Resubmissions
25/04/2024, 01:21
240425-bqxwyscg54 7Analysis
-
max time kernel
368s -
max time network
363s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2024, 01:21
Behavioral task
behavioral1
Sample
LaZagne.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
LaZagne.exe
Resource
win10v2004-20240412-en
General
-
Target
LaZagne.exe
-
Size
11.3MB
-
MD5
282df7bcb720a5b6f409caf9ccda2f75
-
SHA1
0e62d10ff194e84ed8c6bd71620f56ef9e557072
-
SHA256
3cc5ee93a9ba1fc57389705283b760c8bd61f35e9398bbfa3210e2becf6d4b05
-
SHA512
74bbcefb87c037ec93312f67b739c2486258d83e0fb7628352a1dd482c0277a82073427856c0848cda451b7322faab0ae2e6878501c2867827ce6bd9798f3229
-
SSDEEP
196608:0cHu78K//UoEkXuWJysVYvsOfhumHhtdIQLOMIdiwXa6vTVzy/BOfN1XZuoJnB:Bu7L//HEnWJIuahtaL/dg67RywfNxZuu
Malware Config
Signatures
-
Loads dropped DLL 36 IoCs
pid Process 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe 4352 LaZagne.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133584818299881616" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4600 chrome.exe 4600 chrome.exe 956 chrome.exe 956 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 35 4352 LaZagne.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4276 wrote to memory of 4352 4276 LaZagne.exe 87 PID 4276 wrote to memory of 4352 4276 LaZagne.exe 87 PID 4600 wrote to memory of 2756 4600 chrome.exe 122 PID 4600 wrote to memory of 2756 4600 chrome.exe 122 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 2348 4600 chrome.exe 123 PID 4600 wrote to memory of 1244 4600 chrome.exe 124 PID 4600 wrote to memory of 1244 4600 chrome.exe 124 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125 PID 4600 wrote to memory of 3576 4600 chrome.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\LaZagne.exe"C:\Users\Admin\AppData\Local\Temp\LaZagne.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\LaZagne.exe"C:\Users\Admin\AppData\Local\Temp\LaZagne.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2292
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffcf76aab58,0x7ffcf76aab68,0x7ffcf76aab782⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:22⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:82⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2296 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:82⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:12⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4268 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:12⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4484 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:82⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4632 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:82⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4848 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:82⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4504 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:12⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2660 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:12⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1584 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:82⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4020 --field-trial-handle=1984,i,4227446202031596964,16702197514060742887,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:956
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5ad65e63351a507661965c0b0a0fb3665
SHA1c87dfae73a1dfe23d21b9f6e05e03edbb715dd5f
SHA256a5617ec173960014d4c86ade62d0e23b53b5807f8b83fd926d763fbb8d5e608e
SHA512323eba54f4516e6eff79d3fbe389b440ab98f80c2920c433c1be08b6fb33336c82584034cf14cfca994a87804729cb5afcb3da968c07fba5515bb1e21d113b90
-
Filesize
2KB
MD52282dd1ec43819ec97d857ec47e3921b
SHA1ca10fd527a825c1027443421149fc83646273e36
SHA256f16a32170b1e999058aff2a29f8024cf6d8c476710fc8b8b01cf016bc82cdb5e
SHA51278d16893bd48578496b4b3d8ef75d93f37623e301dbd8d41abdca92b74716f887c97e12672848d00eec1cb56b5ba0fceb4aa25eff4a36728af155a4a50df9c19
-
Filesize
2KB
MD58b5e90b00b0a605d4e972ad1e7107839
SHA1e4206d616b72f9d309102db814a586905a51bd9a
SHA256c14fe4c8689b34816ae41746bc64c5951314e8f365e131aa61c9444d2b0acfa5
SHA51285a06d3cc3871cc0965ef4d3eab86102fb6a6f6c111c2df9b0a51d5d3e3b7ad9902c8413bb85bfa81a4f911c227624ce8bfa0f7f12895e1b70b79185c45d17e7
-
Filesize
2KB
MD59f4fc6b71e419f0a1704f76c61452181
SHA1e1acf2e7ee6179358d0de3092b753b3f82974aca
SHA2569945da94a1ecd269d910c8aff93e836f409cb75caa18ac2e26172506f7b29348
SHA5129226010b3ad87ddc18669fbc08892965549767ded372d38cffc8feba66ccdf12d9e0352f62f342f35d9277c90380bff756aaa40ca55d9642690f27082678694f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD526eeeb5204f8bd1205879a203ef2f330
SHA104f7e253100bf30e08becaac2a2324ca60b6d9f3
SHA256da62b588deac511ee81ede7ee1d98705ae41737de56621460c1140c3d851abaa
SHA512e90f7adec42dfa54f03e0719748340feb27710f5f37da0c3bc56fc6836c5af652801bd91ed66d651ff6d9b35a41689009e05a044b21738dacdeddbc00e50b652
-
Filesize
356B
MD51dc483dfd6ab5ea1c1ca3216585cc5c2
SHA172acb8a8176ee01fb42f8e00b8114a38bd9a227e
SHA256845d72a75d12020b03b2b1c01ec789ddd17c14f676088e60bb6ec901109e29bb
SHA512373ca549cdc7b746d9f245bf4c8c157637346894c4ecb806985591fb1a994ab289d7fabf6bf2a29e185a21140f621a9713751300bfb3173896084ae9fc4bfbcb
-
Filesize
1KB
MD5d2fd583d539dfcc938e416fb9f81b7e2
SHA19661956b0e5a8ef15bc1336c94535826d9f9d53a
SHA256d8cb3d8c27dc2ead7f19796ca5f9d876d9cd7b46eecff63f3637574b6aac8bcc
SHA512e9f7afb821db9aa3bd561817b9d22f7e639ff54ebad26afbd65d349b6bf387dd6db9c5338fe5e5adb30bde8edf92aec8bf1c717c5a21bddf4b1866c6aeb70139
-
Filesize
1KB
MD57542bdecfb5489d50b6b1ae5050e1bbc
SHA1b458850a2d4c0a3b277180729912adea5ee3e589
SHA2560cbe82ae60c0e857c6b5d71b2d5e299513a272ee4b6bb30927336542c9280248
SHA5120c6da4f532a187af00b214ec24d758b2762c69a5b7558759c5e1c3c8ac9217ab80374bfc042ea6f259b10b321d3caca52a4608a3d3d46924ed0a42bcf45a6258
-
Filesize
7KB
MD56ddb3dbe2f785be733565e91d4d7c7eb
SHA19e71edcc0a9201268a354dde09dd3928414938ef
SHA256739cc5a4f95086a9308ea9760c68afcb789b0cfd7cb12bfd72f9efd08776f47e
SHA512f0480febbe27befefb31c3f3c2e678d3c44336da857b6432f197c1671c3bbe5fe1811ec04883dff24803db5fecabe080e4305f1cfcc6818c3c9a17513ad400e9
-
Filesize
6KB
MD5b51ea6b555bf1a118d0c05e29d005f96
SHA1e7b4d3f10de374639295928f24cbaf0aa6bf25fa
SHA2565f106dc6228f7a1c527028109e12385af443f41e757db0515ca87f5bb378a386
SHA512b1261ab2f37a70605be0da61cfc53a2eea1698d3a4eabe41ed5b88953a2afa87d7dceffcf58f906efe1d0e54370574a9bcd82473a39e61ee5976a62cf9996ec4
-
Filesize
7KB
MD544fd1f814747ce1290e352b2d14ce41f
SHA1258ec2a4c74e5573251511aa665f1005cdc747f0
SHA256baefc4952eb5c49ba8663989a5b47d9fd485e00a626d16a7b97228795c1d6bbe
SHA5120e67a3fe6c0d33015b54d69f8fe5b7b13bf5b61a63215ccc9dccae2ac197acf81975170a2d6b5b172ddab768259438963b7ff62b5fb36ab484083302d3e52be4
-
Filesize
16KB
MD5772f2efbdbd487f82441d1902f77bdb1
SHA196aaf1d4eb10b6cae457112857ce3692949a9f1f
SHA2561b4c435b18e99e55cf248b4dcdc8a800ceb0d329e5d43eac3b6efabf4205057b
SHA5123a4ec84cef5f6c4575a24c0c9aff9ef3a4ecd23169a12393eb2ca47cb636309bf604c0d0d4a8e66a5c7ad00abf75d8172ade7ec7a0de97e79491608db8004c6f
-
Filesize
253KB
MD501bff80a7fab26412027fbbbd0c8c8e6
SHA11059a29bfc1cb193d516ef5eab7dcd264e2c1b3b
SHA2563fcab356f2db401551efcd27045a85042a9a7ea234209ad87558f600e89dc8e4
SHA5125c113b725a148a11e0adfb794808f38cae880b2184ee6ae0f8623ae0a50227b304133f757fb23937937b3ad5f78c1be5c12948da7e937f29536c540fc8c2b9f5
-
Filesize
90KB
MD5c261b336ec6de81923f14f48bffda0c0
SHA14070db98a515dc73350efabfe0de5424ed9ce36e
SHA2561c65a01bd62d9719099dcda866d149fd95ce35f167e1c43044d11fe55ab84716
SHA512c9f7a6d94a537381bbb226a69ccbc4453574ae0dbe0be94096b66ff848788f03dd43720d67f3a18cf3270aa567cd95de7bbc672d40fbf0dec1ddc423151ae06f
-
Filesize
89KB
MD56ca17822cdf5ac66781d1235966993c4
SHA1be54f8f42a8b0fda1aa176ab5b115ba2f0a01b92
SHA2560b4f56aa0624d1c9999daa1a7aa526ccadab1e721217afeb0848b2500e9b7757
SHA5120dee1a853238ed937b5e3e955364b58d2437367f844da59c5b895bc020a124e9ba03a59a6aa0334006c9695c5ade6de7713f963667fbce03cf210532ba7bc816
-
Filesize
13KB
MD55b855b3e838d9c7faad4bd736cf56d59
SHA1ad51237a6e2d1beefddabfc8bd8ac0e205ed735f
SHA2567d1b252adc643deeb896430b58cf457436152351eb7fa043b4b24736c9edf864
SHA512180207b3bd88976240eccf39f2f174af0d13feefd9b22b92363c0d947e8bd5b1523417a73d4b5aaf9252a59162e34e2f5df76c837cbd1b458d1830f4d4c70918
-
Filesize
12KB
MD5a1b78a3ce3165e90957880b8724d944f
SHA1a69f63cc211e671a08daad7a66ed0b05f8736cc7
SHA25684e071321e378054b6d3b56bbd66699e36554f637a44728b38b96a31199dfa69
SHA51215847386652cbee378d0ff6aad0a3fe0d0c6c7f1939f764f86c665f3493b4bccaf98d7a29259e94ed197285d9365b9d6e697b010aff3370cf857b8cb4106d7d8
-
Filesize
13KB
MD50dca79c062f2f800132cf1748a8e147f
SHA191f525b8ca0c0db245c4d3fa4073541826e8fb89
SHA2562a63e504c8aa4d291bbd8108f26eecde3dcd9bfba579ae80b777ff6dfec5e922
SHA512a820299fba1d0952a00db78b92fb7d68d77c427418388cc67e3a37dc87b1895d9ae416cac32b859d11d21a07a8f4cef3bd26ebb06cc39f04ad5e60f8692c659b
-
Filesize
14KB
MD5785f15dc9e505ed828356d978009ecce
SHA1830e683b0e539309ecf0f1ed2c7f73dda2011563
SHA256b2b68de1d7e5997eb0c8a44c9f2eb958de39b53db8d77a51a84f1d1b197b58b1
SHA51216033b72be6d66ab3a44b0480eb245d853a100d13a1e820eff5b12ce0bb73e17d6e48b3e778d1b20d0c04fe1fb8a5723c02ed8af434ae64d0944f847796d98f2
-
Filesize
10KB
MD5aec314222600ade3d96b6dc33af380a6
SHA1c6af3edadb09ea3a56048b57237c0a2dca33bee1
SHA256ea96505b38d27c085544fb129f2b0e00df5020d323d7853e6a6a8645ac785304
SHA512bbc00aa7fdf178bb6b2d86419c31967f2bc32d157aa7ee3ac308c28d8bf4823c1fafcde6c91651edc05c146e44d7e59e02a76283890652b27c52f509c3b9ef9a
-
Filesize
17KB
MD5759aa7ff756f6eb615ab4890dedd113d
SHA13f6ab4e9a4a6a75e7b5d356582a81afda9ba635f
SHA256242b35bf5918bd1cba69feaad47cbb50431d750edca6033875983e5fd4d9499c
SHA5121fc3feac358b93cc2f6c4825cb150787f1ded00ae616b5b3fa26ebb1b43fec6c2af04436e021a1b0c2e219ab2203108d7447cdfef3d48d710bac18586a107e32
-
Filesize
12KB
MD54ed6d4b1b100384d13f25dfa3737fb78
SHA1852a2f76c853db02e65512af35f5b4b4a2346abd
SHA256084e4b2da2180ad2a2e96e8804a6f2fc37bce6349eb8a5f6b182116b4d04bd82
SHA512276201a9bcb9f88f4bbac0cd9e3ea2da83e0fb4854b1a0dd63cff2af08af3883be34af6f06ece32fad2fd4271a0a09a3b576f1ed78b8a227d13c04a07eaf0827
-
Filesize
14KB
MD5c482fe81df435cddef783ab0d8ad78b6
SHA125e0e650f9135110234091d5263be1721b8fe719
SHA25655e20e1effe80f0d6655d690fa445659e0c692b800c4a01ecf3d43dfcb3324b2
SHA512ef5a965b8505944e6b37581763cd9d525bbf1b877bfed319535aab675d0382b8655cd6a4f2832f608c1d89cfd0dae6005deda73a86b9d2d6e874953788ee0d36
-
Filesize
15KB
MD59de2cfd4fe88f9e8e3820ce931fc1129
SHA1c2ea2284200ebbdc1179f36e8fa79f9ed0b27e80
SHA25649e10215e1d6966b03470af10e7d3b8bd5b5d6707a258c3b1286ff002145e3d1
SHA512c6d0e43df0e8f8e665bb1a78005a04f673e6b5211db0a0f1d640088782d736838944f0612a59a3c0cb930631108b93fd8c2d51bf191a81a06fb6d5a3388cff06
-
Filesize
17KB
MD567e8ab67b5db0a50af2aedea886eb362
SHA1a7d071a3be454b78a0a0bb100e5d9859c12f98e6
SHA256044b09a6351db40fe1f242c70942d865ce4cd42a12f24e358f84ae790677d92d
SHA512b2e41422b6642e000d9220a1cf4188b1845a8cf9498338d66ca0dcc0724540694719a4d3eda017ca6f2f77c3d6a6c427c6c86db3910c686cecb58a40c5239e2e
-
Filesize
21KB
MD57a573f50bd6942e9bb68307e5b6a0bff
SHA17e0e435c8589ec3cecfe6354ae9e5ae868b9b209
SHA256c6cd3f23d027febdf48161d3b74edb6c9d4d1bde23f775990f49572d8eb9dfb9
SHA5129ecd754b99e020a169366cb8c99816070221c4db2c1ef8c23b6dac765e6bb56ea3abbe969025aecede8eb6c3ea8c626562f2cda3c4ea537c5db1a841f19c2ad5
-
Filesize
12KB
MD588e3148d1eb84022e508736d0d488185
SHA14d1d3251cc5e61c7fcf5dc6273e3d7ba301d6ca9
SHA256ba4c1492bb4884f3d77f61a7d23ec9e190eb7da3a115a271d0954d933264fb71
SHA51225a86c56b84275c2314ad1fd98635b43373977dfc6f2f6737f22b1962a3bb5480539a35db9fbb70fca16f5acb5f19bab63e1cada776d1667d07332322f641a5f
-
Filesize
13KB
MD51a3a27f63afeb42c0282eada02ac834a
SHA1fadda44628aef3ec70cc02fc0e43a88c7832f7bc
SHA256e7a7ab2d31aee3b99773c814114d60eb71107ef862930c582f99313943249163
SHA5120d6d397f87cc5a8a83f1df20687c967df4faf80cf0807ae2b06969e16c107f18a5d39ce34c32c42a53d1726a50860c180266ecad81b4235f041920f496b25fc7
-
Filesize
12KB
MD5dd7d22a0afe540c07ce9d919cd779203
SHA10e76db96ec2d9922937a77abedb7e61037cc8cb9
SHA256880a4418d81c4da0d588c0cfd7c68d8c5476385d9203a2d6ded25a0f7b330a76
SHA512bd720cf67e264040f8076edbb72843305094f1d87bd03a1e9fbeb47564f3963120d76bad6887fea560b45958f2ffa929a7d63ea1ec9b633da23784d98a68c32a
-
Filesize
10KB
MD5a9b7c866c5a18cc96570cca3be6a2433
SHA14f78c7516e512529b977048bc87ed3a95383b44e
SHA25672998624c023b21f21e449f3268b7e839b248ba55440087cb6b421ed65f9a1b5
SHA512ec890e84384c7b1804ce73b097ef068bada15adb5f76e1e9b2bcc54cde910165a9729f40a1ac18d196ddd3ee4ee60a0cfaa6d56daafcad10630ad2658faf485b
-
Filesize
10KB
MD55738d83e2a66b6ace4f631a9255f81d9
SHA15b6ebb0b82738781732cf7cfd497f5aeb3453de2
SHA256f2718adadb6e9958081dcb5570ef737c66772c166a6ad8c0401adcd9a70f46a0
SHA512bb21b62fd7fee22dfa04274d0fa1aec666c7845cd2ec3f01f1a0418a2c68f228ec0ae451c793ccae3aa88f1efee5d6019138c0975497518f990b8511b2fd0e75
-
Filesize
87KB
MD50e675d4a7a5b7ccd69013386793f68eb
SHA16e5821ddd8fea6681bda4448816f39984a33596b
SHA256bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1
SHA512cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66
-
Filesize
87KB
MD592075c2759ac8246953e6fa6323e43fe
SHA16818befe630c2656183ea7fe735db159804b7773
SHA256e7af6119b56ddd47fd0a909710f7163d7ef4822405fc138d24e6ce9de7a5022f
SHA5127f3a4409859695f53291c96dd487bca2649815bad5f4610c2c6f92777411d39210e293d962573a20dfe73ea15331de7e6c18b017ae1d6f226387eab1fc1f586c
-
Filesize
177KB
MD5daccb97b9214bb1366ed40ad583679a2
SHA189554e638b62be5f388c9bdd35d9daf53a240e0c
SHA256b714423d9cad42e67937531f2634001a870f8be2bf413eacfc9f73ef391a7915
SHA51299fd5c80372d878f722e4bcb1b8c8c737600961d3a9dffc3e8277e024aaac8648c64825820e20da1ab9ad9180501218c6d796af1905d8845d41c6dbb4c6ebab0
-
Filesize
131KB
MD52787764fe3056f37c79a3fc79e620172
SHA1a64d1a047ba644d0588dc4288b74925ed72e6ed4
SHA25641c593c960f3f89b1e1629c6b7bd6171fe306168f816bef02027332a263de117
SHA5121dc5bb470be558c643a3f68e23423697384bc547b1192cd398dff640e28f7df85563bc87643cdcde9b8b4f880f272e13a673a018ae251e100bd99790f993afa0
-
Filesize
38KB
MD57808b500fbfb17c968f10ee6d68461df
SHA12a8e54037e7d03d20244fefd8247cf218e1d668f
SHA256e2701f4e4a7556adab7415e448070289ba4fe047227f48c3a049d7c3154aff0b
SHA512b4239e792141bcf924f61bfd46033934337079b245f423b34820d36c6599ca35ab06bc525acfff4cafa75e31975fcd0409dedd203377d642fc5dc55ec2c1fa27
-
Filesize
251KB
MD5ab582419629183e1615b76fc5d2c7704
SHA1b78ee7e725a417bef50cca47590950e970eae200
SHA2565a45f7cd517ad396a042bc2767ae73221dc68f934e828a9433249924a371ee5e
SHA5123f38441dd0b88b486dafaa1e15d07f0ee467a362c1603071a2fa79de770fa061ced25ca790f0d3139f31178c719cc82ac88601262e2a0ca809708dfa3f6f76ca
-
Filesize
27KB
MD5a48af48dd880c11673469c1ade525558
SHA101e9bbcd7eccaa6d5033544e875c7c20f8812124
SHA256a98e9f330eeaf40ef516237ab5bc1efac1fc49ed321a128be78dd3fb8733e0a4
SHA512a535dadb79c1ca10506858226442d1d1fb00e5d6f99afa6b539e2506a6627a7bd624a7ee2bc61f55c974113de80fd7a95e6c18e9402736d32d5099077ca1b913
-
Filesize
74KB
MD510cd16bb63862536570c717ffc453da4
SHA1b3ef50d7ac4652b5c35f1d86a0130fb43dd5a669
SHA256e002a1bd6fba44681d557b64d439585dba9820226e1c3da5a62628bbaa930ae3
SHA51255ee581c4005901661efaf9aad6ea39b2b2e265579539d464d62e4209638567b3b9fdd945d0bed0a1047f977d374a5707a970c621ca289077e2d6c5aeca491b1
-
Filesize
84KB
MD5244d92824ef54b139ecd4f2b58a5d9d5
SHA1ff5696f6e3dc42e578a580299ac53d8c5e11d917
SHA256fd55c3e3b2863425050619b8d42fe19cf06c1c8e2e11f7076e1f4422663e6851
SHA51210fba938064bca2b9163d6c0d0a0361d0ebd896e32346cade3e4a439475c223ced59ac8f9c51727d5556149b14990ab62ee6769c35cf067aaac5d63dd5d4688f
-
Filesize
762KB
MD54dbdcd4c1d91ebb19d0520ad80f35d78
SHA11a2e0de2cb1c5be36d3e7ad691bf6b27436dbdb7
SHA256c74288cc76f67f9f3be2ce61b3c4b1df78b082f4d55dc4dd7b68f6a4803ea47e
SHA5128a298985628c895a67adf9538e92ff7527219163dc1c491f5c250bd36532d66f9d9530c04778d535535eeb0f22dcb4c55d22ab3459b6e827d614ca1e7c647031
-
Filesize
1KB
MD56fe7232e13f5f8307c037b54fe0dcc10
SHA1510075454d9179d1c6669df67f126213aabcb99f
SHA2564996109560a79774034a05b398d64b1b441c49f0f03682c4683554c59dd47e5c
SHA5128893febd884f6411025ff9df7d0ef2dbc756baa93903423e805b5e981273838567f2ea60d072d4d98fe9b2f2c25a85800522cebc5e832a3256d4c10605085725
-
Filesize
3.2MB
MD5bf83f8ad60cb9db462ce62c73208a30d
SHA1f1bc7dbc1e5b00426a51878719196d78981674c4
SHA256012866b68f458ec204b9bce067af8f4a488860774e7e17973c49e583b52b828d
SHA512ae1bdda1c174ddf4205ab19a25737fe523dca6a9a339030cd8a95674c243d0011121067c007be56def4eaeffc40cbdadfdcbd1e61df3404d6a3921d196dcd81e
-
Filesize
194KB
MD502d615171b805cc573b28e17611f663f
SHA12e63b78316b4eae6ee1c25f1f10fbbb84ecef054
SHA256e60b5cbdf7480db1fc829e05ce45703d43d5ba25fdf7fba21cca1d38b1f3b3a4
SHA512b61cd3d16d1a192016a50342ae71fee8f764c4c156e275a320f74cc4ec65755c91c022231d09a76b59d6225960f5a930f1887003b1d6984beeb5a9648b045427
-
Filesize
3.6MB
MD5c4e99d7375888d873d2478769a8d844c
SHA1881e42ad9b7da068ee7a6d133484f9d39519ca7e
SHA25612f26beb439ddf8d56e7544b06a0675d5da6670c02f8f9cede7aad1de71eb116
SHA512a5b79a919f15cda2c295c8da923ffe5dd30408376e459669e4e376b9d4d504d43671518d7085352bb90c4ce4efc6d81c91ac6cedbdaa896f916d80f7346a695b
-
Filesize
26KB
MD539b7c056bca546778690b9922315f9ff
SHA15f62169c8de1f72db601d30b37d157478723859b
SHA2569514b4c40c35396b1952a8acf805e993a3875b37370f44ef36ed33c7151412ef
SHA512229538131d83299ea90652818c99972c1ee692c070e7fea9599420c99dd8ae75fb2367e9509aad23984fe0a8d21221a59bd57493b5cd1d6c7391c3c55d714e94
-
Filesize
1.2MB
MD58e75a7cf495ee6c1381b1f4a7979f736
SHA1b6d250bf8d3b04f5666d2eedb7c6eb96614a0081
SHA25648a58913429af487390f4bf7bb1c6790a0a9980ecc6b7a78238cd685f8a2baad
SHA51278c32021a6c3af8a85acaa20481db9b49cbeccc755123d31b50a207cd5925833e454b3cdfc06b51e4b25f49b27e02693a067933f4d697f830cb3b985eeaf13a2
-
Filesize
970KB
MD5aad2e99881765464c9ad9ccdbe78f0e0
SHA18634ce21a2683674210e836822fda448262e2e16
SHA256e6287f7ba5892c99da70e9785d320a665809ca8e657a64b9fef1e8afcfb6a2f9
SHA51268d2e898cdd73a3ad41ef3db7a149588a82629ac0628c07606f009bd6a92a62f9816c995b1794c8a957a4f3c55a72fcab17a400a2f55016a0ee8d773a172d002