Analysis
-
max time kernel
105s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 20:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s2.dosya.tc/server31/w7rs24/sapphire.rar.html
Resource
win10v2004-20240802-en
General
-
Target
https://s2.dosya.tc/server31/w7rs24/sapphire.rar.html
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3068 main.exe 5716 main.exe -
Loads dropped DLL 19 IoCs
pid Process 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe 5716 main.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 620 msedge.exe 620 msedge.exe 1304 msedge.exe 1304 msedge.exe 3224 identity_helper.exe 3224 identity_helper.exe 5676 msedge.exe 5676 msedge.exe 6044 7zFM.exe 6044 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 6044 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 6044 7zFM.exe Token: 35 6044 7zFM.exe Token: SeSecurityPrivilege 6044 7zFM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1304 wrote to memory of 3652 1304 msedge.exe 84 PID 1304 wrote to memory of 3652 1304 msedge.exe 84 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 4224 1304 msedge.exe 85 PID 1304 wrote to memory of 620 1304 msedge.exe 86 PID 1304 wrote to memory of 620 1304 msedge.exe 86 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87 PID 1304 wrote to memory of 440 1304 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://s2.dosya.tc/server31/w7rs24/sapphire.rar.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa198346f8,0x7ffa19834708,0x7ffa198347182⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2416 /prefetch:82⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2892 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2900 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6212 /prefetch:12⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6640 /prefetch:82⤵PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6464 /prefetch:12⤵PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6968 /prefetch:12⤵PID:6088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2208,13182918468123454406,10898867181665925587,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3668
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3116
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\sapphire.rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:6044 -
C:\Users\Admin\AppData\Local\Temp\7zOC97F29B8\main.exe"C:\Users\Admin\AppData\Local\Temp\7zOC97F29B8\main.exe"2⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\onefile_3068_133693507008930346\main.exe"C:\Users\Admin\AppData\Local\Temp\7zOC97F29B8\main.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5716 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c4⤵PID:2208
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize624B
MD5aa27ca90f916f0d3e32292e7dfc12d33
SHA1ae5d43c4ac7dc282404c0616ac6bf1e5f019b4a9
SHA256bf2d2f8f064812dc0b71ba28814a503edc08bb9671242be919249ab7a422bff1
SHA5126336fda92172bc69a854915b742b92f2ea7149af7859a79f026283473491d5ca9e1527be43b06660bc077f6ad0f41e2e12633f69c3965a21780d7f80c53b413d
-
Filesize
3KB
MD546aa1c2b28e7366fc1d333d97d0088ec
SHA199b9c496d290672c627e62315b737004c61e9a25
SHA256daa1805f5ccf6bc6bea159eca9394b6d9067532cb9d1a3bc6bc9d7913334b3ef
SHA51259156404305edbccad5cd053fe294c18ae345a345699e6d238e730d4788e2cf29eb0cb9a17ec0cd02438b489c2291febbfca5f1a4f0a795f44e223f609e9da7f
-
Filesize
8KB
MD5c2d0a35023151631a956754a35d0ca77
SHA14f7b74c0fa052e52f8a88015e437ca3f4e0f29d5
SHA256ff9cf33b3f23698fd4e3102e3837672886f45295528d3e9ea7cff8c1b96a2361
SHA51268ac8d0aeb1496a0188eb62dd82937532cb08b30b0228bce763d1b93ef8017a891f47464d20f8ff389cc051a0faaa9ba70c718268a6642db00ea340a3118127f
-
Filesize
5KB
MD5f4301612815237be8f7e673e2166e609
SHA1ab65fea715d56b5a769909e742d1625896f2e62d
SHA256392028416bc613d549697d29ba7eefcb5c2242bc6a392184af863187bb64f490
SHA5125be32cb01cad351aa8f101186994eb0cb8bad02d20a40cf6e3de1715038b5e655bbd275e4fcb8ffb54f44d6744aeade52dfaf41a52c041479e8e81f101117e1b
-
Filesize
7KB
MD5663b058f12c7a98f79568ff9a15a0bb5
SHA1caa0acf6fbadf8e8a580f92dfc5f20e310f24845
SHA25633f699e579830749668bb52e507a5fdfcfd2612848a075b4d7d66cf629b52dcd
SHA51250d28cef6650b686e96f386511cf49a0859cf1dde1065a1258fb10414ebf49dbd6d98af8a7c6c008e3454917651838e88b2d84798ada4f03192e5ebc0fc65a69
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5935b87a0d4d6b72f9a3967fbbd7ce033
SHA147b3dfa5c1e47ca9d6e8e7fe557ce9d4b6a921b3
SHA2563951ba8f86f9d310a8827f5d44f93e7538615b4ddc8f3a5a9eb1d4c84e3652aa
SHA512d1733526bab81a2f589180ac3572dc675812f6109cf07470a85feecf04abc7d5aebbef22579314e9831fc7a88b207202bd425a2c74b4ac5ac39c11e3aa05ddff
-
Filesize
12KB
MD5a5058efe7b5e315cec56ac943b28ef43
SHA1ca9b038c85fa80b63462ade5a3a8b9840d8116aa
SHA256e9d690419cf27d54f871747cca1ea1e7d69793a61c2433916197714aba712c7a
SHA51249d2f78c380f3c775f6936d9807dbff8417beeb89bc7a6b8d908c3a0c3db0f970af50d81d834f8a05b84a76dbd14efa88c416a457b892ab33cf7ca1d4be271a8
-
Filesize
17.5MB
MD592f642212cdbe6ac3a8e6f48243a2489
SHA16c5b3c6fa506dc92cd0bb4aa36dc4ccdac77a727
SHA256ef24286fb0f5c05f739109f955521ae44bc74b52414c05722a06daccc07ca4e6
SHA5120af07851e1d2f014efe2ca6a943999cb746fa595dca564b18d3226bbb4866f4c4c642d6eaa2126297cbcb11fdcaa6c721a24c44d678aa643e1e2a32029480e95
-
Filesize
120KB
MD56114277c6fc040f68d25ca90e25924cd
SHA1028179c77cb3ba29cd8494049421eaa4900ccd0e
SHA256f07fe92ce85f7786f96a4d59c6ee5c05fe1db63a1889ba40a67e37069639b656
SHA51276e8ebefb9ba4ea8dcab8fce50629946af4f2b3f2f43163f75483cfb0a97968478c8aaef1d6a37be85bfc4c91a859deda6da21d3e753daefe084a203d839353d
-
Filesize
247KB
MD5be315973aff9bdeb06629cd90e1a901f
SHA1151f98d278e1f1308f2be1788c9f3b950ab88242
SHA2560f9c6cc463611a9b2c692382fe1cdd7a52fea4733ffaf645d433f716f8bbd725
SHA5128ea715438472e9c174dee5ece3c7d9752c31159e2d5796e5229b1df19f87316579352fc3649373db066dc537adf4869198b70b7d4d1d39ac647da2dd7cfc21e8
-
Filesize
63KB
MD51524882af71247adecf5815a4e55366a
SHA1e25014c793c53503bdff9af046140edda329d01b
SHA2566f7742dfdd371c39048d775f37df3bc2d8d4316c9008e62347b337d64ebed327
SHA5125b954bb7953f19aa6f7c65ad3f105b77d37077950fb1b50d9d8d337bdd4b95343bac2f4c9fe17a02d1738d1f87eeef73dbbf5cdddcb470588cbc5a63845b188a
-
Filesize
4.9MB
MD57a6a8c2a8c379b111cdceb66b18d687d
SHA1f3b8a4c731fa0145f224112f91f046fddf642794
SHA2568e13b53ee25825b97f191d77b51ed03966f8b435773fa3fbc36f3eb668fc569b
SHA512f2ef1702df861ef55ef397ad69985d62b675d348cab3862f6ca761f1ce3ee896f663a77d7b69b286be64e7c69be1215b03945781450b186fc02cfb1e4cb226b5
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
771KB
MD564acb046fe68d64ee475e19f67253a3c
SHA1d9e66c9437ce6f775189d6fdbd171635193ec4cc
SHA256b21309abd3dbbb1bf8fb6aa3c250fc85d7b0d9984bf4c942d1d4421502f31a10
SHA512f8b583981df528cf4f1854b94eff6f51dd9d4be91e6fa6329a8c4435b705457c868ae40ee030fa54bebb646a37b547bc182c9cbf0df9a07fea03a18cf85c6766
-
Filesize
29KB
MD5653bdccb7af2aa9ccf50cb050fd3be64
SHA1afe0a85425ae911694c250ab4cb1f6c3d3f2cc69
SHA256e24a3e7885df9a18c29ba058c49c3adcf59e4b58107847b98eca365b6d94f279
SHA51207e841fda7a2295380bfa05db7a4699f18c6e639da91d8ee2d126d4f96e4cddaedbd490deb4d2a2e8e5877edfff877693f67a9dc487e29742943e062d7be6277
-
Filesize
17.8MB
MD5181458ffd109573a1cde903e187b0b46
SHA16822c8b9cad8f13f3c0921205ada08efd693d93e
SHA256b177778656455f6b8482154238d323a3de4d74f2a8b7a62bd973251a259edb87
SHA5120f771e01e5f89dd83a8e46d129a7975b6ca395369d82411c9864805f1efa9ab7051e6caa24a5fad121391a25cb84dc991845da976265f3d67f8528aa01a280a8
-
Filesize
82KB
MD54438affaaa0ca1df5b9b1cdaa0115ec1
SHA14eda79eaf3de614d5f744aa9eea5bfcf66e2d386
SHA256ec91e2b4baca31b992d016b84b70f110ce2b1b2dfd54f5e5bef6270ed7d13b85
SHA5126992107ac4d2108e477bc81af667b8b8e5439231e7e9f4b15ce4bce1aeea811bc0f1aaa438be3b0e38597760cb504367512809ee1937c4b538a86724ae543ba6
-
Filesize
155KB
MD5737119a80303ef4eccaa998d500e7640
SHA1328c67c6c4d297ac13da725bf24467d8b5e982e3
SHA2567158c1290ac29169160b3ec94d9c8bcde4012d67a555f325d44b418c54e2cc28
SHA5121c9920e0841a65b01a0b339c5f5254d1039ef9a16fe0c2484a7e2a9048727f2cc081817aa771b0c574fb8d1a5a49dc39798a3c5e5b5e64392e9c168e1827be7c
-
Filesize
31KB
MD58bbed19359892f8c95c802c6ad7598e9
SHA1773fca164965241f63170e7a1f3a8fa17f73ea18
SHA2564e5b7c653c1b3dc3fd7519e4f39cc8a2fb2746e0ecdc4e433fe6029f5f4d9065
SHA51222ea7667689a9f049fa34ddae6b858e1af3e646a379d2c5a4aef3e74a4ff1a4109418b363c9be960127f1c7e020aa393a47885bc45517c9e9aebe71ec7cb61a0
-
Filesize
77KB
MD564a6c475f59e5c57b3f4dd935f429f09
SHA1ca2e0719dc32f22163ae0e7b53b2caadb0b9d023
SHA256d03fa645cde89b4b01f4a2577139fbb7e1392cb91dc26213b3b76419110d8e49
SHA512cf9e03b7b34cc095fe05c465f9d794319aaa0428fe30ab4ddce14ba78e835edf228d11ec016fd31dfe9f09d84b6f73482fb8e0f574d1fd08943c1ec9e0584973
-
Filesize
172KB
MD5a0b40f1f8fc6656c5637eacacf7021f6
SHA138813e25ffde1eee0b8154fa34af635186a243c1
SHA25679d861f0670828dee06c2e3523e2f9a2a90d6c6996bde38201425aa4003119f1
SHA512c18855d7c0069fff392d422e5b01fc518bbdf497eb3390c0b333ecac2497cd29abbdae4557e4f0c4e90321fba910fc3e4d235ce62b745fa34918f40fa667b713
-
Filesize
24KB
MD54faa479423c54d5be2a103b46ecb4d04
SHA1011f6cdbd3badaa5c969595985a9ad18547dd7ec
SHA256c2ad3c1b4333bc388b6a22049c89008505c434b1b85bff0823b19ef0cf48065a
SHA51292d35824c30667af606bba883bf6e275f2a8b5cbfea2e84a77e256d122b91b3ee7e84d9f4e2a4946e903a11293af9648a45e8cfbe247cbdc3bcdea92eb5349c6
-
Filesize
10KB
MD5723ec2e1404ae1047c3ef860b9840c29
SHA18fc869b92863fb6d2758019dd01edbef2a9a100a
SHA256790a11aa270523c2efa6021ce4f994c3c5a67e8eaaaf02074d5308420b68bd94
SHA5122e323ae5b816adde7aaa14398f1fdb3efe15a19df3735a604a7db6cadc22b753046eab242e0f1fbcd3310a8fbb59ff49865827d242baf21f44fd994c3ac9a878
-
Filesize
116KB
MD59ea8098d31adb0f9d928759bdca39819
SHA1e309c85c1c8e6ce049eea1f39bee654b9f98d7c5
SHA2563d9893aa79efd13d81fcd614e9ef5fb6aad90569beeded5112de5ed5ac3cf753
SHA51286af770f61c94dfbf074bcc4b11932bba2511caa83c223780112bda4ffb7986270dc2649d4d3ea78614dbce6f7468c8983a34966fc3f2de53055ac6b5059a707
-
Filesize
15.0MB
MD5b47518a173e1dd0c6064a0e4c19b16dd
SHA163e59684ffe68cf6491fdc8e0ada2beac232456e
SHA256eef1b2d466cfd73df414c4088a7f0b85bec5afc1cb7eedb529223032269704be
SHA512814a00260d125ca08887c5e405eddfa2fee5bb57e155ceb15c20c50d88144ab6c3a3c08c23a9a82e7bcdf0dd3a4199880d2a2d45d7978595dd4fdb174c7c9a8a
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081
-
Filesize
1.1MB
MD51905b5d0f945499441e8cd58eb123d86
SHA1117e584e6fcc0e8cfc8e24e3af527999f14bac30
SHA256b1788b81fa160e5120451f9252c7745cdde98b8ce59bf273a3dd867bb034c532
SHA512ed88cd7e3259239a0c8d42d95fa2447fc454a944c849fa97449ad88871236fefdafe21dbfa6e9b5d8a54ddf1d5281ec34d314cb93d47ce7b13912a69d284f522
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
37.2MB
MD50ad946002c138caf9d386817d56b336f
SHA1d6dc8114a97bab589090e1c6130196b26362dcdf
SHA256c22d742b7fdd1f873b07662331fe57d694f3153455a694db9df521f87f70b8da
SHA5129d574266c85e9bcd1ba37fb3a88ced929ddeecd51fb3298981359471ad3a8f7a81a6c8de71669b37a1af7b2dd73755db32732c2394550ceb8400e499d01aabbb