Overview
overview
10Static
static
1018a919efd1...26.exe
windows7-x64
1018a919efd1...26.exe
windows10-2004-x64
10$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1YTMonster.exe
windows7-x64
10YTMonster.exe
windows10-2004-x64
10api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-1.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 12:02
Behavioral task
behavioral1
Sample
18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
YTMonster.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
YTMonster.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
api-ms-win-core-console-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral16
Sample
api-ms-win-core-datetime-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
api-ms-win-core-debug-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral18
Sample
api-ms-win-core-errorhandling-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
api-ms-win-core-file-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral20
Sample
api-ms-win-core-file-l1-2-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
api-ms-win-core-file-l2-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
api-ms-win-core-handle-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
api-ms-win-core-heap-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral24
Sample
api-ms-win-core-interlocked-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
api-ms-win-core-libraryloader-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral26
Sample
api-ms-win-core-localization-l1-2-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
api-ms-win-core-memory-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral28
Sample
api-ms-win-core-namedpipe-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
api-ms-win-core-processenvironment-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral30
Sample
api-ms-win-core-processthreads-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
api-ms-win-core-processthreads-l1-1-1.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral32
Sample
api-ms-win-core-profile-l1-1-0.dll
Resource
win10v2004-20240508-en
General
-
Target
18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe
-
Size
38.0MB
-
MD5
5fa44c522a683d3ab4a9eec76aa01500
-
SHA1
f5e3b957d3765e539271f88493de4810fc0f75c5
-
SHA256
18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826
-
SHA512
d812fada01cf5897f99d67f4a54d7f5f33e0979011c7ddbe91f4f7431cdaf8c17b8a8b628a6b8d1420ca08e27ecf7aa2af2db27f9d503096a402b15a31c2c84a
-
SSDEEP
786432:/uOx/4eAIyk43cMd58nyccoADx7hPcO4AVEBuruGBn33+tliyyriq:/uOxAed54MS5eyccoADx7JcFAVEEtJ3F
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 4 IoCs
pid Process 312 YTMonster.exe 2624 YTMonster.exe 2524 YTMonster.exe 1564 YTMonster.exe -
Loads dropped DLL 64 IoCs
pid Process 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe 1132 Process not Found 1132 Process not Found 1132 Process not Found 1132 Process not Found 1132 Process not Found 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 312 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2624 YTMonster.exe 2524 YTMonster.exe 2524 YTMonster.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\ytm-desktop\shell\open\command YTMonster.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\ytm-desktop\shell YTMonster.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\ytm-desktop\shell\open YTMonster.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\ytm-desktop\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\YTMonster\\YTMonster.exe\" \"%1\"" YTMonster.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\ytm-desktop YTMonster.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\ytm-desktop\URL Protocol YTMonster.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\ytm-desktop\ = "URL:ytm-desktop" YTMonster.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 YTMonster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 YTMonster.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 YTMonster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 YTMonster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 YTMonster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 YTMonster.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2836 18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 312 wrote to memory of 2624 312 YTMonster.exe 30 PID 312 wrote to memory of 2624 312 YTMonster.exe 30 PID 312 wrote to memory of 2624 312 YTMonster.exe 30 PID 312 wrote to memory of 2524 312 YTMonster.exe 31 PID 312 wrote to memory of 2524 312 YTMonster.exe 31 PID 312 wrote to memory of 2524 312 YTMonster.exe 31 PID 312 wrote to memory of 1564 312 YTMonster.exe 32 PID 312 wrote to memory of 1564 312 YTMonster.exe 32 PID 312 wrote to memory of 1564 312 YTMonster.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe"C:\Users\Admin\AppData\Local\Temp\18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe"C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe"C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=A58B613C89AFFAC421241BC4E9612A2F --mojo-platform-channel-handle=916 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2624
-
-
C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe"C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe" --type=renderer --no-sandbox --service-pipe-token=6F5372A29E6AA9DF72828992E4B60D92 --lang=en-US --app-user-model-id=com.ytmonster.desktop --app-path="C:\Users\Admin\AppData\Local\Programs\YTMonster\resources\app.asar" --node-integration=true --webview-tag=true --no-sandbox --background-color=#131313 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-compositor-image-animations --service-request-channel-token=6F5372A29E6AA9DF72828992E4B60D92 --renderer-client-id=5 --mojo-platform-channel-handle=1224 /prefetch:12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2524
-
-
C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe"C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --use-gl=swiftshader-webgl --service-request-channel-token=FCEFBD3D59758C7ED02BD4829A69DC9B --mojo-platform-channel-handle=1784 /prefetch:22⤵
- Executes dropped EXE
PID:1564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5314b6466d99b73201b42a533e4579e54
SHA1724960b0d619011178c33d242a8d6fa2ee4682e1
SHA25694e7624fe9e67d144f540fbabde3dd5247dfd959a7131f5c81e44de45d6b0663
SHA512fc03931b116804f981416fb9d0cbb09cdd64af4ce4c86387a7f2d4a1d214dbf173369cf91b576f450d12504c4c64b114a4e9dbb9114d49902e669f64b5368027
-
Filesize
626KB
MD5d396985225d85caa7d743d67c7da6316
SHA1915d5829ed02171684c2a9e8b3b57f7a35bc1e2c
SHA256be2ef4f6d540d0ac5fddd556dcb6bfaf6cb6288679e4d64882d625ff35f173aa
SHA512d7b0df2865bf491c9caf34cbabefb7b7f04b35b85276a59fef0499d02b09651d8f6d0db9e87df4a9a1417f07784a8e5625e9805bc434b87d64e442ab98e24075
-
Filesize
85KB
MD59a53905892d9c9f3bf9d295c8b32e446
SHA12c5c56ff86fb1e827b2e0d479c529baea13eb561
SHA256d58e3ff10fd96a22a8e6d2fd76146a282cc45ccfaf2301257e76e7c2771cbd41
SHA5122dde975e15f95aa9310820cae009f2b04e26b7bafebb42d5822e3917017e4a37e17b0a71825f8f79f075abc1507d7d4d9202550fdd7a53ab54ac0fde4349fe2f
-
Filesize
18KB
MD549c3ffd47257dbcb67a6be9ee112ba7f
SHA104669214375b25e2dc8a3635484e6eeb206bc4eb
SHA256322d963d2a2aefd784e99697c59d494853d69bed8efd4b445f59292930a6b165
SHA512bda5e6c669b04aaed89538a982ef430cef389237c6c1d670819a22b2a20bf3c22aef5cb4e73ef7837cbbd89d870693899f97cb538122059c885f4b19b7860a98
-
Filesize
18KB
MD5bfffa7117fd9b1622c66d949bac3f1d7
SHA1402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA2561ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f
-
Filesize
18KB
MD5d699333637db92d319661286df7cc39e
SHA10bffb9ed366853e7019452644d26e8e8f236241b
SHA256fe760614903e6d46a1be508dccb65cf6929d792a1db2c365fc937f2a8a240504
SHA5126fa9ff0e45f803faf3eb9908e810a492f6f971cb96d58c06f408980ab40cba138b52d853aa0e3c68474053690dfafa1817f4b4c8fb728d613696b6c516fa0f51
-
Filesize
18KB
MD5f62b66f451f2daa8410ad62d453fa0a2
SHA14bf13db65943e708690d6256d7ddd421cc1cc72b
SHA25648eb5b52227b6fb5be70cb34009c8da68356b62f3e707db56af957338ba82720
SHA512d64c2a72adf40bd451341552e7e6958779de3054b0cf676b876c3ba7b86147aecba051ac08adc0c3bfb2779109f87dca706c43de3ce36e05af0ddee02bbbf419
-
Filesize
18KB
MD5c712515d052a385991d30b9c6afc767f
SHA19a4818897251cacb7fe1c6fe1be3e854985186ad
SHA256f7c6c7ea22edd2f8bd07aa5b33cbce862ef1dcdc2226eb130e0018e02ff91dc1
SHA512b7d1e22a169c3869aa7c7c749925a031e8bdd94c2531c6ffe9dae3b3cd9a2ee1409ca26824c4e720be859de3d4b2af637dd60308c023b4774d47afe13284dcd2
-
Filesize
19KB
MD5f9e20dd3b07766307fccf463ab26e3ca
SHA160b4cf246c5f414fc1cd12f506c41a1043d473ee
SHA256af47aebe065af2f045a19f20ec7e54a6e73c0c3e9a5108a63095a7232b75381a
SHA51213c43eee9c93c9f252087cb397ff2d6b087b1dc92a47ba5493297f080e91b7c39ee5665d6bdc1a80e7320e2b085541fc798a3469b1f249b05dee26bbbb6ab706
-
Filesize
18KB
MD5ab206f2943977256ca3a59e5961e3a4f
SHA19c1df49a8dbdc8496ac6057f886f5c17b2c39e3e
SHA256b3b6ee98aca14cf5bc9f3bc7897bc23934bf85fc4bc25b7506fe4cd9a767047a
SHA512baccc304b091a087b2300c10f6d18be414abb4c1575274c327104aabb5fdf975ba26a86e423fda6befb5d7564effac0c138eb1bad2d2e226131e4963c7aac5bd
-
Filesize
26KB
MD54e033cfee32edf6be7847e80a5114894
SHA191eef52c557aefd0fde27e8df4e3c3b7f99862f2
SHA256dff24441df89a02dde1cd984e4d3820845bafdff105458ed10d510126117115b
SHA512e1f3d98959d68ef3d7e86ac4cb3dbdf92a34fcfd1bf0e0db45db66c65af0162ab02926dc5d98c6fc4a759a6010026ee26a9021c67c0190da941a04b783055318
-
Filesize
22KB
MD58b9b0d1c8b0e9d4b576d42c66980977a
SHA1a19acefa3f95d1b565650fdbc40ef98c793358e9
SHA256371a44ab91614a8c26d159beb872a7b43f569cb5fac8ada99ace98f264a3b503
SHA5124b1c5730a17118b7065fada3b36944fe4e0260f77676b84453ee5042f6f952a51fd99debca835066a6d5a61ba1c5e17247551340dd02d777a44bc1cae84e6b5f
-
Filesize
24KB
MD576e0a89c91a28cf7657779d998e679e5
SHA1982b5da1c1f5b9d74af6243885bcba605d54df8c
SHA2560189cbd84dea035763a7e52225e0f1a7dcec402734885413add324bffe688577
SHA512d75d8798ea3c23b3998e8c3f19d0243a0c3a3262cffd8bcee0f0f0b75f0e990c9ce6644150d458e5702a8aa51b202734f7a9161e795f8121f061139ad2ea454f
-
Filesize
1.7MB
MD533975f1c1cefb80adf0357c2bbc6375b
SHA1583dd47246056431c907860ca5de14aca228d29b
SHA256500830b43caaeaf5b49208579f6e675955c7a26ddf3e93d1e7af047e385a6fe7
SHA512b305181c17cc524a4aec211984b3e394935bfcc554945200c6cca3d5de137c7391c076fc5d75f2b2f495d41da465cc891cacd0b94cf806e988b3eac2ed2ff90e
-
Filesize
9.7MB
MD562ce282dfe0ab8f2a35a529faeb61ac2
SHA1c35d6e4db540518263214697f589c54faac87533
SHA256c3b6588446b4a48e36dc135f9920ad246f5c84fe59c634b4225b009dd1dace13
SHA512a773bf66fcb9a12c1d8f3a760724c8438c7f240617b8099e4e2af979b84676892dbcaa866ca2fad59d2e56493ec3f96f0874e4e6e7fe7ca25e22ea2606e9a853
-
Filesize
17.7MB
MD58e9031ccfd8e12753bd99e82c9f140dc
SHA1227404035620218fbd969eb622a6afb69cfd6259
SHA256242bab387b53c3ff4a071547d8bde84a1a6ba71cecc8d999618a041fc24d867d
SHA512f589fee28d225d72a5f565412513bd4444211aed9e292b264e51da660532d489c7ddd8771a360cb80a4e4bae150f136a6287d407fbfd54257667a1d23d284677
-
Filesize
992KB
MD50e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA14189f4459c54e69c6d3155a82524bda7549a75a6
SHA2568a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
20KB
MD5588bd2a8e0152e0918742c1a69038f1d
SHA19874398548891f6a08fc06437996f84eb7495783
SHA256a07cc878ab5595aacd4ab229a6794513f897bd7ad14bcec353793379146b2094
SHA51232ffe64c697f94c4db641ab3e20b0f522cf3eba9863164f1f6271d2f32529250292a16be95f32d852480bd1b59b8b0554c1e7fd7c7a336f56c048f4f56e4d62f
-
Filesize
18KB
MD547388f3966e732706054fe3d530ed0dc
SHA1a9aebbbb73b7b846b051325d7572f2398f5986ee
SHA25659c14541107f5f2b94bbf8686efee862d20114bcc9828d279de7bf664d721132
SHA512cce1fc5bcf0951b6a76d456249997b427735e874b650e5b50b3d278621bf99e39c4fc7fee081330f20762f797be1b1c048cb057967ec7699c9546657b3e248ee
-
Filesize
22KB
MD5d53637eab49fe1fe1bd45d12f8e69c1f
SHA1c84e41fdcc4ca89a76ae683cb390a9b86500d3ca
SHA25683678f181f46fe77f8afe08bfc48aebb0b4154ad45b2efe9bfadc907313f6087
SHA51294d43da0e2035220e38e4022c429a9c049d6a355a9cb4695ad4e0e01d6583530917f3b785ea6cd2592fdd7b280b9df95946243e395a60dc58ec0c94627832aeb
-
Filesize
20KB
MD5f0d507de92851a8c0404ac78c383c5cd
SHA178fa03c89ea12ff93fa499c38673039cc2d55d40
SHA256610332203d29ab218359e291401bf091bb1db1a6d7ed98ab9a7a9942384b8e27
SHA512a65c9129ee07864f568c651800f6366bca5313ba400814792b5cc9aa769c057f357b5055988c414e88a6cd87186b6746724a43848f96a389a13e347ef5064551
-
Filesize
27KB
MD54dd7a61590d07500704e7e775255cb00
SHA18b35ec4676bd96c2c4508dc5f98ca471b22deed7
SHA256a25d0654deb0cea1aef189ba2174d0f13bdf52f098d3a9ec36d15e4bfb30c499
SHA5121086801260624cf395bf971c9fd671abddcd441ccc6a6eac55f277ccfbab752c82cb1709c8140de7b4b977397a31da6c9c8b693ae92264eb23960c8b1e0993bd
-
Filesize
24KB
MD596da689947c6e215a009b9c1eca5aec2
SHA17f389e6f2d6e5beb2a3baf622a0c0ea24bc4de60
SHA256885309eb86dccd8e234ba05e13fe0bf59ab3db388ebfbf6b4fd6162d8e287e82
SHA5128e86fa66a939ff3274c2147463899df575030a575c8f01573c554b760a53b339127d0d967c8cf1d315428e16e470fa1cc9c2150bb40e9b980d4ebf32e226ee89
-
Filesize
20KB
MD56b33b34888ccecca636971fbea5e3de0
SHA1ee815a158baacb357d9e074c0755b6f6c286b625
SHA25600ac02d39b7b16406850e02ca4a6101f45d6f7b4397cc9e069f2ce800b8500b9
SHA512f52a2141f34f93b45b90eb3bbcdb64871741f2bd5fed22eaaf35e90661e8a59eba7878524e30646206fc73920a188c070a38da9245e888c52d25e36980b35165
-
Filesize
18KB
MD554f27114eb0fda1588362bb6b5567979
SHA1eaa07829d012206ac55fb1af5cc6a35f341d22be
SHA256984306a3547be2f48483d68d0466b21dda9db4be304bedc9ffdb953c26cac5a1
SHA51218d2bdce558655f2088918241efdf9297dfe4a14a5d8d9c5be539334ae26a933b35543c9071cedada5a1bb7c2b20238e9d012e64eb5bbf24d0f6b0b726c0329d
-
Filesize
9KB
MD517309e33b596ba3a5693b4d3e85cf8d7
SHA17d361836cf53df42021c7f2b148aec9458818c01
SHA256996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93
SHA5121abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298
-
Filesize
101KB
MD533b4e69e7835e18b9437623367dd1787
SHA153afa03edaf931abdc2d828e5a2c89ad573d926c
SHA25672d38ef115e71fc73dc5978987c583fc8c6b50ff12e4a5d30649a4d164a8b6ae
SHA512ca890e785d1a0a7e0b4a748416fba417826ae66b46e600f407d4e795b444612a8b830f579f2cf5b6e051bea800604f34f8801cc3daf05c8d29ad05bcda454a77
-
Filesize
11KB
MD575ed96254fbf894e42058062b4b4f0d1
SHA1996503f1383b49021eb3427bc28d13b5bbd11977
SHA256a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
SHA51258174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4
-
Filesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
391KB
MD5c6a070b3e68b292bb0efc9b26e85e9cc
SHA15a922b96eda6595a68fd0a9051236162ff2e2ada
SHA25666ac8bd1f273a73e17a3f31d6add739d3cb0330a6417faeda11a9cae00b62d8b
SHA5128eff8fc16f5bb574bd9483e3b217b67a8986e31497368c06fdaa3a1e93a40aee94a5b31729d01905157b0ae1e556a402f43cd29a4d30a0587e1ec334458a44e8