Overview
overview
8Static
static
37e68febfb5...2f.exe
windows7-x64
87e68febfb5...2f.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...it.dll
windows7-x64
1$PROGRAMFI...it.dll
windows10-2004-x64
1$PROGRAMFI...ge.dll
windows7-x64
1$PROGRAMFI...ge.dll
windows10-2004-x64
1$PROGRAMFI...er.dll
windows7-x64
1$PROGRAMFI...er.dll
windows10-2004-x64
14.exe
windows7-x64
74.exe
windows10-2004-x64
7vpn.exe
windows7-x64
8vpn.exe
windows10-2004-x64
8Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
7e68febfb5892c836dc420c3dc235b2f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e68febfb5892c836dc420c3dc235b2f.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
4.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
4.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
vpn.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
vpn.exe
Resource
win10v2004-20231222-en
General
-
Target
7e68febfb5892c836dc420c3dc235b2f.exe
-
Size
1.2MB
-
MD5
7e68febfb5892c836dc420c3dc235b2f
-
SHA1
054c50db77127f96c360d31bf742e0a775ab040c
-
SHA256
45a4308587c7d273c9b0aea890356e4693f8a6d79ca1257aef38670cd02210f6
-
SHA512
17b852af293bc805170dd8213c9394266c64ad80f790606f5a2694f11d8e55e05fb917ba40bf7c75a9c2d46204262b5abd58a254686b2c0e8c5d0cc3acb88ca2
-
SSDEEP
24576:HGfuW1Z9o8+IlZ3N8fqBua5wx7K2KhTPhFerC1rLuSUPmKuykFcMYF25idVuMq:m2W1ZH+IbeqBr5wBViFFe2rLuSUPm/pn
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 9 2348 WScript.exe 11 2348 WScript.exe 13 2348 WScript.exe 15 2348 WScript.exe 17 2348 WScript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4.exe -
Executes dropped EXE 5 IoCs
pid Process 2708 vpn.exe 2848 4.exe 2600 Mettermi.exe.com 2044 Mettermi.exe.com 2924 SmartClock.exe -
Loads dropped DLL 17 IoCs
pid Process 2168 7e68febfb5892c836dc420c3dc235b2f.exe 2168 7e68febfb5892c836dc420c3dc235b2f.exe 2168 7e68febfb5892c836dc420c3dc235b2f.exe 2168 7e68febfb5892c836dc420c3dc235b2f.exe 2708 vpn.exe 2708 vpn.exe 2848 4.exe 2848 4.exe 2848 4.exe 2884 cmd.exe 2600 Mettermi.exe.com 2848 4.exe 2848 4.exe 2848 4.exe 2924 SmartClock.exe 2924 SmartClock.exe 2924 SmartClock.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" vpn.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 iplogger.org 9 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\foler\olader\acppage.dll 7e68febfb5892c836dc420c3dc235b2f.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll 7e68febfb5892c836dc420c3dc235b2f.exe File created C:\Program Files (x86)\foler\olader\acledit.dll 7e68febfb5892c836dc420c3dc235b2f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Mettermi.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Mettermi.exe.com -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2652 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2924 SmartClock.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2708 2168 7e68febfb5892c836dc420c3dc235b2f.exe 28 PID 2168 wrote to memory of 2708 2168 7e68febfb5892c836dc420c3dc235b2f.exe 28 PID 2168 wrote to memory of 2708 2168 7e68febfb5892c836dc420c3dc235b2f.exe 28 PID 2168 wrote to memory of 2708 2168 7e68febfb5892c836dc420c3dc235b2f.exe 28 PID 2168 wrote to memory of 2708 2168 7e68febfb5892c836dc420c3dc235b2f.exe 28 PID 2168 wrote to memory of 2708 2168 7e68febfb5892c836dc420c3dc235b2f.exe 28 PID 2168 wrote to memory of 2708 2168 7e68febfb5892c836dc420c3dc235b2f.exe 28 PID 2168 wrote to memory of 2848 2168 7e68febfb5892c836dc420c3dc235b2f.exe 31 PID 2168 wrote to memory of 2848 2168 7e68febfb5892c836dc420c3dc235b2f.exe 31 PID 2168 wrote to memory of 2848 2168 7e68febfb5892c836dc420c3dc235b2f.exe 31 PID 2168 wrote to memory of 2848 2168 7e68febfb5892c836dc420c3dc235b2f.exe 31 PID 2168 wrote to memory of 2848 2168 7e68febfb5892c836dc420c3dc235b2f.exe 31 PID 2168 wrote to memory of 2848 2168 7e68febfb5892c836dc420c3dc235b2f.exe 31 PID 2168 wrote to memory of 2848 2168 7e68febfb5892c836dc420c3dc235b2f.exe 31 PID 2708 wrote to memory of 2616 2708 vpn.exe 29 PID 2708 wrote to memory of 2616 2708 vpn.exe 29 PID 2708 wrote to memory of 2616 2708 vpn.exe 29 PID 2708 wrote to memory of 2616 2708 vpn.exe 29 PID 2708 wrote to memory of 2616 2708 vpn.exe 29 PID 2708 wrote to memory of 2616 2708 vpn.exe 29 PID 2708 wrote to memory of 2616 2708 vpn.exe 29 PID 2708 wrote to memory of 2604 2708 vpn.exe 33 PID 2708 wrote to memory of 2604 2708 vpn.exe 33 PID 2708 wrote to memory of 2604 2708 vpn.exe 33 PID 2708 wrote to memory of 2604 2708 vpn.exe 33 PID 2708 wrote to memory of 2604 2708 vpn.exe 33 PID 2708 wrote to memory of 2604 2708 vpn.exe 33 PID 2708 wrote to memory of 2604 2708 vpn.exe 33 PID 2604 wrote to memory of 2884 2604 cmd.exe 35 PID 2604 wrote to memory of 2884 2604 cmd.exe 35 PID 2604 wrote to memory of 2884 2604 cmd.exe 35 PID 2604 wrote to memory of 2884 2604 cmd.exe 35 PID 2604 wrote to memory of 2884 2604 cmd.exe 35 PID 2604 wrote to memory of 2884 2604 cmd.exe 35 PID 2604 wrote to memory of 2884 2604 cmd.exe 35 PID 2884 wrote to memory of 812 2884 cmd.exe 34 PID 2884 wrote to memory of 812 2884 cmd.exe 34 PID 2884 wrote to memory of 812 2884 cmd.exe 34 PID 2884 wrote to memory of 812 2884 cmd.exe 34 PID 2884 wrote to memory of 812 2884 cmd.exe 34 PID 2884 wrote to memory of 812 2884 cmd.exe 34 PID 2884 wrote to memory of 812 2884 cmd.exe 34 PID 2884 wrote to memory of 2600 2884 cmd.exe 37 PID 2884 wrote to memory of 2600 2884 cmd.exe 37 PID 2884 wrote to memory of 2600 2884 cmd.exe 37 PID 2884 wrote to memory of 2600 2884 cmd.exe 37 PID 2884 wrote to memory of 2600 2884 cmd.exe 37 PID 2884 wrote to memory of 2600 2884 cmd.exe 37 PID 2884 wrote to memory of 2600 2884 cmd.exe 37 PID 2884 wrote to memory of 2652 2884 cmd.exe 36 PID 2884 wrote to memory of 2652 2884 cmd.exe 36 PID 2884 wrote to memory of 2652 2884 cmd.exe 36 PID 2884 wrote to memory of 2652 2884 cmd.exe 36 PID 2884 wrote to memory of 2652 2884 cmd.exe 36 PID 2884 wrote to memory of 2652 2884 cmd.exe 36 PID 2884 wrote to memory of 2652 2884 cmd.exe 36 PID 2600 wrote to memory of 2044 2600 Mettermi.exe.com 38 PID 2600 wrote to memory of 2044 2600 Mettermi.exe.com 38 PID 2600 wrote to memory of 2044 2600 Mettermi.exe.com 38 PID 2600 wrote to memory of 2044 2600 Mettermi.exe.com 38 PID 2600 wrote to memory of 2044 2600 Mettermi.exe.com 38 PID 2600 wrote to memory of 2044 2600 Mettermi.exe.com 38 PID 2600 wrote to memory of 2044 2600 Mettermi.exe.com 38 PID 2848 wrote to memory of 2924 2848 4.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e68febfb5892c836dc420c3dc235b2f.exe"C:\Users\Admin\AppData\Local\Temp\7e68febfb5892c836dc420c3dc235b2f.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd /c vQGBA3⤵PID:2616
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Ricuperato.wp53⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 305⤵
- Runs ping.exe
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mettermi.exe.comMettermi.exe.com H5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mettermi.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mettermi.exe.com H6⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2044 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fbsyxrh.vbs"7⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:2348
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
PID:2924
-
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^EnhDnNjlXrURXGTHBGcErTQGpvzbczMcOtOaPLgHqaCqUVAjimpGqkiKHHzezPPDdmeTSASQsNELsQLgVifVpyxCXrKia$" Cresciuto.wp51⤵PID:812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572813fad3d12f25fdd6da8d87b942bd1
SHA16caecadd89482877d100def15bf80080eba997d9
SHA2569536d1b81e688db027113f02887f960b9e3205f03efe581a925099dffc5d938c
SHA512858a55b49eef1b8af8e78f45daf075c2c0c700045d94b95369cd0cb8ecce7f8c47b5bbb3b272c762188e68da654c48018b0faf5cd50757af4d4d10e22617a58d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
313B
MD5bee55e52500f967c3d9402e05dd57f65
SHA1d8dc65ec97c6288e1fd10b8c4f8502e5a8a5bbf6
SHA256b90eae4b05d321efc4519963349c1775dcea8e3b0ae53b50285545380b6539c0
SHA512b8624a934fb74760f5b231ca97e89074b227ad9fe3bb08b01a81cf35760f06b346f395cf6683df5881dc429ae77af0d0a07cfeb9c9ec127e4e917191bf8c91da
-
Filesize
328KB
MD581670541b0dc2d0fa304eb9eed42eef2
SHA1069d56f6a4c44b87e0f91e635c27e903705b1dc7
SHA256d3dbc847bb3226b6887de7fb9ce51d820343835cbf7f3d3521d34ed9a28687fd
SHA512e64cc6eed7d91444d102f23e6d8286912bac9461491be3f6d8ebddd136f8b9ae8c5a0567536ac569cf12c2d644c8a90a150f1b768cbb3b0446a0155f3a9fc142
-
Filesize
249KB
MD58cc713fa4cfcd0dda583659fe03c289c
SHA1f56cf02f49872ac54e42c03a155e96b7b19fc5ff
SHA256616bb8ec38fef8c31719528c6f839151e7a7177365216e78303127aa87e0aaef
SHA512be46c5f6c37792ff7b7df52aa369f9355ed16db0971194172c1c1b5faf5939a57de9ee048dfe35b5c36a4fe36b46c01a7fe804d8e799d840554490cf7755f088
-
Filesize
208KB
MD5334318b85d599a5ee750663d29b28ecb
SHA189df2e5681ebb362eaea3c34ff8925f9dd065fba
SHA2565c2a524189490c2d083302fd6f722fa86bd9266dc7bfa724a5d1855a12f8d630
SHA5124b4736b384b76f3c89b3ed006b59b40dc88494727d4734de17d674f063d10d2020a3ae031026e0a738cda11570f59531ea89b0c592439708fd85d613ba6b5f34
-
Filesize
245KB
MD5b6065bba435d52b84a9d3113bf149505
SHA1b6a521e620a0f15e1b6e7dc5a1f5bbdaced272c8
SHA256a263987967ddb87f9e4266df313c9ebe232d385ba72ae09e0edc82298d5c62c7
SHA512c3171b4c6f5227c1086df3a8fdcd44c2352f4185d53ab8de43183c1f8e9f4ef27f47ed7e1d15fc3f9acd8d3687e604a28506d2a7c07f5d291f3c1565bafac4cd
-
Filesize
207KB
MD54c9d7bd87a46e9ce99acfbf728e54769
SHA146dd81796244fddef9cfc2824db88fc42a09e707
SHA256f43b42c0dd4d38422babe22c110f38209f36bc79e1c36a40794943545f19e19c
SHA51259d3f250de83d8757deeb7a5640d83e36d42dee6824d62add18580043bc91df0bc188d4c6e8feadacbaab0fb0ea6caf5a7de6a7d074fb48e8576476fe35727c2
-
Filesize
277KB
MD55a71dddd667a4d039553ae8f7ad95cb7
SHA1b6b10b2b211a49d3278a423c52f0e1cc7a8c94bd
SHA256fbd477e44649ba4c05a6edc9519862d5fbf0b8dc837ba6745cff85644f94a977
SHA51236abd03e1cdc5d61c019f3e3baceca9a76cfb2b3ca35669437fe0434616233fb2e8d119a16bed4dd4136a8cd650f4396a2892983eb3665b6e93c43f88788d49f
-
Filesize
139KB
MD5fa1fc0b0f0c7fdb07fb95e8049f23bcb
SHA1b5b68cdbcd20eebd2381b6e7877381c25837d4d3
SHA2562b85de4a05f952148b32559ccc8421d1a8d961881fd8cf02cfb3880f86774418
SHA512ac930549a7a17c4189d8b036fd31c3f150443cff7c67c13ce7b02dce3bc19d89a238d5baa6a8c703e1146991e76751d0c81b3c30fb37b0c639735d03fff380e1
-
Filesize
453B
MD5b76512e39b5dd555e126412b7a5d19d3
SHA1fd40c9251b63d06012694d6e5d172f9333081ddc
SHA25661b4fb06ad59ca9e6e5c9e9e7028f14d2c503fb931db731b6892d5a7b1db78fb
SHA512b23c3999e40b5eec5e6f5e317962c91f02f32d011e41e7498261d27888a1db175deb19086fb570b9c73e58dd86af5667f0ce13f4bead8bf54b50600267ab275a
-
Filesize
96KB
MD5bc1c6e98e722ef7d47e726d647b6ae74
SHA137cf0f82689623a78839ec5fd9ae33aa006b66ad
SHA2561da71ba9a33a714033e378090e6390bb3828c96ca019b0a4908172ad7857b9c0
SHA5128dcbd42b37aca55208dd772b193848ef35570ba7ab6fb906f890b9cb09827ff48fae2f211b6af8847b8af037a8884563aa37b0ed0c107c0eedc42d26b58f87d9
-
Filesize
175KB
MD59afbe5863b64a8b5c77fa63d8302894f
SHA13f8cf809d34c8d17fe9adca989d21cd46004ea58
SHA25676e6c99aed1ce82a5bde168f6a07d178e27dbc56e957e4fdb2043b4f80ade185
SHA51209c3e5d4ef19c53070509a919871e51c0e39c6c2cd815a8c86888aaece94bcafc629ae6e3158fcc0a060eaf8a4c19db511558c4b4602095b42c11bbe4ff82290
-
Filesize
102KB
MD5a409b878b3b2afc2bd1b53bb56bf1a47
SHA1deb8af8a03660e2886802041d34673d4f505725c
SHA256190cef5556c23d7158903f7d80e593bb72397e5785dc82681cfc9ffa58a0e482
SHA51274b8c34cf53773b8270e0a07aaf406af71bf51159224b7762ba143ce52bac1b1ec3cba26c4fc1659f40f84eed4498e842e8577077e76ff4df20ea0dd91f74c04
-
Filesize
352KB
MD597e810dba7c1907f339221155d9c119f
SHA169292a403e9e6654bdb9d693bc565fbff7bb5af1
SHA256487e037e043725f3310b31e8e039b60b1661c42f9ac3016ea09c1c0821cd8496
SHA512a375c2ff10e014643bbe7423fce539783d92327b642dbbd178b356b7ea97806afb856f46b9b98e68790e4b2855297e80c54a1057d5644e5c91b2788d29e67c08
-
Filesize
120KB
MD50eed47e33ea70eab81be85622c619679
SHA19c568ad5692b302fa2b48a1d34c612e1078c4d99
SHA256217802ea62095ebbafb573b4c263f80c92fffbc5d2274abe864c8c9c490ebbe6
SHA51257f5f96ffc941a404438e331028691fc386d839f85c2d2a274d658a464da9352fd3a381d245aaeaa625d10a5f63a48304e077bf13bea529465d7661a5483ce2b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
135B
MD56e31bbde486ee7c0f26f269b19d3a05f
SHA110ab532e454178bec0f2048f53cb8048de229bfd
SHA25608ce222cae9257bf657cceacf22d72bf2b6cf399a6b375510b73be9c0637ffd9
SHA5122df59704ad833d3c88d7034893f299a93619ebb051ebabe7da4ad60bb6c3a1c3c95311e2308562c4171572247fff527af04e794a6a8d462cd9389b15e78287d5
-
Filesize
338KB
MD52662de281b6930f387ba59c56a398af8
SHA15cbcf09dcc3f136c59b4bcde14e5dded849a1182
SHA256fd0c0ead50d9e27140cc981173b3134e8bdcbf6824aaf1cdde53f76693aacc6c
SHA5124c3b43de63737ec5764d0f85b5ac5d6e74bdc50e56ede50b079a2b13fcd9c44791967ea2a8c6784cceef9587154e82399cd28830221376443ad79f4718ca0a23
-
Filesize
188KB
MD55698efa58ccdf361a8ef5e54d0b5ba85
SHA141b551998342a8327b4fa484d7a58f43d24e6265
SHA256fdfb73845a6cd252d3e4e67c3f21bf0b77ec4ae2eb8afc23411a4bfdeee58a9f
SHA512455f966be6eeff8e938d1f566baf0470f08c2966f8f08ff4a97621649f9229e9dad8b11adc947349b0560269ecd446e87b5986bff58552b2e0dc2bab339010d7
-
Filesize
272KB
MD51c80b3d49eaa6e929c8b963bdde5f886
SHA1407bf990698e8a134498f774f26fa6576f791fbf
SHA256f496835100db6c1fce70fc130884d42fe7f0c9f18f8e843fc024d3378d1c0942
SHA51265f2614757d50aacb1df5a798343f7702cfcff1da1032460ea94e23502bb4f81e2d0e78be99cd042bbe8ae37de1b631b99fb2a856d15a9e8140cc8dfb329507f
-
Filesize
97KB
MD55f5f0d61650aac7f602fcd2eba02e07b
SHA165fc9ca0eaf80d0fc212e587cc4fe2daac17543c
SHA256816b320cc72280eb6a6c20a703fd5167add3cbc8b1a14c0189375761c47a6c4e
SHA5120dec80c8a07cb42aa50cc41bf231bf36424d6f5e13622031b549c81a8289aa0921e214c6480bccb8a40cc4a7ae3ecde8ae91ce83dd63c7bf0be28f13a13d4816
-
Filesize
155KB
MD5c10e6d673ef74882a26ae15b192bfd5a
SHA15c7acaf35d4072647791f8cbd424c484471a2108
SHA256f13aa8ad6ebc53463ae34b75f1af3142972878ca00ccb1cf4c54017d2ff69dc1
SHA5126e323abf5dec292615c1a818d91281d7e559c61b464a421238fa274b34cb64a6acc185237a95479caee109b98c3a90f0f0012169c49689c3859fa16a44a50171
-
Filesize
76KB
MD5a4f74a350168847c85c1ebd961b5c31d
SHA1038b9555e3d9cd8258ddd90ff36bbb928d7eeee4
SHA2561a9506a01d088e94690fc48d75f96a9dec9a7f67b688f6cf709362348117f30b
SHA51260d44a675fd4871c77f7af207a8859f1d900c5178ee7fadf54774905f8fafc8fe116e5f918ff514a2af845a233cd052cfadc1784bfb82584eb1127d74e501208
-
Filesize
62KB
MD5f73f9a3bf50463ed42ce2c4bc7aa9c5f
SHA1b604aaf817bb2550e3c020329c221d30fcf19e3f
SHA2562633180e02507dd6e7ed7d265fc31c057785fd6a400d175779ee1f060ae1e78c
SHA512a5d9c7d6c5f78ebc12b735a8aadcf3469b57a722b70801b5624194198b232c07d9bfaee89b258fd1d4c7d7929990a1da03d114b8a0f5c14a1047c69b2193a7bc
-
Filesize
54KB
MD5d078d905d1986ad3a866ac1e86b16ed4
SHA1e5c13c4d44274bece682708196b9d8074fd4e607
SHA2563baf8b2a3598bb5a90883a724b8a9b2103676b710d5c6c139baaaaa0bb19b786
SHA5124109c2f00ce82b64ee24b5726226d27345429c77602e2e749499660cfeeb459897b894ef13e4ac9337403d213c7731eac102199cf3bdbb028903e9044917eef3
-
Filesize
1.0MB
MD5bfd950bbabd1e5b3f57a23cd7c618788
SHA1d943e0b6d1a7366ff5747cab6a12b645b41cf64a
SHA256cf886c14de35ffa30003c15934a5d69ade52ee8632544d84bcee6a89d45d92cd
SHA5129e4365c2ef5218aa081643dec76f80dc5ee898554f77e6d5d319002f3b7664be600685962328459affdd530cfbb7c804960080b6b8f31c771215b7b8d3a3ebc2
-
Filesize
159KB
MD52952fbdffc7b9e8ce7e7a7c58b6fa770
SHA1735e46afbc06b3b7081c26251ba3b5d73925c00b
SHA2564c1caa6b8eb7409605fa9642a2808a693f36e6c53a658b14920a0d00c48efaf1
SHA512f6723bd576e517bb95e3bd3fd4b51f2f65bbba987724cbfbc7bec16a2f94ae68f866627fd482f2fa3e806d306bb6c49148dc42b1d53d5e6c9b807c6edf7b770d
-
Filesize
76KB
MD55082e41816dc6aaf60cd15a038b674fe
SHA1457f9ecaec6ce0d1f5b5e9bb72e69a4d2547fd17
SHA256d23629daae1c8f2fa303b4f5871871c45e892d803609c48b6703bade7ed87371
SHA51222ea8fa7c9385a50ce034481a6ecafa32e42c3223536637d09794e9e7430f84a989d0486fb6b56d3261e05906b7b65ae11ce51127f26f02b2ebbf5457fdde7b7
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
21KB
MD5a55f5aa58c0c92216753cbddf9c5f328
SHA123b0d74ad5f884b4956f479164b17d755174313a
SHA256af228d0a5e3e60fc72ae62b99e58a5945e80af77afa5485945a66ea2b2faedbc
SHA512592579282f4d80ba24f1e8578f206b2643cf240f937f36f13c0ab19bbef8bdb33337996b1365f73d768bd588a8f461795b01633fa132292c85070bff0f33d9ef
-
Filesize
347KB
MD5c62f196e112e10db42a7461278ebb0bb
SHA14b1c2cf08e803785d4993d994eb739b93cc9762b
SHA256303c65699df8994263b0d2f6243e09ea6ffb3c6b80dab3e075fc1957274824f5
SHA512cdb3745d04df77bd4155523945a51bb570d433a21e5a6036252a8cb41139ca148c41f187053f546ed76632ba8630d14a7e143221875b2f36e92e553590f91f5a
-
Filesize
320KB
MD5558409f934a684d629699315efda5c6c
SHA17ed2483bf95752c514cb3b30f5236c75533aaa62
SHA256eae59bd5628880880ee4e810a227d783e0b20d2a9ff776d44cf7c1e3662e49c9
SHA512d939f3c9301e0ce6c4b7f3b19cb016e5ce4c7bec2bcfe225a75c9f313143b9ba3846d898c6df1c45c8b4fa3d4969433b81bc12073ae8a8cca6e214b18b5ace3a
-
Filesize
314KB
MD5e2014a4f6c1479c78d41d17c040d21cc
SHA11c239f23d5ebfca2f546e15c3396083afce2243d
SHA256520de5bc942e54579dad4d90a257c3dc35bec93ebe25ecda77e84e929fafcc53
SHA51248879e1814f9e70c2c24dc12ebe2fd201988b67d8fa7d73ef6d233f3484160813f2734c9dbe144d199bd9596cac32710ced54fe55ac51b5668e49fc1b0e67b72
-
Filesize
262KB
MD56f42a3c559f1dc08551d28ba26bc5ef7
SHA1a30cee1891e81a1f3751d96a37498bc4d6855d83
SHA2562f71cad8fa843020ee3fa654559c0b13b1dca97d55d595c9050c17aa8464d62c
SHA512c01c4d258061e296ed656f7da5e69f9923e75372d33b8859de7ae607907d0d931f5e70c2d53cedb22fd36be4793ac4beade89a792fa26e7abeee7d1063b7413e
-
Filesize
326KB
MD5e451971d554ff4586f9dbf48a2a4effb
SHA1c4025c7d7272168802553c2dd0c71345f2567c4f
SHA256a69e5959a1257ad3c8ae56c136e422d9a13ac75aee5bdbae7d667ccc719db709
SHA512ce71c435fa8435dee29a16deb5561fc6db07556a40c949e3087f1fbaf59f7e734e01f2fbc98fbb1131c6c0c7120a100903146ce4aa7315924daa1534e8ce9cde