2949f0de8d739293f36c151
SHA15eb36a82b94213441cb8a470e8fac86548415bc0
SHA25683f41709aff92a1a73c8e30cd3a4d4788ee23b9a8dd04fdf7be89ed07ae1f9f9
SHA51271974bf53dd1de043978c22b178ad9a48791c965a313fbaf7fa01c645e648d0a21e6e740b43a8f7869362cffb5df5296920f0d10864c420c6345759447cf6145
-
Filesize
183KB
MD5d9f53e40b80f069d2c4f7f35a289d4ac
SHA14e4d33f6cd187b4736d82eadffaa2fdd70ee969c
SHA2566320d12662a44d395b506b075b73d2567f09ac76a58da8011f2e412588cb3b8e
SHA5128b96d95ca4971991b75aa1943b6fa18288fad13d27a18c718bc42da27c6a0bd48d72792348a114df31fd224ebf25effcb499eec4c261131d988ca54fb81ab7e2
-
Filesize
231KB
MD58f22d016e9a3c45bf6ccfcb3fe2cdb59
SHA164e8379d7406a253b0dff0c3131e8594c1212873
SHA2566760b7f06e48c212a5411a71ccd716a6c8f326b9553f6966dcd0b509d44a69f6
SHA512e5b9a9c0113afb093befe3877214c6b2b8af754ab6620b1568648025de6766007f1edbc5f2681205a2720c3b82a5e6259251fbc564fe0eaae9a6702e63e23473
-
Filesize
210KB
MD547645b9eb9689424748f8830393c7c73
SHA1058cdc08ca26d9647004387ffa29d0941b0c21c7
SHA2565080490a613132ff11b247b74e3abf212f7736070981996977a0e2131a67d195
SHA51207190abf60d654f22633ae34ae86f5dc4db8c2c18498fb03b90158903f44e60771a6a3a0c8e81868d3c4b97b017da6225b7263b8b2b5a1ea82554870d46e1353
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
293KB
MD50d402ae3e5375e6739fa65b4a4377f24
SHA16abc996afa8029d3b5bfaf80c069f3bb2ca81d72
SHA25689fcd83262aec6cd43b741256908d2b8c946bf16dee134b6d9a1efa90a466a8e
SHA512ed248fd37e40c70d68364fa45dc2ca498d6c13757b10692ca5a63b53f162d8028b1d07c8cd4acc661e1684e4196f1f9ebb0bb588b286703be53206afa996e70d
-
Filesize
228KB
MD51fff5bb63c13315bfd337c6e2f942977
SHA1e5e3c9f64efb213cc8839514e579e0db5f5e4597
SHA256c4c25be960743c5eed72a7464aa36a34ac8d3d2b2e601b4d567cae06d5e31978
SHA512e10b6d26d7fba73ba5e6cffdc36efbcd9ce60018caa0aad6fffab964ad8cd3f1ebe203f4e5b59c7093c1a1e2866c6dc53133587d66d34fdcb4e6fca9cb1a42ab
-
Filesize
295KB
MD575ea00138e7b6d0c9a518c975068ec43
SHA11a5505b10dda0b54f69e54afa6c86ccef3a26d54
SHA256dba8d246dde96cb992ef6b6ff482e9ef047b8f7f2233b0a4a037fc3d50df2edb
SHA512ec5a6fe268ec0c6bd0921bbdf638ce827ebc87128701a6ad6f33a038173318a3695a1ec9189a100969e14628b7313efc5c14abf0937a8a6fef74ab72cb6b3a85
-
Filesize
246KB
MD5f7cfa7712885ff65367c2a4ec744bf3d
SHA1c569372a23e9b6d61d82d1fe7077a717d2687291
SHA256427eecefa67402ae59af4c96c752c1de82a6a8d80da8d9d691f7ee9cac60c07f
SHA5129d0083e4fcbde31ba8d8fd6b0c0cf3c467572d1aa2cc081654d8d155be0bb085a1a9bb1564d954da27039d4d8d00f108489f6ec080ce749778d907b0c696c41b
-
Filesize
864KB
MD5022aa64e8f3de338f9485c74cf6ab27c
SHA10fe8829932564c34097094164c618cdd6d3a8619
SHA25602dc05cf4c8b452e752933368e5513e4eb2ed1851c67f211aab42b45036bed5a
SHA51265c2c2fa96c14cffd5833d2ac9f3c361cc5a3a9f7b0cac10fc6c93d525306ccd86483248ef6176e5aa5cab7ff9862d84f189acb836e254d4e9ae492376e81645
-
Filesize
282KB
MD506aa5912130db947c5d62ca3c1691859
SHA1e3fd3ac91b9d9ad77fa8706314f6c891916b8329
SHA25656f5a9675a6a10404d28428ec4d3930861398b4c9bc9f0bebc8a3061f12a4a58
SHA512baf34172e289ca81e04c1689eb5c12cbc67a2ed83e8393a32575ba1e2b7eec4bf293490bbd8a24f76b412863085bc3850308a0df166ae84d6147ba813f083db4
-
Filesize
219KB
MD5c2dd0639205b035715e939998c469232
SHA191be4f7eb2657a6a80611807254eb50e3e416205
SHA256a88aa7828e90e91917425d898ff130df0fa1d93db4c5852e0820dc4c8ef0ea5e
SHA5129505cb557c2855111f71870b175a5fc6609f669e3959e6ee4ca57a4b80479d8d3615a3b3656e9d988d1b87146d3e5f1faef31cf877eba4b7ac69eeff5d1056ed
-
Filesize
136KB
MD54927f363c591599f7da947ceb498e06b
SHA18ce32de1dc28dc8cb6734afcbe9e2543cb7d28cf
SHA2561a2bfcd6278aadc4e263315dba77cb5e91226886a0d2ac22ed36a15e98ad05af
SHA51258429aa96ca2e8e1fded23f5bd181102103bd9a4566b885bcc82ec9c1226caaeeff794d81ffd00359f5f39f2b160a62445317a99cd99748a1e29fa3184af70c0
-
Filesize
131KB
MD56dd83281ce047af5a3be51acb5bf2880
SHA19fb2c3aab4a77a569dd6ef9b3067293b8ce1f2fc
SHA256b6432155027cf1fd0352d009d91a083b33715e546460ac79ac722cd06e3de06b
SHA51286abde9780dd011dc8961ad8616ac1c9dbe921b03de35f4d800d351328c2b42ea0eab026cdad7e142c90ea69aa0b34bdbb8213a7f33bd3fccc5aa4169963535e
-
Filesize
230KB
MD5c85918a1a3df3f0b66a30104831b32a8
SHA1cba889e6167f265b69637c42941d72c7dc0dd6a6
SHA25601f2b943f2c11891ef737e1d3c047c736d3b2c7f70d54079ee26d0197c5dcb5f
SHA5125d5f1c8a386da4930e03e2508501814aecc5f6697166b75f088147056af286b8e4bf6dbdeae675d6cb8a1e673eb820b62a9117e97269593ed4136af1d2c2483e
-
Filesize
113KB
MD5bf41db692b7e2c10974dda3b606daa87
SHA1404d563b1e2fcb0a22e80c1583df03e89fd08474
SHA2569ac40d5128bc12b6f58f3a80a34ccd5dfe5af1cd8b4dc49180f07e94f31a6693
SHA512581b528dcade97ee89029cbe96d54b8e48cfe8ab52bba9267336e10a13d1280a9e2bb9cbfb67e8a52eeb2ac78f46a7f3ce9d81430cfdad0d27d5d7f4a650253b
-
Filesize
117KB
MD56a6526da84ab2df3cbe559f299cb276b
SHA1ae69748e8ce3d922768ce187f0fb931608bea5f7
SHA2562ea64ea00cd776a1466b0e2b22d99acda2325bd7ab8fe29e758232960d044ea2
SHA5128293b69983bf08867e7a1f943e402dadaa59149110133c8e8b42d008a8d58b76a3dfaccf2360d20426bca6d7ceabc5db9db013a7d529e50ad001b67e4474a2ab
-
Filesize
109KB
MD5da6f6ab12ee3c307329877859d799e1e
SHA155e3a1a26a728a05f47f83464f9e675718e553cd
SHA256e9dac256a6cfaf9d985b54b23d768b3a9c3dfed7cf08a7102ceaaf2e93bc2071
SHA512b2009bb682be05c0371b54c08b2e1ee4e827f010736cee2e83ccffa546906dacf2b7eeae68d6d2654cf84e62726428a516af69ea3260a23bf76b26d47ce47870