Analysis
-
max time kernel
1s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe
Resource
win7-20240221-en
General
-
Target
2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe
-
Size
5.5MB
-
MD5
8f5598f81e2ce6718647d46f17169f17
-
SHA1
027df6465b0d5ed57dbe320b0067b82d1b0f9d03
-
SHA256
a89b781b1a5ed7ce2e0a76b618ef7fe58a803e1159d9348e890cbb096d50c4f9
-
SHA512
26685b1aad10be860730cc73705ae6b54d4cea85f282d912d5362c7bb87f5975250dd245aca6c72eb95c897029620e4feb0567f47170d99ed7ddace6b753e58d
-
SSDEEP
49152:FEFbqzA/PvIGDFr9AtwA3PlpIgong0yTI+q47W1Ln9tJEUxDG0BYYrLA50IHLGfE:ZAI5pAdVJn9tbnR1VgBVm+nlS
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 3364 alg.exe 3688 DiagnosticsHub.StandardCollector.Service.exe 1552 fxssvc.exe 4684 elevation_service.exe 436 elevation_service.exe 4392 maintenanceservice.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system32\fxssvc.exe 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe File opened for modification C:\Windows\System32\alg.exe 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe File opened for modification C:\Windows\system32\AppVClient.exe 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\b746d431293b476c.bin alg.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 408 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe Token: SeTakeOwnershipPrivilege 1716 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe Token: SeAuditPrivilege 1552 fxssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 408 wrote to memory of 1716 408 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe 82 PID 408 wrote to memory of 1716 408 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe 82 PID 408 wrote to memory of 2128 408 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe 83 PID 408 wrote to memory of 2128 408 2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe 83 PID 2128 wrote to memory of 4424 2128 chrome.exe 85 PID 2128 wrote to memory of 4424 2128 chrome.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exeC:\Users\Admin\AppData\Local\Temp\2024-06-06_8f5598f81e2ce6718647d46f17169f17_ryuk.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=113.0.5672.93 --initial-client-data=0x2d0,0x2d4,0x2d8,0x2a4,0x2dc,0x140462458,0x140462468,0x1404624782⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --force-first-run2⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0a69ab58,0x7fff0a69ab68,0x7fff0a69ab783⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1916,i,8149030641423170942,8676239166699681064,131072 /prefetch:23⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1916,i,8149030641423170942,8676239166699681064,131072 /prefetch:83⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1916,i,8149030641423170942,8676239166699681064,131072 /prefetch:83⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1916,i,8149030641423170942,8676239166699681064,131072 /prefetch:13⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=1916,i,8149030641423170942,8676239166699681064,131072 /prefetch:13⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4244 --field-trial-handle=1916,i,8149030641423170942,8676239166699681064,131072 /prefetch:13⤵PID:896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4496 --field-trial-handle=1916,i,8149030641423170942,8676239166699681064,131072 /prefetch:83⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4488 --field-trial-handle=1916,i,8149030641423170942,8676239166699681064,131072 /prefetch:83⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1608 --field-trial-handle=1916,i,8149030641423170942,8676239166699681064,131072 /prefetch:83⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4808 --field-trial-handle=1916,i,8149030641423170942,8676239166699681064,131072 /prefetch:83⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4512 --field-trial-handle=1916,i,8149030641423170942,8676239166699681064,131072 /prefetch:83⤵PID:5864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 --field-trial-handle=1916,i,8149030641423170942,8676239166699681064,131072 /prefetch:83⤵PID:5136
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings3⤵PID:5548
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x294,0x298,0x29c,0x268,0x2a0,0x14044ae48,0x14044ae58,0x14044ae684⤵PID:6108
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\master_preferences" --create-shortcuts=1 --install-level=04⤵PID:1836
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x28c,0x290,0x294,0x1fc,0x298,0x14044ae48,0x14044ae58,0x14044ae685⤵PID:4480
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 --field-trial-handle=1916,i,8149030641423170942,8676239166699681064,131072 /prefetch:83⤵PID:5892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 --field-trial-handle=1916,i,8149030641423170942,8676239166699681064,131072 /prefetch:23⤵PID:5736
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3364
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:3688
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1012
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4684
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:436
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:4392
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵PID:3684
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵PID:2336
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵PID:1360
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵PID:4004
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵PID:4356
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵PID:2208
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵PID:3764
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵PID:4484
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵PID:2196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:5116
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵PID:2068
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵PID:2164
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:5168
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:5292
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:5476
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:5648
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵PID:5772
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵PID:4376
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵PID:6028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD584fd59d91c9ea4f377729ab5ecd3ae49
SHA130f8d85bebd1aefa5fcf5c542ab7719e52411a62
SHA2561f524de75e6ebc4e18c44f59a8194180c7070ca2a95da230f8953307c356b772
SHA51277426e840bf7c82cbc86f85ca4d0b4c0dd34490d69c145af073eed931ade7a7f80cda6758ba87319d842c141abe05469b8f6b65d0c2fc7df05a30dbd70ce6a36
-
Filesize
797KB
MD553306e96050055f0fa77cb243635f0b5
SHA1bcbf516ec477fba3e77657fa6cf50cbf356881e6
SHA256bb71f6f95f8c7c855596c2fa377fd65cd1289d9fdc0e7c9619a0c30702a1e442
SHA5124fc20097599daf753f0d8bde4a490251ffe04724c47229d6f3a073cd0d292edc4ed24fb5be0291bb1e504640fa70ac02f327143807ddbc566290d73e17ae7907
-
Filesize
1.1MB
MD5fb001ae821f17a8664112318be8fa8bb
SHA1fca2294d13606fb29788fb433ae4a657c294c862
SHA2561ba008a3440685997a97bb94667e8fff9a7cfd846650384e77f18d3439a9cd26
SHA512c63f218c711c5caf35121b340772d3a1867eb7e82ae5c060359c9abc1ce83556eabfa11ad68dc3fc6e3801b07e2ac55a33847bdbadeafbd03e2f2ed1e0bc43fe
-
Filesize
1.5MB
MD5625058ad44cfb667c796df029c14bea0
SHA1ddb6387ce7974f3f8401cb390e2a16e7a9cd11eb
SHA25686a88a2ceca03b318c6e2e684a0089af6b91c832c284707c582a73b67c3e08ef
SHA5123bf0a4d3a595ade85cd322fd5a63fb321bd1c8336eeb6c3ff3dbf833fa68338dcdccb3903bc97daee34e5c7a73b4eeb0c5f572a1a33995b9e0239a193aa95976
-
Filesize
1.2MB
MD571c6f1332074922965e11531412e6e67
SHA19403fb59ec0aaff922f9716aba09d5e2133e35b9
SHA256b068bcc7d78b6238d4f2f4a71af1c61a9fc1a058ded73c9346e29b6e9242197f
SHA5129050f8f86b421848a7b58abef1d7293f3106d84b016a44fd45fa5f65b2f32e4709c68ee70b624ca7af2331c9e154d7bb84908837d9e65aba517544eab04b013c
-
Filesize
582KB
MD528e14cfc9fedff62c3e3945589400d3b
SHA1bb9a1fa7e8236b8bef07cba23bebbd928ec0f896
SHA25672076c38d01e219b85f0c520e2704513a588f6c1e91fe1f5c93424edab3257d3
SHA512321e403c63ed1132fd96464be1c3f42e2dff943086844bf754fa5d43d0fb600b1dd6f8475569bbd369efeeca8634ba3a916b5987e89d27a5ae9fad935b752f1e
-
Filesize
840KB
MD5b6f16cdb2d55a81ecdadb784d489701b
SHA1eb9dc723e8eb9dd371f0f14cab2e048153089a2c
SHA2566a3e09ea5d76d6eae9ba01b8fc631b39fa9ca996a3d239a7c9d441ef2a133ac2
SHA5127dc37075555ac780719a9d6db7c798061a19463913a106379417b713e0c3caa52202cb96407dfebf2dc26a401d98d9a3ac3776e452df72d6539f319e1ac0c525
-
Filesize
4.6MB
MD5b08702806025bdfe8102c402c219c557
SHA1ecd0a61774a822aa746d428f4a660ebd6b4f1950
SHA2560d1b474b52caee6da3729dbd902f14b10693a84670e255d03cf510b5cd74f773
SHA51225c8002de0e3748dd3d1e062489defe16c3beb24523e6413061b72ab6ef1554394814baf146c2fd6b3c6c3c5f3abe404afca0371698fb0e9e1c1a5e4cc98f419
-
Filesize
910KB
MD5f8d243e8e4d45f29ade0bd9907f26e39
SHA1eeeca377df00ff7039d4bbc1b99084ea90dd7706
SHA256febea76bb0659f63d6619c5d29677efef82746079e71f598f9cd2306d67ec7bf
SHA512b1f7b61f11345b9d403154a05eacc7d53d87de3a41fe3ca3dc2948a165ec44554426421db5f656418d33789089b0309628d5e9b6c4ff7ac6be5653298e0b36ff
-
Filesize
15.4MB
MD5ebff01abc329ff2fcdb0dc30697fb0f0
SHA18a7333a70ba76ef7fa4320365b65730cfb83f0c4
SHA25602a55c02d47bf7bcb4ce3049012b9192cbb95865d31cbf8d0458c7926046865f
SHA5125e07883cc0f4bfc9c631e9f7f74ab4189302e2055a2b668c822808f4ae6e2cd5357a103dee3c19d4d42cefb23580df736a2d1259cc5184368d713970f96dd571
-
Filesize
2.7MB
MD5706cd3b4ef35d2e865092d7fc2c96de4
SHA18f652cadd832e202c09b5cf777205d6f24e39fbb
SHA2569321edb8055b55367279c5aeaabd568a4d4e2ce8018beb4260a2996e0be4c2d6
SHA512ac947754ab7fd8ffaff9d5db986141c056e8620d43c71789487e0746fda50f0077fc7863e63dd05cd94b7bfa8a5ddc9ae13ba7c778e74caa2cedadc32db5a6e0
-
Filesize
1.1MB
MD5f8ef4cda4767615a7f2e5f5e261e9883
SHA13f743a08049d0f5c5cd22985c8ea71b4fd835206
SHA2565752167e343f2c4003e69cff9e2c90aec258238a06c3b133feca2e2a169c6e4d
SHA5120391f5f0e7586361048bfc2872033b0a26da8eb437dedcc7df36b2ad6ac20b6b78b337be43626e7e25fd0de9a81c3734664c2d4899654218c05eb1e902c8c529
-
Filesize
805KB
MD5273eaf8559e6eb743ab47e07c7987a3a
SHA1f2cc6524fd4d538447cde1f958a31761afabfb8e
SHA256b8e680b8915a291f01e95a566ee429d899737d2493843b88f52a81acfc4e62d3
SHA512026067bbfa74daa226f41277b336450dfee2f866b68dc9d5187d753969ea646c84720940aade51d12704ff44501bc1f02c88687a32b5da08ebcb0c7dce4e55d0
-
Filesize
448KB
MD55c324dd6a46b56439fa6ad3634c0bb1e
SHA1808cae2e99ce527cb2bbde23571104fd63898fa2
SHA256b36ae4a49b9e2bbefe53dccc1d7be28c8aca54a409d63e11d9a4c1c148c42979
SHA512aaeba1ee169cf6b0e45a552d050d80cc48913568808de92646469f5cd233d95fdc23627ed074ca14d3d2dcb9a9421dae44df5bcf504d1bf17cf411b2190a76c8
-
Filesize
192KB
MD56393bb5560fec4fd8b04c5027b54bf08
SHA192c28c022d9d0b2ec169f12f218c4143c81883cd
SHA256d56e41b6063dc31f50f10fa7800fa654e1642abafa3a63ef875736884e586be5
SHA51272e027b782ba6ce5dc2f9e4098af9515efb56ae7f57f031f8832f8092e240bd5ce9d037b51f5b383e6a9b4ab4a575e0fc0f72d00d02f3187dfa8c9c06e70031a
-
Filesize
2.2MB
MD585c666d3fee034bf9b6ccc5464cbc656
SHA1c81090d8ef9ac12650f94e1d5c68b0f8606959ef
SHA25632f7dbf93fa5d8719c2f2172a26584ee5f354d2e4aef9db560347aa4b7b39857
SHA5128b562eca30f4805cd3e171bd4315c30cc3cf6dc6b482ad1d7d30691a31e40641aa366e25ab238ce16797c5856a8342ba5a4da53108f7dbf78ddc0ab454a38572
-
Filesize
488B
MD56d971ce11af4a6a93a4311841da1a178
SHA1cbfdbc9b184f340cbad764abc4d8a31b9c250176
SHA256338ddefb963d5042cae01de7b87ac40f4d78d1bfa2014ff774036f4bc7486783
SHA512c58b59b9677f70a5bb5efd0ecbf59d2ac21cbc52e661980241d3be33663825e2a7a77adafbcec195e1d9d89d05b9ccb5e5be1a201f92cb1c1f54c258af16e29f
-
Filesize
1.5MB
MD5731be4b8b94a19a52093ae4910f2b4fe
SHA13936d5c09004b951428e9f6fbd09e185c74337be
SHA2563d9180aca99926c1bc515ba7022114797121e508c7901b601a077b3a95003c1a
SHA51241a20b8412aaf6e632d0e47d99135d1d10900e7672d756cf56f2687b875a25b792ea076a65b18d025210f8878f77a008aad77c7d63ed8918ca2d70cecddc44d7
-
Filesize
40B
MD523e6ef5a90e33c22bae14f76f2684f3a
SHA177c72b67f257c2dde499789fd62a0dc0503f3f21
SHA25662d7beeb501a1dcd8ce49a2f96b3346f4a7823c6f5c47dac0e6dc6e486801790
SHA51223be0240146ba8d857fc8d37d77eb722066065877d1f698f0d3e185fcdae3daf9e1b2580a1db839c1356a45b599996d5acc83fda2af36840d3a8748684df5122
-
Filesize
193KB
MD5ef36a84ad2bc23f79d171c604b56de29
SHA138d6569cd30d096140e752db5d98d53cf304a8fc
SHA256e9eecf02f444877e789d64c2290d6922bd42e2f2fe9c91a1381959acd3292831
SHA512dbb28281f8fa86d9084a0c3b3cdb6007c68aa038d8c28fe9b69ac0c1be6dc2141ca1b2d6a444821e25ace8e92fb35c37c89f8bce5fee33d6937e48b2759fa8be
-
Filesize
1KB
MD52273f6cf6d2fe1f9c02ac8293e4a2d55
SHA1ca464ff734ed0d96331922056ab105247a7e9459
SHA2563f696f44b017ce9c965723f4d0d104c369fecf9eb234574dfa33f738bbc198c2
SHA512b61292f83b00b35c00210f9f197875b6fc21712c403bd9b10b35787122e2ef99f4b1d32aefe7eb3303c1dba39d29ecfdc13b9e95853fc5b3cda3dec3b76e2173
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5672cd6c9a8eb9e94e9dd0dc1a5be1d06
SHA1e1c8aaf383ec95d577a937dffa1b3451d9f3068c
SHA2567e58431af9785df6557094faa0431c01aa0447eb2ee0fc17239c9f15ef8cc73c
SHA5124ad34a363867fbeb52c2fb10a02b40453da923dbb81c6836fff53ef2dcdc10418811833d85ec41090ab017d91074467f052d57d4cf34f9bd2689995965759ff2
-
Filesize
5KB
MD58ce267ba0cef33e675db8d5e6e5f75f4
SHA1721120db323e2af64dfc66fb5348edf99943c2bb
SHA256edbd76a3f30199657edd4dae825df9414ee2b169c5c5ef50340012215cb49910
SHA512120b2684ba2dcebeb3fe538b086c2451dc5a9c85ae09b9a44fe663d3f6e0c7b9eb4a0c2a5c93cb4f43052b2998ffa98d9fcec26ea85a4e477c782476959d7d3a
-
Filesize
2KB
MD58441fa327ce1f6c12f371a1535e655be
SHA17ccca62179f1eb9a2d47c3886ad8ad4bf5b15071
SHA256975c8308bab1dce91143c9ad18effdd216bc367fccb3195ec2d4fd50177d2158
SHA512986088d4595dc5a9e166ecc0b439a878a24d512f236b2756e377050c0cc7423143d3aaa3033ba5163b28fe8551313ff985d6df2ab109117186e878ca4a98d0a4
-
Filesize
16KB
MD5acb64a92b662fba791592d417912f8ec
SHA1306e974ef36d8f567d89180a64f73ca6dbe1aa68
SHA256b57e8f6f375bd2dd63681ceec2679fc1115c48d1f64a0cb7fbaa6cb60f53000f
SHA5128cd049aae7f95efce8307d1865ee48247862347ad9b6f620aff903ff74c48083f28c4ff9b6f148b18310fd0881b081369f77175c1e7907b69c8f7ce3f3f58a0f
-
Filesize
263KB
MD5fe4aa80eb98b2fc353f7345663ef0f8e
SHA12e8c73f82b921c089f9a79a497ecd35580593b44
SHA256566d0819b5293b52e3042af2cdf5bdc4ba1ea21ec8d1c9e5c5aec695eab67a85
SHA512dbb12a4536f9b8af9fafe912989164e5facf50faa86479624f4ef7b21c328bbdf9192b1b1c15dbc02ca40150f3ecb6aab8a3b1704734825bba649e185112736a
-
Filesize
7KB
MD537c07049e8c86e590c0e5f2651a51292
SHA1e9eefcaf685562a30dd3d1e3b79676c39089bbf9
SHA256b8d0849d993a0567ba0840bc4dff555c8d1841bae4f09aa1788f4784a7dfede6
SHA5123a567370c39c68d4afde77fe315e78cf6dba2b3677d86b8f27eb6e73b0d38e3d4f295d2c6fcea14424e70704c48d685649613d24e451126cd235d23537a654f0
-
Filesize
8KB
MD5a737a41d8b7ce5981a41840ea8022f90
SHA1b3704165623d38be12a9d6f3e85e38d5ba3c8a22
SHA25686cb5b14db90e940f6b13bc5a739e5960dd2b51534622230e7e2dca9292877ae
SHA512d8113835739b9879265c8b00e767fdc07b25edaaa00346a98bff546ecac3691aca4ec905e288ad4dfc161afd5587865f53267c2e08e087e6e7b924d6e4e6ab4e
-
Filesize
12KB
MD58aca5b988603ed6cd012b30cf6737157
SHA19943f727e5b531acaeebabd060625747391cd3d0
SHA256feeec40ddff98f58c9a81f9472f1f192ffe6b996361383999c738de9ba3794cb
SHA51223b2f52f9205e25227e40eb090b6cec1825e1be836cfdd76f10d8054371a6d5c72f75b014adfbaef5b4b04e108bab11d4c71b67f9ac0ac39a5f70734d667c8ca
-
Filesize
588KB
MD59d6e52055df1546a0e631594bb1fa1e0
SHA174915797398ca3e6741c60994f3bed8ec53ace0b
SHA25631107d0c2516e57bd66c96991cd65c195a407cf9dcb0cf287247a3263d79360d
SHA51218d8abe1bd359de12674250ba8fb9a6d533317eebcf6b9229849560aedfc7f9e4e93e8d2cbeee3f8b3cf09fb6259d4ee65298c5a012566e556d9475f5995f3d6
-
Filesize
1.7MB
MD5ae5350e4f898b2e415d531c22cdcb7ee
SHA1ae01c02f1251555e3865b62c9dd0c88f358d6820
SHA2569cb758206c2e47c3a502da218a4b5c67ebd868b58a2f9b2baf6c839f63de97f1
SHA512ecbf69df4a920027f43cb88fa3b8878d1bcc1939fb2c20834d56729c1ead2fc8b7d9d53d2189d79b3499c972d045b502542b6d092ded6f895552975762e68ecc
-
Filesize
659KB
MD5489e81a792689c78fcdfbf4a053ac36c
SHA11c32b947f2eab236efe53aa89a1d25ae974872a4
SHA2563be111445bdbb25bf78000403f014368847bd12e94093c1894e886309b3eb5d9
SHA512fe041fb3d2ff97d3f257f52953847981245d8e4ff826c5c7c37d2854b050a67b20833d7d436e24b36143ba0dce06574323f8249715f88cba40ce94d87449f051
-
Filesize
1.2MB
MD5706450d84e8d15652fd146c582587e66
SHA13ccc2e5c263197e0559b0ff664727968b985e5aa
SHA256657861b06e489ef0cd75e7458add14cdd3aa8939df833ef0195547dfb3b390c5
SHA512f6995f781e65b26beb6e3e3c26f944843f772e53379db36d6f7c81981b3385245d453f806d9f7683de8fb802c2dfb27ea8573640cd5a4ef6e54c1dbe36ddf5d3
-
Filesize
578KB
MD5d116c4d8ef4ccb5f1b6f7f9a5e6af2f8
SHA18c159fb3d182b995c98a84897cbe5140c9a3c6ae
SHA25649956c1c12ffb8dc5ac01217f1b36ab3f96625f5888333b36defe0ad1ed8e8b2
SHA51298e5d920f5d1075c3908f9597d66f556f0fa63902a68774f83d64bae421e91b5f7cb673d06b0fc8898b40d983f2331cc7ac83c2a88ed87e22c919e7a465456ce
-
Filesize
940KB
MD5345cfb749e4bb59c4e1ab99b46b6555d
SHA1f4670592960079ffb4fdd28323fdda1eebe66574
SHA2568cce6dcff0ceaf1a9d58c69cf61316a99e565cf8bdbe6d71ba2a7adc33dfad5b
SHA512d40675382607d2cc5672326fb06a1265cb7d9b5b69e6270439a13d5a8f31ff84ce6f8ad86341f4109462e50b8d500d83bb2324d45b2607f64c58aff607a9c170
-
Filesize
671KB
MD5d936ee04f9a47b2fd12298acbb9e9394
SHA1c91dbbaab4a9755655771f49469fafe9f98b3f89
SHA25694d1c849dc9cdbd7807dd06ada272385b273bb310f4a85c9e81726c2267c381b
SHA5129354bb447652bd13bcb6b262ccc2ba4f6ab33ca478cd63738150d76e42752ee52cf2df7669602ed5453f54b2f4eb0a1954f5814b48c28915711bec1250ba0f01
-
Filesize
384KB
MD5b029f645596a76cd6c1c7fef8210e9af
SHA190f208b6a1a0448091be3fccc4c065d8cc34cb1e
SHA2563178209082723627b0cf6b789d7c5a43a50971c6bf3a6ccc3e8e669d5dc15918
SHA512b3b8d4795652496067846995b91c9252935d2b97872bf4ff2b581f678a1df8a79be7eacabb4a9cf932505ff21616b35f8fd9a0a74502f7bc81c643aa7c6648ae
-
Filesize
1.8MB
MD506aa9d21732c24a1e90cad0d1802b3ad
SHA10037cd3b9263e013fe14c365138f354ca232b341
SHA256eaab165c542a982d620df01c2b9063a15d5902cd88e1b6c7f368147085a44f3e
SHA5129319c8beac8d904526f5a516ef104200f6a7472132ddbf5ec27a423661434b9aaf5c81ffb64f964d238695cb05357bca83d04d061979772a2029449b86b4081a
-
Filesize
1.4MB
MD5f80e7144440f590023a613e88be65710
SHA1ad985416087f6c402d9c48d03e04abaa9ece5f69
SHA2567d81d25f896243a1b7ea2b381149a1525f1f521982fd42d1aa80e673ee083f0b
SHA512cf1e51444dadbf26cb7a20ec53b7f71d2e9a4de59c51f3b34ac9e2d9db0ab43582c9519f1332dca7e969cfe660a6337b563444e0dfd8b3cae3e3fb065f3edc97
-
Filesize
448KB
MD5d8878e3e3fd3a4a02bf16be179a9c7ca
SHA1c605fd228bba13b3eee302ee9e1e7e5471f093c3
SHA25604dc455ae03ec65bb7275458b80313f710a729cf2f5ca1172e716a0266537252
SHA51227259c9e40958be4a3af8c4fe2b16780ef625f80686f25cdce0942e827ba08be0a57de584d4ed46e5db70901707008d0e5105a7df37e8c1db372af22eb855a70
-
Filesize
1.2MB
MD5162cade24ce271b7f804305152b694a6
SHA1ae11c24b295221dbd5eba3f5f26b317babb0346a
SHA25694f9cfdd243e79aee3be461994df33065bce9596d9ddcbe9d76fe77564cab56f
SHA5129486f5871c03a97e9d648546dd3e9f8f4d1a84e19f962a6ba23ec5f3c2702d92b4ae5a84ed83a5381df1c89737d11e26844f91e44da40e54bb668a5ae86a36cc
-
Filesize
661KB
MD5fb75eb2f0a2fd949ddf3ac455f1f156d
SHA1f53e0216e72cb6795582d7c6cc045ad1009f5c48
SHA256bc95bb3a2dd93b908467360c16780f3dcb206b39d90d0398dd5f35518e3988e0
SHA512ecaea01dcebf684232dc40ef68a8c8739bc37485386f3170d518479b37355f3c2b36cee03b58a069104f7ddc5083ee6e99470e0f2d1043e16eceaa8c0a019668
-
Filesize
712KB
MD55557e2ee97330c5bb90741139a41def5
SHA11a4cbbf683fa4aa7d715c205d816942629d2fdca
SHA2562a8f9d709a04affe104ea391c32c4fafcefe10c1d5128a50512978d8c362dc3f
SHA5125f0289b1b8d280fe688e59c1d261844ac3e272da07a64507a809812d67aa1f97a60467c79c0615518b0102c6f494f5fc8acc7c72316c9eed490587a2e82e12de
-
Filesize
584KB
MD5888f953b0caacd3debed368c79df2741
SHA1a2b0298e03b7cd33504f3032bcf0933b50b75368
SHA256a6e25368ba446b7b8317585b840363c4f49efde50d24805e59249bf84738fc25
SHA51259c67eb6af9802321bf0f4db606a324999c31d121d73dc3ed1aa2ae45e980adf55d036d0b88e3ec159ed21c7bb2b1c6f1ce1c144607d2c09d28f032a21cbd665
-
Filesize
1.2MB
MD56e65b5e0b49cd9bb638b2babb61af763
SHA11c1080b3f1601dc0b05e2d89a117d0bf6db54c5c
SHA2567f1262d625dc54feefec3051b8a365119338188493140c9ad63616db66c5aca0
SHA5124176697c3ae5e37a915e18fecbe331d3681d3065782621b5e34fa6a09274538cc9013db6748bfc62e1254b65d7c0f5a9ca8fe58fb8b12ef8eac317784859263c
-
Filesize
448KB
MD53b6555f39f33e83e01fb5b7395b1de0a
SHA18d440b8b7e83d4a35dfdc7080c9d043d8f8c907e
SHA2564a272818ae5d23681b8d5a163650d0b6d1d7465071e18062191e3b89409253f0
SHA512d17e7eb1162c689668256298198ada3ac7b21c4abf7ba64417eb4e950be201d9272fd87e1f7d0636aecd4b827ee8fce3e97216e9dde27f203d5cbe2242704fc5
-
Filesize
1.2MB
MD5a957e5927353893c543bd253c52df506
SHA162ae9658e0f859e55a4334bb44cdc525af131f1a
SHA256d98a2a1e703385a21f32fac5f58cb930c14b66a5a7a5c698e1d42c75a5fe2a7c
SHA512916ec11210710651fe5c5538924bc7f45f78f0858560b19092c67a372a708639fe2bd2f9d978904392a77b5479f10b51c883697d5927aeb087d6d730320caf49
-
Filesize
40B
MD5440112092893b01f78caecd30d754c2c
SHA1f91512acaa9b371b541b1d6cd789dff5f6501dd3
SHA256fdf37f8111f0fabb5be766202a1a0b5a294818c4c448af0fec9003242123e3e6
SHA512194c7b90414a57eb8f5ba0fc504e585ab26b2830ed0aae29cf126d5a6c4888d508c22984aeedec651c8644fb1f874fa558b2090488516b33165fe7985d2815ea
-
Filesize
1.3MB
MD5b3e5d49ded27dc8831f7c1ae37517f8c
SHA19cb584f5c5d0e888679c0509ab0215786ddb0731
SHA2561282d1cc6182fa7fa39a6296211c55159b3cf7cc04230ca4df4583fbb9565068
SHA5123d7d0f30f5e464fa89e1f034f120142ab60b9f3a9cc4f03933f9387ca339ae6466332c5baf845e801b23df832ffed06636283bdd16bee9efa3a61da1eabbb2ed
-
Filesize
877KB
MD5dad093ba66447f6fd42cbc80580aa1c1
SHA16225b0f91bc5cd623800796c8166a0da058a2955
SHA256a58bbc14a7d4e4fa0f53313a362227dcb5b69a2f89e30ac1a3bf2dd676482235
SHA5128bbd1cf506972b591c9f08a0a8e6f6263e394ed50a7c0377f9ca241d34267f02935d0a4fe67e34444141518e5d3a6f9073c24d197b35de28fac7e6927fa8726c
-
Filesize
635KB
MD5cc35567d1a27f59ab6ed27ba9aa54753
SHA1035c200b5ce79514233bebc43754ac1227b80775
SHA256f6fec4b272a6ef426b7ad4e6a7a2712674924e6f83952cd19f9e409c74d95b8d
SHA512d5caace53d9a54799332ae9732a6d8786e1e97bd75ea05688b154c96155a58bcc2c361201eb50cfae7497bd536996bf53562cc3a940535a454059825c053b060