Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 15:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_e2b8e5253a741d930a188e974aa62821_ryuk.exe
Resource
win7-20240220-en
General
-
Target
2024-02-20_e2b8e5253a741d930a188e974aa62821_ryuk.exe
-
Size
1.1MB
-
MD5
e2b8e5253a741d930a188e974aa62821
-
SHA1
4cca486517e296b585f426db29c3f39969eafb8f
-
SHA256
1a295b650c0d9f697b881cd3ce919f6a22f5259b99ef733d7211b6d0da4681d3
-
SHA512
c5ed4819207070980b7e00169f7eec326f44e48988b45e3b5c61db62f54844720d33c0bd8ab47cab9ce305d7abb1549fed7f926ca71373f5e8a75a499db12802
-
SSDEEP
24576:ISi1SoCU5qJSr1eWPSCsP0MugC6eTpHofe3y1sInB2COzRq8DvFqtn:oS7PLjeTdP4suIRbDv6
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 3460 alg.exe 3156 DiagnosticsHub.StandardCollector.Service.exe 4996 fxssvc.exe 4576 elevation_service.exe 680 elevation_service.exe 2688 maintenanceservice.exe 1884 msdtc.exe 560 OSE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 17 IoCs
description ioc Process File opened for modification C:\Windows\system32\msiexec.exe 2024-02-20_e2b8e5253a741d930a188e974aa62821_ryuk.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\c4cdf3fbc92b1ccd.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-02-20_e2b8e5253a741d930a188e974aa62821_ryuk.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2024-02-20_e2b8e5253a741d930a188e974aa62821_ryuk.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\System32\alg.exe 2024-02-20_e2b8e5253a741d930a188e974aa62821_ryuk.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AppVClient.exe 2024-02-20_e2b8e5253a741d930a188e974aa62821_ryuk.exe File opened for modification C:\Windows\System32\msdtc.exe 2024-02-20_e2b8e5253a741d930a188e974aa62821_ryuk.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\fxssvc.exe 2024-02-20_e2b8e5253a741d930a188e974aa62821_ryuk.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe alg.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 2024-02-20_e2b8e5253a741d930a188e974aa62821_ryuk.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3156 DiagnosticsHub.StandardCollector.Service.exe 3156 DiagnosticsHub.StandardCollector.Service.exe 3156 DiagnosticsHub.StandardCollector.Service.exe 3156 DiagnosticsHub.StandardCollector.Service.exe 3156 DiagnosticsHub.StandardCollector.Service.exe 3156 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 672 Process not Found 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1608 2024-02-20_e2b8e5253a741d930a188e974aa62821_ryuk.exe Token: SeAuditPrivilege 4996 fxssvc.exe Token: SeDebugPrivilege 3460 alg.exe Token: SeDebugPrivilege 3460 alg.exe Token: SeDebugPrivilege 3460 alg.exe Token: SeDebugPrivilege 3156 DiagnosticsHub.StandardCollector.Service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-20_e2b8e5253a741d930a188e974aa62821_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-20_e2b8e5253a741d930a188e974aa62821_ryuk.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1844
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4576
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:680
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2688
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1884
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
615KB
MD55ce3afe1ead6edc4357a7ff9e44d4bc5
SHA15029d57447e53916a6bd64a6545ab50b0e366507
SHA2568844e4c785ebf36f9ae56a4743d81414b473aed44324c90220cf752198e6a80e
SHA5120ea4e139003200c6f0ab609f9ce7d0dbffd736a95a5eb7691f11c723928bcb7274732959d209f60d8430a821f41a110859ca3bbb2d7551708a72512727f56ff4
-
Filesize
781KB
MD5e75bf55591e092b2499dd9c61e0256ea
SHA11b87a748f150b2b70580d1117b6987f516a1cf38
SHA25619afde5cc086bab79b1468a52099cde11c45a08f8a37aab2dd60019a4ed1f2e4
SHA5127facd268f1570593402f4b38bfcdeb6ad9be296406f99a77c0acf6800b154fce6cace2f9b7c2c98c4da3db2de43d9c6627898e62675d7f749ab8df1593b649f8
-
Filesize
1.1MB
MD5878fd0b21faf6944cd429f558a0a6e19
SHA1a89cf94dcd17c5e08609975a14659e724f83699a
SHA2564011512c4e081f164ed2ef6074fc5beaaf86d482ad69e4142c3795647c102068
SHA5121fa2f5c1c8debd37f1c44390d613fd24e063450f0a9f5aaab6842073aebdeef64a181f5a40f5b426c022b2c807afb276b4d2e0c88d6a3bd309d588156db48d92
-
Filesize
104KB
MD557c2fcc551f6c6934b5870d849934e48
SHA1a03328d82512c5dc450c03fd7998d7b84378183d
SHA256a86e305e3c1df7bea9f0f48c3ff4e6bab93bdcacd5a15007173b27ce8b479c5a
SHA512b92acbba242cb061bc5e8691e664f3eeef8b07395088cf9854db20000d85cb0a8013d35427c87778ead2d8d91a72c1cf55f79e57bbfd0452274ef08c93396dd6
-
Filesize
1.2MB
MD585b341e4e79e66fe6b00ae1e7d51caf3
SHA1dd3e5d07519e3f401f0897682fcb8dd2b53180ee
SHA2561ef770677c765469ae53896196c912d217b4fff6072a587fea09cb19b9d27d27
SHA5123e0ecac4a06fea1d5a64d3142c6b1fd61f1b1ebc1a18160a8f2e742cb5cf3f1dfa24506249be32f6ba0940480339cf5ca0b5b684abc8a1f936a61a4e0683e25f
-
Filesize
582KB
MD554061d0d6856701578b88092f0cd610b
SHA10a8bda0a5946c7c0d487cf5311dbf4ea886853ad
SHA256730370bd271bf6e049058140ad2a640245911116eb8113add3ec8419863000d6
SHA512e71a716ff970547de14d5b2cce38d766afc46252d8a4a72cc979cfead467ca30c4f699775080bd2526070b5b893c51d4a21f57c29e8ddf9cfdfb40411eee4f93
-
Filesize
840KB
MD52f61e7342feb28ed503b3e67d00ad06d
SHA1c11a01282cee2006bc33dc32c319d35247a95021
SHA2565c2db62713e46604abcd6ff52bd9088657a3edb79954172918ea74224286d0c9
SHA51240c4a02ff0f1cdcbf292eafe04c2f930128cef81107101eb6928f346db684b13bb3e64b625b7bb9e14dbea39565244e88cc7b146a173e6c552e5bf04915c0efc
-
Filesize
1.4MB
MD50b8396352a5ca91c4cca465f5b6008a2
SHA15d93919cfffc492323c828f6cc8632696f62ff31
SHA256956c771fa54de70ba41bbcfc711c3a36c246931b28d13c7ba4acef8be9616729
SHA5124ad79f89bc3ec47f3f89008d90bed00c7152555ed70af2e8ce88e345b09d723af33a0734a642b0fe266e63251ca9632cd8dae20bbfbd4ff673c8c3d374b81d7a
-
Filesize
910KB
MD54d44f62cb599478932dad5b3158ed07e
SHA1b6deae95b8a94ce48fc2e83dd693f5ef936e849c
SHA256e7a8016350d01e562f4acd3a30c354df88c07a4b10a7e296e600048d9d76b912
SHA512f6408304b49547baa669b703ad8110334d038829f27efdc2063f2a00adf503155d998f754b05f2b8264d20641c1e57f6740660bf62acb8604f91bdc5f7e13321
-
Filesize
114KB
MD5e876600f58949bff02cc395e881f480f
SHA1052e82d34780d96b834a39e3783a74380d053b61
SHA2567224e22de24e623ddaebc66a65cc8769c735f6f2adc41296b5a03efa5e0461f0
SHA51222901249358d9071b1cf16660c746a2b379bd8335701ebbc4e19f3c67bab0173f02856b7426fdf6bdf794a9f7ac02f43ac03bc42ae1066c5849acb9eaccd4b14
-
Filesize
1.2MB
MD50eb304c773b5427f9dd5392bd1dad5df
SHA11bcc7c57e376c2635e9d9dc447595a6a32aa684b
SHA25695928da675d916f2d3dc0f4f5c6f0026e8274aa40e07c2c6451ea9fc70e5db43
SHA5126fc807070f455de8c2c854951d09a5585c6c38db2e756f18736b24ee3d5d375377ea8c40ce9a264fa84ed951b38aeafe14ddff5eb6b2b65b668d476f5e1254e9
-
Filesize
1.1MB
MD57293bfda3710e8227098d4f26d69dee2
SHA1413b4cc777a97a0712d297aecc8a7134167002a5
SHA2568af8a9e1cf2e5344b00c46f075fb267299e5d34c82e3dcd6bad8a77340e8ce4c
SHA512176d174f6ef9763655beb55f5cd72eca4190de1a28d45981ce05fe8efcea1e5a9e943a879d3e395f278d1c0b871dece2cbbc2e70b608c37a82973af1fb5f6d60
-
Filesize
704KB
MD520661249d900e68db4ac0d935100dba6
SHA199bf889056ec170ecf25970703357c63bea9c22f
SHA256830024f41cda8a9fbc292d16f339029c4a71c3384bbe2a6548a4131023b8f4ed
SHA512a9e7dda458134c39371caa04888a12bd84d8ad5546d0b286031d8140e07c2cd41d336c60ce8ccdcc2056d5ef85bb3ea76daf12aa5da320cae1ece259cb35d485
-
Filesize
482KB
MD5baf2743fe3311004d3871e9365465b8e
SHA11905b58552e9a94efc1341e9d423e7fab634d183
SHA256c168bd9e6be10adf3dcc1f81d32c3a8e486254b07749c7ea2303dfa5569e9927
SHA512fa482be957835b74a535572d9432fe245623618f8ef864847bebe626e43be79c3043ff74da2ac242ff042e885bd2e5fbb478471de094a14b9b0d03826725d77f
-
Filesize
359KB
MD5b17d99a11e46bd85da0ea36ec8a20f6f
SHA173525ebfe2f4bd1ba660d7aa69da034c4d11479b
SHA256ac287196ba41f90e145a62682f401055dd8a5a612906e1f3d100b1199af432a1
SHA5120221b9bd28e000fc1369eb41ef00bf9e8a409e0e6a0e25094e684dea10b10acb2db211fae6f68cb4426abae3c3c7a633ee707c4b28e75d9e1674880c59df7ed9
-
Filesize
388KB
MD5d1ed35f29c0eef0d7147578f1eaebdc1
SHA174906ee617115732b5a031e2fc82253bdc06d84b
SHA256db4294a0c8c85c28eacaef8b98b446952c8e4ce7e7b27c8b4db85f5e90cbc3d2
SHA5126e098fd7ffe5defa3ab05f930705e9a85813c5b2667ff7f6c7111de016a7a674ef17a108b862017c28d30db0ad14fb7516c7cb4248e393b87ad42644ba3191d2
-
Filesize
410KB
MD539b6ff1dd3418de0b92e018dba2e5e8a
SHA19ccba878780d5aceb93cfe2b262c383a86555e6c
SHA25665b02f36052e85a9501774595267f20e615c4406ce9565142d22b28f0d5751c9
SHA5123d1c4f0c4913daf12d549d391f29b2144cae21b110f7c41c43bdf039be66ae7474f38633dc296aa940c0b771465db644eaba609eab0a939855e29143187728a4
-
Filesize
2.1MB
MD5412ad09f5b5dd6330cc29da24b909531
SHA1c2d206f688ef02e1cf2a66fd3c25f1bc0168b249
SHA256e3c7cfb8313c64fcb052b9438aae33c3569454b97625279de3d2cc7b91f211fd
SHA5120b278bee6c96dd85fe6787a8cb900264569bbfbd1523fcf6df7724cd3c32ba735b4f70eb62707b4de1a1d5d5a6680f7d8734bed9267d3740f38b36362ef562ce
-
Filesize
124KB
MD50c65507be9b95a06c385210185df26d5
SHA16746562127256e44ab73281e4d819d59604455dd
SHA256eb110332ebd47dd4d07004f45b28beeab61b0ddcef3e1885c28cc98af42528dc
SHA512a676fb0fb7315dba92618adf44a1833da30f0a5ed42f740112e952c0bd87e2455860d8266686b280264c1c14db4df5b4ca13a7259321e6c270d6b4dcf2c8874c
-
Filesize
501KB
MD5cf8f96b976d67994819e74714c05722b
SHA13a5f4c561e208fba8867e4982de40d9b7ef5507c
SHA256914cf53740c4ef4797d2053500b189ed87bcd65fd03cc01b8b3d810844c4a474
SHA5126d9f7e766ba9d59c5877027e284fdcc6309667cd975b7f3205aefe50bc56a40a922a94fc9db4784ccc7dbd9769b1f406d810814b4e3ee2b3851d6f63e6746031
-
Filesize
490KB
MD5cff8b9b574a63f7696331865fce1f6a7
SHA1db8dc90f642660e83442d601fe8aafcd38aaf791
SHA2567f84329cf86b68ed4a28b36a8a2dec77f758527e98dd842f7f8f76ec3ea30389
SHA5123ef5964d2c997bd7c84ce57d478b5e1ea368a5a0fdfdf22447f958107b4f3ac7fc088260c5636133d245d1f5f52558f2dbf7839ca63e72028762c5d9e747350a
-
Filesize
297KB
MD5cdf8159cac2f0e30c73e7d143b42868e
SHA16c741bd63a184d6da0bad1793676199e947a3930
SHA25667581bb39382e9209232ed87e932a44210c888218e01e44a7504c68d529bb4be
SHA51237b1e2f847708c6c9303d8032777b6874d4605aaa4371a363bcb8b245876fd7cf4c2900c6b4563602bea702e627403ae33c7491a6392660d29bdfe20a62ab41d
-
Filesize
457KB
MD5e791a9aba120df08ba7e5072a0ad5852
SHA12e48af5ec8590edba780de9d52f41476d365abcc
SHA25668c504754766e7472ae0706e0e0d6ef1397026042a4e4b7f5ff5e426765d7084
SHA512b37550102f0cf7209721a44bda6d1e6f9b31dd5cd5bd8ac5bd3e4846fa0f037b17b96e881c76476b2d3e50a00d0a07462c17e520c3873fa6227bad37d50a57db
-
Filesize
476KB
MD596c827df6c78a326b06907b07c6e7ebb
SHA1109521fbce5bdce96cd69d3d3c5cb2fc1e84953b
SHA256d268837aadfadbb6faecd58446aae62a85c62eb223ce916926efc0c1e8c5af61
SHA5128930a5b69f4dcb127e661e52640602b3a599615a17a5ba8792b68d0c8ff053c6071883903f7efb7b4cde346486a23abf26ddc02b6f6bfd4021d21be577980fab
-
Filesize
260KB
MD5b24c296e1ad70363416fd3dc67d32a08
SHA121d2455539c2c9bf82b6b7e3eeb663fca377da76
SHA256b858e25cd1ffba3e372b93811bfd2563d48280578e8995cdd91d4fbd4af6fb8a
SHA51245e0927f946151c35ec754a82d0675b250fe71122dd13ccf891b76fc06b97866539703378238c28d23bc2b1d7fdc7386a880db2fb64a9b0475be690b2311a603
-
Filesize
320KB
MD57837ca7c2529497f8a84d76207cec8cf
SHA1acee38957f9dbf201343e3d6eb9c422f498cc9ea
SHA256548b179e59e074867c5b4ac4508dc2a919d6b39f8c8b060601d852b46424ff77
SHA5125ba56bdb9011ef480f55a61c5a33e035f0e95efd7932cdabce8fb9913bc4028cfa4b72c47a233d1004852a58c3ca1936f01afd996284d5b0c91766d82d3ceb4c
-
Filesize
403KB
MD504a841516c044ada70fa28a0dd1f74e0
SHA1873b4dec8c72359d1caaf2c24321a620e7ea6ae7
SHA256e52ce9e5c4010f711b921585a287b688e6f5f14b144586d0c21fcd5784e9d3ae
SHA51293737fa22e58b43b00a3982e5b80fdf100b0f1812be6cc9215d1cf262fdb66283d9dfb43ed5d4632d02521c9f46fe32e3690f5f8d9b04f7eecd174d61c36aeca
-
Filesize
313KB
MD5d643874800aaefbe74278bbd175d209d
SHA1741adf1092fbfcc1c00e4e122539d3eccc2a0128
SHA25648a1bc853d3dfeeb995cebd6a39c31096888a7c2c2af7de4ab1666fc3b807059
SHA51201213c3e4981218c17fc1029d84f0595892452ff2e4e834ad476e2d26443a7951b4e769f10349e5f96a7a7f2106e92ec73b978530ce001bf2124d5d9bb22dc86
-
Filesize
280KB
MD5a3483469e007d3d38dadaf015315307c
SHA1938081f7f614cff32de89b48041d6f8506ec51d6
SHA256d694c67cf2fc9d431fcfb23fedeaf627a7bbd5a02e3d93a7538bf6b61326a872
SHA512bbe835d08705ed0aa60b9cd4cbba3fc290f7ada40e16479fd8bb097ff3d4377687d7ac503630c247f9e0b01355e741100137d1a3319d19287b5108061d1abf50
-
Filesize
370KB
MD5a900a19ffacc324dff79e7249def2e92
SHA1834ab1461f9e4b4bf82be6e0ec16151e51c045c4
SHA25648f0621832955906dc50b9e072f578131f01c99896cdae5f698b7e0382137c4d
SHA512b849fb5ed848368b4d2f895b24190ee35e2243e719aef6881d190e0e1cecc92a8e4529739d234e81e826b6bb52c1a85736fb94619cebd5fc531d10492c95a8ef
-
Filesize
384KB
MD597731b26cbbf70064c27a01177e9b3b4
SHA12874151e644c9249e6205100a45c0c064d11b74c
SHA256f22fb358ec0bac7c7a177209f0aa6ffc9f9ad0331e2e102eff68f80387755e5b
SHA5124a5fa4f83e4c6219a50ba296be53aab1dffe947d34aa6f0d86c5899bc3ad4abcb4103aada39f2d88eccc0dc32f17bcbc72a45331956bf34c1ac345b334dd6dee
-
Filesize
343KB
MD5cabc945508629ec6f987d22e7acd9b70
SHA1323bb7643ddd0ec822042a0c49aec8e919a1f620
SHA2568035ce0900f1658c760e95b740e7eae8e8be4af3e74d558c33b67df3446045be
SHA512b76cc3bd9bbe7a35b0cb0be25de26819bfe635547355c9219c56f8c78b1e6239a9228a5cc30b8d5645b31434f81da6d4431e11a1a3db936bc210a95de6036ef9
-
Filesize
256KB
MD5c9f9c45c1c812076605792d3d2699150
SHA1300a7a6a137c3a94b7c0e7f794479c0b09bfae54
SHA256fd90b3776e767762c46cc5c645bc8342aabccc368bd4af47510dc55a70652c44
SHA51236cae6f80c5e45ca7a233794220a362b65e3a7aac530624e0a613c45ea418a7ef3d486bc031fc8f6cc5292c07ddeaf72511a63e1ce297cb2408077787a195b9d
-
Filesize
383KB
MD50ac1deafcc47cc39eca902d07407db30
SHA1d02e8ab3bd101ec582e3a23577920848f4a691c8
SHA2566ea4ed863caa3456aa02be539f82d33d812f57c26ab79edafaee6ca25b4a4031
SHA512d1ef475ccf9238a082991cf7522fcb87e532de90c2e1489d64899bb3c385887f32d75b3cfca60d58070de8fd1456954efe16a981c5bbee452ace3f1a76b371c1
-
Filesize
542KB
MD5f4d87306c360a1503bc04cb19009bc8f
SHA13b30dd04f27dff3ab57bd70b1e5eb8ee305a50a9
SHA256a7f9828c4d94313504e5713de5119d8061436dd78343ee9a4d5cf14710e20656
SHA5123294a74b03e283c84337f4bad03b42d74252bc96cb8f9b3550fde2a5e2dadea1b237fdb0632fad030219fc0cf3bca78e97b0fe0530920e0deb862c25a0cde1f9
-
Filesize
336KB
MD51729ab08d8dc14f1b9d05ab6277ad0b3
SHA1932487357baea3236219611dde45d845e08e053b
SHA256b736622c8ea9cb90d424d3d76f475025e201fc2bc8c9092bb3a2ad8414f2f940
SHA512fc2229e8a72547f2b354ebd81ad3ac35d058eac895384fb69b05fd182f77de327da2350fbc24f78ff09d46f43efe41820a90655cf66b36518c253659f05c88d8
-
Filesize
414KB
MD5baf1782f7d4641ea5f17843754a9027a
SHA1345a2ab220b12774230639daba4cb5b6f0eaf334
SHA2565aace3a78c7f7abb8b60091a98a0c1245f7bc6380039ac64a4c4e204c299bc20
SHA5120d6b870ebd7506a9d0fd9b1b8da2c5503ecc6415081a1a2fd03897d09ca05865a81ef9eb2877bcd467dc5a9a86bd683c50739a591bea548d893034a894e5906c
-
Filesize
403KB
MD51ba8f27e375150edde4433cb1d14e6d6
SHA166b5e0f35f1b13e3a3ae4dae49e14266b59aed44
SHA25671628dd2cf2e47f2d35e480e8111500d9d2afd90a03e54d7ac446429687d3948
SHA512e82b5eb75bab4f4be5fd415bd022ae7a1739da6138a0935a4c74f957431720cbbdab9c297090be4473973150f495bec4620c83fb4fb558cd8eb7cac346d71bef
-
Filesize
399KB
MD569bb84f70469a48157fa9a2205941e67
SHA124df493ee1b76eeb14b71affab9c688f4ce3b3e1
SHA256aad7844bdb71d3bd9a5fa30c00682047dfa6b100db9e6026e36fa4e92c0e4365
SHA5129a5d8f877aa270f3a7c9b94c18b08627da6512bcf61a9e6fc0561f08b6d207b13ca95f3a1459007615c94f44dd8b40a57b70a25c1b4f2e93b8d68d9685c30f10
-
Filesize
354KB
MD5ece61c35afeac8a83ed3cf1b89ab3948
SHA114664cca9cb1ca24002b6eabe33bd2398ba7119a
SHA2566b4a9d3f86faebbaafd97114eecf029e3d7b77fea1c5b37c2dd91a471c4b01ed
SHA5127622046eb75fa32f70910400344a7bf51cca78fc413c2756e523b8e443d9ff15ff890165516e9ae26633986c65f60be5eed3f7178eb4bad92f99e7eba641550b
-
Filesize
295KB
MD530f9953348cd6f21abe69aa82eb4c3aa
SHA1593ce86a5efe6b3b892574c83225f557241cb280
SHA256c8b6d9036bef1f9d26325988e3d18ad8c314205a78fde2b5a5142db82c42df7e
SHA512a9f4f1d3bb603e83c15af74f4f382e330c3f33620cd78c4c47d81c84396813d99ba7e0ebf63f04c67607fcc97e6a08e1d9a8929c1d56d148608c6ad9c7d4f09f
-
Filesize
266KB
MD57a80beae6d49eab7b95d56468106d450
SHA1ede670111737f125c97242b3895fbad961cacf69
SHA256185549b54d0ec5d79953d62e5d7fe8f3b2f6f924d224e08fb2de07223a0adaaf
SHA5121602c5c251da4d3cab177db874b9a1aaa40b38029b793b5acd63e929bf69c7acc83ebac735a5affe65394622f6d54d79921c8f24e8ba1dc1ecaabc29d44e2084
-
Filesize
474KB
MD5dc7ae1aaf5e6a13db12317af71399ed6
SHA1f2a6d6d6ef420afcfa2d6e787c8f97caa3524b6b
SHA25650de388a696fbc4be4ec32c64a49d773c871da603e6e224955ee0f05d0f1706f
SHA512f937de429804cf0ba9aee460cbb19cb2a731efd28f2cd3a49d8bd2560ca928e4f4d49a38effec0c389d85d741230fdb003b416cda56407c7b854204714cc7152
-
Filesize
209KB
MD54bcb2d689004f33f2b70c24a27f26a86
SHA15d6b884d8600326843267ead0d6fee4d7a2cd686
SHA256c797f21d708dbf43171e8bdc5de539c17404dd5369f3b07c618cc8f527748a8a
SHA5121215cfc626171d43109f1bfa8d8369ffdc72a1ca0d63a62c6bd4971aec0b5a0a41d6c443e000972a0f5c1e3ee9816fdfbc368ce059ba583f3208d0e029ee3d70
-
Filesize
84KB
MD52c0417dedaa86330d76d3580324de160
SHA1b732f6912a62027dde44ee353d694133802df80f
SHA2564dfb89e0f07460da9f8d35a5f41c6bde0d6497181dd6f81da5cf457110eb774a
SHA5120dd350930d29fd333a5221bc5082b3594597645c2a4de3f1233d37822e1f88fb7b7563aae03533885e5a3c8f733e6e017e653ff457929ad8b2ac0c2a2f16c89c
-
Filesize
94KB
MD5cf746e36607a2e0835a696836158d3ff
SHA15c69c5f21e87da2e3ee75f287890433a82084651
SHA256bb0905c1adff33530d0210c54d0da40d9439d09e74e028e9a74b5acb0bc95aac
SHA512e0f9583c94f4ef6e1d5604cea504c790e7a4bbd3e0f760f16c58182a4031bb6774ac603abcf1ffe74cbfb4ac43f067307f32eeafd05ad2bdb26483f037464034
-
Filesize
80KB
MD5dd91c31e4745ae04007b1f545ce5b968
SHA1340868b2f9fc732ef08d68980fc024d666fb91ea
SHA256eb89500f0a76379f91d7612bb8f452d954c341ca1ce966cf5d3664adf5a590e6
SHA512fb2ed59099dd79c75dc670e82db6e1fe627ac1f57d24e8e543a5e6fbf8b67d869e3946c8c88674284077aab820ab09d17a9f9da8251bfc2e9e3e5bbfa2f31b6d
-
Filesize
77KB
MD559d7a090f50385fe052c05ed5461120b
SHA132f7479aeb48ab2d0a2fc1a2688033ba3ace0a1e
SHA2561f46edb9d71727fdeab5be0d50c31138bf03ea37b07eeafaaa446d03518469c7
SHA512adbbeecc8fb8d38004db524ecaf1be91bea2bc1850fecb2ce9b46d299f1adc0c422dc5b480dec676c92803fec5e150d62afa2b51345cac91acf2f1cb7f056fb0
-
Filesize
77KB
MD56aad8dbfeb16612e9ca3de0afff647f9
SHA115e5793e48fc5aac84d584e000a1e28d487dfb75
SHA2560454cabf4f7dea07061f4fa0039bb10bc0da24cb78d87d016ee4e1023a9ac7e4
SHA512e0914625b4294a75af83a23ac7c61db3aca664372422d632e935674d101aa1449f24f2bff4def6596b4e19e270b1b37103b8d47787028ea71ca97bc8d16a2995
-
Filesize
106KB
MD57596f48f38c658c997573d0a8d35f2e9
SHA1091af645f0ce4e9b05abc7e77319e9f4679e6fc5
SHA2562fef9dc17459150ece4dfa8bb21d1c14e913e62d15857d6927af557f79116a07
SHA512c782957d4da997118fe5b7e1c4515c8f9e7dfdb4f7c003f7e8bb1b873df165f844912a96132530b7d9589952e3d03888f24bd5038511f8d7af2e817c19b6aac4
-
Filesize
47KB
MD53e69c4bb87fc382f4cf4f40c0dfe6e6a
SHA1df41c241e1dc2f744fac288ac133999bd95b0f22
SHA256229c1186efbde19c43db729483e5fc0ed8e7414c566ae1b892b8f46937939ab5
SHA5124ce0b7d5b736463206a2ec0b1cd122b2635265c17fc55361b41779a37ac7fc21e97a38b0196b8418eb6fb284670ec689725e632af5a92db4928aa28653eea5ab
-
Filesize
149KB
MD5324e0ec1dd9ac25a2474a194cbb5c612
SHA189a161a8230141f868f76d4958efa6940019b5a2
SHA256830fc36553d1644764b09b9b29db149663c6f0d7dbfbce7efc850002f555e4a1
SHA512c01576e31af588fe79946d855170b042f2e438296a0f82c7196a92c9a57241f42ab92533fe2be04a5c06eef44868799113731fe15a730c11a4211509e30ca8c9
-
Filesize
81KB
MD5a182fb5d7b9e664dd8f4d4f3b31b040f
SHA15fa0292754ad0a2aa43dc597ab72126e694715b1
SHA2564c29c53cb48f978832390d682b41951f58a013afbb26b3453d2bb885359321fe
SHA5121c9995f5b3c961aa452d5a505edd3b2acf9b99424e9a0a7738b7cdbf2f1411921f804177fa1d0345cc7df35634b58de1ab9cad8d2cb3955489d43cab63e45378
-
Filesize
82KB
MD5e17a127d8d05c6c94dc9380f73c2cf8b
SHA15b836d6251aa107d3586fcfd6d0d0ebc329986eb
SHA2568e2cea91daf84a6b2997d51f56fab8154138e461403c37c21173d7561c4452ba
SHA512c6a5dde8b5280685baedc2f5bd0f8ddd08999e947187e29cb6c2abcffe75335bb3668bb76dfe0edbd13e752f40f6126411ac1478aa185c3152de8166879232cf
-
Filesize
428KB
MD5917dd177750792bb3f36e37e52d5e99b
SHA1ac73721d9d5c00a76658a714b8b2c50b3e774971
SHA256cba25a4d3dcbb39a2fbc4972725d9c2a9d11df5ab6c255a2b7502465be2bbacd
SHA512a05066dd233df6ce0ef3c6c84b6d47a491eb8959ea360439ab064c34982b10f322f6eae04025e68c2e2e2dbe1b530600186b35a7b1081b2225ba126f040a2707
-
Filesize
659KB
MD50dbf966504a9145404884f4a8ddd7cf5
SHA121c49b726901da3b6e703df267b17b4bae40cca0
SHA2565b4da5ba39bee28d0dd1af504bdb8da95415d4c1f7c521858660d1104bcb4aeb
SHA512142cc6936c9a33244d07c79ac5edff1aa95ba1be647b22d07ca7285f5b60536a2f55dd3178008932e62f740c7d8b80c37b15dcae82484d520ff227d496fcd265
-
Filesize
1.2MB
MD59811e0c4eb429ee09d40d39368fd5ec7
SHA12723390c7cbea14113329a763971aaa989211347
SHA256fc0289bdae4ef4f2aea9449c1617da714578df47082376c26d2310e1307477da
SHA512405b98dbfbde0242bddee0562655d549714d8d48d94ed28c5f1f428a948b6dabcabe864b639d9176c3f98e865d071f6be4f2975b19ed51524e43dab1f0b0860e
-
Filesize
661KB
MD5d52384b96a0626d02d8d4af1d9f89905
SHA116843f2c5035dc49ee5cd1a8aaf6d38f88e73e39
SHA25686f34dd7c857533698da00e045099a504780a29080de344226cb8806e2271f7f
SHA512b51a128b527b9da48fefc3dcb9ec6eede0c385a23da23bd57ae0585d2df0da5bb2cb982b62b9ceb0f70398831f8eccb7cae1a021a2ac352405902ad67304938d
-
Filesize
712KB
MD5d4fde7dc9c627d6c630b6800bada2665
SHA1a8dafcd2b2dbaaedb78554f380a45118a1010f72
SHA256d27825ac51bb22347d7a6df20d49a2a9cefe2271c069b00d8b42445757626a3c
SHA512280fd3dbc23c8d60ed656b816932845a0f085becd33f452a476a22b961dfd55f23f3093c2511bf232407b60edef2b976547ccd63a701e13b1373ce56a991dd64
-
Filesize
1.3MB
MD5c1533ffbcfb057b0618be3b7e080d48b
SHA163f22227b179ba4a97ad1d5a7beae1b206286514
SHA2560fa7c0a820aeb82917104dea73db873611cd725d76a71e58186bb1ce4c5cde9a
SHA512e732631258b093b37b24c6db9c88b41ef7f11c682f739c2e1557996628505b98673b27305f86d7e18530a93cef1d4e412b58db870e18287f772dc5aa3805107b
-
Filesize
635KB
MD56200ff34fde8147f3b6ee76df640d97f
SHA196f7746033bd57b23f27e0b8a31f05484593add2
SHA2567aa24d1a621113aff3d89f7d33cf89f2b90ff4cc4d9e9c89e86029c6d920d423
SHA512a01480252ba397dcce8956817cb1875b1cb4071cc00baf06953379875282c0f171d516aa64af558ce8140ed0e2d9c2d24d3906014b833bca0a7b7455e36f54fb
-
Filesize
871KB
MD530e6ffccbd23416b1d64eebbaa471718
SHA147743882d1eff9714d8833f0137bce3b999bd6ad
SHA25666f83b10ea5af0ab468a3eb2e552559f1177b0b16f4454d37a5feee3517b078f
SHA5123c29ee23d9418d9e85de41d8446cfd6451aaa7c6aab34bde2785b7e18cc0e48763ed88a3b5c75392464e8c0ddafa12b30e3184078c59aa1419e3ea0bb34feb4f