Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 22:47
Behavioral task
behavioral1
Sample
Roogue Private.exe
Resource
win10v2004-20240802-en
General
-
Target
Roogue Private.exe
-
Size
7.2MB
-
MD5
644f88834e5ac39f4ae39e7ae7ac4fe8
-
SHA1
9e6d36935e03c978ce880ee4ffcd35deaa1be257
-
SHA256
c995ee6a0c0f1985859b6d367fd2a2f253d4910272d4600dcb37768cac3db5bf
-
SHA512
aef4ad4713bf3990599c9923923a727136861226b149905fcd12a469bfe689f2fb856efbc45572c938f23649fed5a3ff496840fd558f6dc50929159534d4e2c2
-
SSDEEP
196608:9qOT49D3jWMsQN4bkqrdWuTYAQNYelOat:cZ3irFhTY1lOat
Malware Config
Extracted
xworm
5.0
itsdaddy.zapto.org:7000
itsDaddy.giize.com:7000
GulJwRysiuatwEK4
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7423164379:AAFflVsuq0BrKEG_Lh8KPIRPN6rHeW4a7oo/sendMessage?chat_id=7472532856
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
gurcu
https://api.telegram.org/bot7423164379:AAFflVsuq0BrKEG_Lh8KPIRPN6rHeW4a7oo/sendMessage?chat_id=7472532856
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/4188-20-0x0000000000310000-0x0000000000320000-memory.dmp family_xworm behavioral1/files/0x0007000000023435-18.dat family_xworm behavioral1/files/0x0007000000023438-52.dat family_xworm behavioral1/memory/2612-53-0x0000000000EB0000-0x0000000000EC0000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 3 IoCs
resource yara_rule behavioral1/files/0x000a000000023428-4.dat family_stormkitty behavioral1/files/0x0007000000023437-26.dat family_stormkitty behavioral1/memory/1140-37-0x0000000000920000-0x0000000000960000-memory.dmp family_stormkitty -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023437-26.dat family_asyncrat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation ROGUE PRIVATE.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation SVCHST.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Roogue Private.exe -
Executes dropped EXE 6 IoCs
pid Process 3368 ROGUE PRIVATE.EXE 4188 SVCHOST.EXE 1140 SVCHST.EXE 1940 ROGUE PRIVATE UPDATED APIS.EXE 3552 SVCHOST.EXE 2612 SVCHOT.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0007000000023436-36.dat upx behavioral1/memory/1940-54-0x0000000000AB0000-0x0000000001A43000-memory.dmp upx behavioral1/memory/1940-225-0x0000000000AB0000-0x0000000001A43000-memory.dmp upx behavioral1/memory/1940-226-0x0000000000AB0000-0x0000000001A43000-memory.dmp upx behavioral1/memory/1940-260-0x0000000000AB0000-0x0000000001A43000-memory.dmp upx behavioral1/memory/1940-392-0x0000000000AB0000-0x0000000001A43000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\ProgramData\\svchost.exe" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\ProgramData\\svchost.exe" SVCHOT.EXE -
Drops desktop.ini file(s) 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\17c9d5e5339b574ab370670abb376628\Admin@PVMNUDVD_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini SVCHST.EXE File created C:\Users\Admin\AppData\Local\17c9d5e5339b574ab370670abb376628\Admin@PVMNUDVD_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini SVCHST.EXE File created C:\Users\Admin\AppData\Local\17c9d5e5339b574ab370670abb376628\Admin@PVMNUDVD_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini SVCHST.EXE File created C:\Users\Admin\AppData\Local\17c9d5e5339b574ab370670abb376628\Admin@PVMNUDVD_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini SVCHST.EXE File opened for modification C:\Users\Admin\AppData\Local\17c9d5e5339b574ab370670abb376628\Admin@PVMNUDVD_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini SVCHST.EXE File created C:\Users\Admin\AppData\Local\17c9d5e5339b574ab370670abb376628\Admin@PVMNUDVD_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini SVCHST.EXE File created C:\Users\Admin\AppData\Local\17c9d5e5339b574ab370670abb376628\Admin@PVMNUDVD_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini SVCHST.EXE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 raw.githubusercontent.com 12 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 37 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ROGUE PRIVATE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Roogue Private.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4028 cmd.exe 3372 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 SVCHST.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier SVCHST.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 816 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4188 SVCHOST.EXE 2612 SVCHOT.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4188 SVCHOST.EXE 4188 SVCHOST.EXE 2612 SVCHOT.EXE 2612 SVCHOT.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 2612 SVCHOT.EXE 2612 SVCHOT.EXE 2612 SVCHOT.EXE 2612 SVCHOT.EXE 4188 SVCHOST.EXE 4188 SVCHOST.EXE 4188 SVCHOST.EXE 4188 SVCHOST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 2612 SVCHOT.EXE 2612 SVCHOT.EXE 4188 SVCHOST.EXE 4188 SVCHOST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 2612 SVCHOT.EXE 2612 SVCHOT.EXE 4188 SVCHOST.EXE 4188 SVCHOST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 2612 SVCHOT.EXE 2612 SVCHOT.EXE 4188 SVCHOST.EXE 4188 SVCHOST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 1140 SVCHST.EXE 2612 SVCHOT.EXE 2612 SVCHOT.EXE 4188 SVCHOST.EXE 4188 SVCHOST.EXE 2612 SVCHOT.EXE 2612 SVCHOT.EXE 4188 SVCHOST.EXE 4188 SVCHOST.EXE 2612 SVCHOT.EXE 2612 SVCHOT.EXE 4188 SVCHOST.EXE 4188 SVCHOST.EXE 2612 SVCHOT.EXE 2612 SVCHOT.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2612 SVCHOT.EXE 4188 SVCHOST.EXE -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4188 SVCHOST.EXE Token: SeDebugPrivilege 3552 SVCHOST.EXE Token: SeDebugPrivilege 2612 SVCHOT.EXE Token: SeDebugPrivilege 1140 SVCHST.EXE Token: 33 2988 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2988 AUDIODG.EXE Token: SeDebugPrivilege 1140 SVCHST.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4188 SVCHOST.EXE 2612 SVCHOT.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4468 wrote to memory of 3368 4468 Roogue Private.exe 85 PID 4468 wrote to memory of 3368 4468 Roogue Private.exe 85 PID 4468 wrote to memory of 3368 4468 Roogue Private.exe 85 PID 4468 wrote to memory of 4188 4468 Roogue Private.exe 86 PID 4468 wrote to memory of 4188 4468 Roogue Private.exe 86 PID 4468 wrote to memory of 1140 4468 Roogue Private.exe 87 PID 4468 wrote to memory of 1140 4468 Roogue Private.exe 87 PID 4468 wrote to memory of 1140 4468 Roogue Private.exe 87 PID 3368 wrote to memory of 1940 3368 ROGUE PRIVATE.EXE 88 PID 3368 wrote to memory of 1940 3368 ROGUE PRIVATE.EXE 88 PID 3368 wrote to memory of 3552 3368 ROGUE PRIVATE.EXE 89 PID 3368 wrote to memory of 3552 3368 ROGUE PRIVATE.EXE 89 PID 3368 wrote to memory of 2612 3368 ROGUE PRIVATE.EXE 91 PID 3368 wrote to memory of 2612 3368 ROGUE PRIVATE.EXE 91 PID 1940 wrote to memory of 3372 1940 ROGUE PRIVATE UPDATED APIS.EXE 96 PID 1940 wrote to memory of 3372 1940 ROGUE PRIVATE UPDATED APIS.EXE 96 PID 1940 wrote to memory of 880 1940 ROGUE PRIVATE UPDATED APIS.EXE 100 PID 1940 wrote to memory of 880 1940 ROGUE PRIVATE UPDATED APIS.EXE 100 PID 1140 wrote to memory of 4028 1140 SVCHST.EXE 104 PID 1140 wrote to memory of 4028 1140 SVCHST.EXE 104 PID 1140 wrote to memory of 4028 1140 SVCHST.EXE 104 PID 4028 wrote to memory of 1900 4028 cmd.exe 106 PID 4028 wrote to memory of 1900 4028 cmd.exe 106 PID 4028 wrote to memory of 1900 4028 cmd.exe 106 PID 4028 wrote to memory of 3372 4028 cmd.exe 107 PID 4028 wrote to memory of 3372 4028 cmd.exe 107 PID 4028 wrote to memory of 3372 4028 cmd.exe 107 PID 4028 wrote to memory of 4856 4028 cmd.exe 108 PID 4028 wrote to memory of 4856 4028 cmd.exe 108 PID 4028 wrote to memory of 4856 4028 cmd.exe 108 PID 1140 wrote to memory of 4936 1140 SVCHST.EXE 109 PID 1140 wrote to memory of 4936 1140 SVCHST.EXE 109 PID 1140 wrote to memory of 4936 1140 SVCHST.EXE 109 PID 4936 wrote to memory of 2292 4936 cmd.exe 111 PID 4936 wrote to memory of 2292 4936 cmd.exe 111 PID 4936 wrote to memory of 2292 4936 cmd.exe 111 PID 4936 wrote to memory of 3588 4936 cmd.exe 112 PID 4936 wrote to memory of 3588 4936 cmd.exe 112 PID 4936 wrote to memory of 3588 4936 cmd.exe 112 PID 1940 wrote to memory of 552 1940 ROGUE PRIVATE UPDATED APIS.EXE 115 PID 1940 wrote to memory of 552 1940 ROGUE PRIVATE UPDATED APIS.EXE 115 PID 1140 wrote to memory of 816 1140 SVCHST.EXE 116 PID 1140 wrote to memory of 816 1140 SVCHST.EXE 116 PID 1140 wrote to memory of 816 1140 SVCHST.EXE 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\Roogue Private.exe"C:\Users\Admin\AppData\Local\Temp\Roogue Private.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\ROGUE PRIVATE.EXE"C:\Users\Admin\AppData\Local\Temp\ROGUE PRIVATE.EXE"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\ROGUE PRIVATE UPDATED APIS.EXE"C:\Users\Admin\AppData\Local\Temp\ROGUE PRIVATE UPDATED APIS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\system32\cmd.execmd /c cls4⤵PID:3372
-
-
C:\Windows\system32\cmd.execmd /c cls4⤵PID:880
-
-
C:\Windows\system32\cmd.execmd /c cls4⤵PID:552
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOT.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOT.EXE"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2612
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4188
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHST.EXE"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1900
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3372
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3588
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Admin\AppData\Local\Temp\SVCHST.EXE"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:816
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x300 0x4f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:2988
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\17c9d5e5339b574ab370670abb376628\Admin@PVMNUDVD_en-US\System\Process.txt
Filesize4KB
MD56e89696ed880f5c9c3c4a53a04cc0340
SHA105f3fa9f03854097a8670951d88a19a1ee7bc6d8
SHA25626735fdf8ccb5a61d0153ee8319afb419090b742979c97d5769a1d105a9d73eb
SHA512205dd023715da066e3995c9cee2ae192ef53aa10cd3d59a6497683c2d89d74aede975e667ef3b830649a01d56b20891ef35076197da53aedcdd8b352a1cc1153
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
79B
MD5297a7e4354322e620a7d1c855303922f
SHA120564bd46ba8ae2fca9b4dba7de597a821e606e0
SHA2565160ee6ede7499ed65d9a07f09f206f7f0a21f32ce30f607ff53327123a5e03e
SHA51256d289a1b8c5f1b35321ad06e51471f89dfa67a528b68f7c3047f95f79196734cf637846fd8c690e32ba232fc043a750ca8cca43ad96f73597d8202bd1d24a6e
-
Filesize
158B
MD50fca57e6759c79868eaf8b51adbd7ee3
SHA1812d11ec42c3eac92867f2696a03b0378d996b14
SHA256a009d3c22243c13e8092333ecbf587bb7b25a066d01f757a87cefc8db2b10a1c
SHA5121e029aafa6cd424c74349e0665ff3e5a859051c0621ac7127206bfeb480aeb44451bd494c636832533c06dfbac47c8a04a89ed1bd3a2281cb9137d97abe51ccc
-
Filesize
172B
MD50cd3b53172b113bccb259aaa199f5871
SHA1b34ccc31fcbec322ddae347744a8e946a355f328
SHA25607f506d92761d09822c51386a24fd900f9c072b0e87d45c9a2686c862839127a
SHA51202879d2c40495a66b4f4c839a0d980371b7ee1c9441bc5964b59aaa039716c996afe202f40e3f7d39f143e9a79367f0bdcccd6b11c71f8da508eae4f6a2feb25
-
Filesize
173B
MD5bc5b820bc70a28ca6fd23d9196227a5b
SHA1b64b41840630359fc97775d183012df883fba63c
SHA25616ece5bb11caf3098e4058d7fc78c8abcd6463f200ed30fa1005454c95b77588
SHA512f60bfbdfb50118346cbd0eeb433217dd84a9c17d6eb90274dc27bf6f21dac4d0d8d2a21d14fe54050abd43c77d32c34d1a229fec76c248a7f964c2cea57d25cb
-
Filesize
174B
MD554cfaac736ae6cce770b975386ede82f
SHA1c45226ded5cfa90b52c6e6371588e7b23d3d9f3b
SHA2560d97a00c43a8b6933c82f93970ad0edd1741210a81464910e9571b15043586b3
SHA5123f3a3899ca8f37deb816e75f5b250a18489fb83411f56ed78641e6cafe40937f8fa1c0767fdd33b8e4c063d72a4906574cc83a7ecf6fd402ec13af54d8f7d682
-
Filesize
181B
MD5cee4138d2734b075f3719698be07e83f
SHA1bdb268f3a4590bce0b2a66c5ad228ddb5912588c
SHA256ae7acbddf123e8fec56495780c5e7e0872504904d17ac437214f1cef6bc7d1d4
SHA5120573fb1330c36cba2b96e46f9963c9b512e25598db6bbc2315439343cc55e7f968b2c8b77151cc268c4f71b4bdb5a80bfe3dbfe72965f97bc2c5a7a25d08f0c2
-
Filesize
188B
MD56c994e87eacb615cff893a40ca00dbe8
SHA1d40e22d76b539ee143458d1b8836c6ccb1adb3e9
SHA256ef0dca134ef8b60eeb7e6da3c5ad3394e0426fcb11e5bc58936b1d8bfe697045
SHA512561e8ce4789f177c30f4108d7a4582a3de5ac4c4192a5b7d940dfa2b993887d30f28193dff142095167a3df64f8c982786ddf0d9a1b57c39df7a4ec239b20d22
-
Filesize
195B
MD5087759ee74a74501cdb75d4ccbc7e82e
SHA1ae7725f17c10f9915b853fc0fc0ebcfeff58b996
SHA256f37377077464971bb468286241ad943f8ee88ea294d90e83210d126e7695d7f4
SHA512ff60897d48d00c5a2638d1deb648670c3573275c42286e46c69aa36425ab05ab07590e10c2c0f1e8780511d97ce40aa42e5952bcac24913a44b05afce0d13a4f
-
Filesize
202B
MD58795e4549cbb90dbbf2f0861e9cfee7a
SHA16a661ebaef04bdfe9130c1139b380fd0e980965e
SHA25658501b6ec400259810dbb4582e576a746b601ca2758ef1c253ffc8daea347ca0
SHA5125a6569186f4994c8f18f458946d1657f0c755a649282f77b7cede25d4226602fe6c36d3385f5022a05619ac431b8448506765d063d9b509992382af5589c0063
-
Filesize
209B
MD5cf0e7ea5e2290465a5fd0f98b537291c
SHA1936f7245d58755b01e0c2c7fbd8b7eb971ae854d
SHA2560936656219100e7ce35c2ba5f04bdc962a39aa16b0a636d6ead0d6353e6250e7
SHA5129bab68b99768b3cb1b2de7946b7ce564c00064d8212b97425dcd5d6e29f76830b296205a998f9c936fa646eecaa1fabaaa7a441b4ad4e2961abc317200084c1f
-
Filesize
216B
MD5423e7a5fa2717530c00492a65867a1f8
SHA1cec586b96f085226b4d74cc1fde04e0cabf9baac
SHA256597475590e8762d0944dfda707993f7a9d65b7dfd1947a3e2840f4b3faf1c247
SHA512c211283a0d48130d88a78f68a798f0ee67052dd75e6124be3e08216e6a2e4b646d56e3a588bdf4c7df81bf5b1eb4412f551ba43f8c0e54970f82bbe4d3528cd6
-
Filesize
223B
MD505b7112a64ed140f03bd17dbe366bfbd
SHA12fba236d424dbf250e1959f542748df083079bd4
SHA256fe0e7b8bfda39f6e35c4b11b0421e5e75a32e0b6663470697dd22be990b3c9c6
SHA512aeaf8040677c75c056c99b134524b56711b43ffce18e2f49bba952e357346be1ee0fe05fa410527cb05aa7547b5816cee8e24103eff14d1195b27d31c1dcc369
-
Filesize
230B
MD517d0c20912984c1d5e5fa83e1d17a2c8
SHA1b07b0a6afd1bab1b9404c44c2444eac27eb30215
SHA256b7a50afeccad8b733367a4272447b630267c772f98f3e9f26c7eece864a259c3
SHA51282bf30619e917f7e39c4a1c11d09edd17e8c0c2c9fd674753fedcd3daf88fe5f45e72aee78fd271d864aadfa2958a7c67d5926e84f2385dfcc6d5495ab2da363
-
Filesize
237B
MD52785b27f555b579ba52cea6a03992563
SHA1e71d20296ab6851bc4346a50dae844a949bc6a79
SHA256faf1efece27c0455aeaf9f2558bf401ef7388cb3ca7bbdd009bae8357f6cf7d3
SHA512711e3c0c9ce2026ff40d35beba23896d78bb5f91f0958863c34560e34d1f612bcdbed9e2efc2d3ca828f9bf467104b4ac9cd06ed924077104700cd03ead91f95
-
Filesize
251B
MD58357e9f0ad66d355a79e4f8101b4541e
SHA1d3cd33ded2be3a2c2b0adea50818d7efbc5cd761
SHA2564c37c4aa2b5766507dbc3eceb490a535c19dd836a5bde9d2c878553a5285993d
SHA512c85a24016512243cd6383896b1b54c6132bbbd744805a5c1fc19b1e98920a687f6d7b3daeb6ac34494f23837a2b842b179d6f9bb4718e117729f95b5f99a151a
-
Filesize
258B
MD5c6570471bf1b303f1ae0cf540a3ddf36
SHA1255f510f9dc158cb33380fc80e15c01304f34213
SHA256ae6f19d2e3314a9b83540d8de2663d1af90fd9942680b68e79826ff9de4eed36
SHA5129b6948974507a992ac1915970783a34f2696bb9ec2986bda41aa45886340f212c6881bae60699f5496b5d5a877467f970304d74991466e323b596f53ded54ef2
-
Filesize
265B
MD58e087e29aecf037952bb77d97aa46017
SHA1b9a3fef4f68375631501e69b90951216e4d91192
SHA25613760588b752e70f132554efc622e0c8efcaf75d5c51086e7932346bedca86c6
SHA512c55ce564bc7231c694baa00663af880cd78159146deee5d988ab19ec6449d27ab62ba14eb256b97adaa0b2d8bed89e05f6104c59012c50e6eddbe04006f72a9a
-
Filesize
286B
MD520f0d54cf108a995babe955513737236
SHA1fe14f3dcaf199c18294d7923dcc71a63688cb344
SHA25678b219f25ddf5debb1bc071fc092b9c1cc2fd22a2426fe5046faaae787ac8490
SHA512e29baab2dfd366e6823be65e3a7747702df72691bcb0bd20f1d867be96110a30c20ae11102bfe99b1ef107a295f972ae5f397e28a75e8c3a3355a93555764540
-
Filesize
293B
MD532a4c3324ffd0a85095fa69860c706c6
SHA13e6d1205c4b7120c990ea7836da287d7bd1ef7f8
SHA25690b892f93ff69fade8190828308ffa2e977926b4a6a0fc5c1906f427dd482a44
SHA512821e28f08d26a973d892a05ad428b25f0e0c6c4ccaa19680ee33b7b1822aa3e143084b8eebaf47ad750429a65ece1e1a2a008fe52b49f20fd1f431ab7c908c1b
-
Filesize
300B
MD5d851a15a28310743ffec1fde4e885f82
SHA117c32d24d20cfe0aefc49395732651765e8933b0
SHA2560f349934f7d809591edd8cd3f356e89b5161901866371c58b2f9b7217caed0ce
SHA512c171195762f7fef3c20b873918f32b17e917174f7609436d9c20b70b6201190d50a77152b2313ad207480342f36a0b04fbb6f8d26235ebcfdc30a4bb1d45a7ad
-
Filesize
307B
MD591fe80f9d56ae1a0976e07128ffea3f5
SHA11efaf3ca94acd08b0846b2eb7d2c9b03705e5652
SHA256ffb61698249a82c67ca60fda899e8079140973c70d4b15c62063e181524e6d36
SHA5123559c35abe9e925da04c99d73238732c14b70f9d289c467a77b3eb894b0c3d3f29edb7d07543c5a9e4d8af15a4c5b6da516d75d3ff022dbffaac4561992032da
-
Filesize
314B
MD590a1d5ecfb9acab8e8fd2113acee6e8e
SHA16a5642e3f54c20efeafcee8dcc3e4ef5e8bde187
SHA256cb44b452145bdb847c3407aee4fc248b3d281b52ad3f8ed2f6467d920315d780
SHA512b6ba35cd0d8df342714e678ab6b76e17ff70e9c6cb3b7ff6fee096d9f76b8363471354c495ba156220a0ae977a8b65193c515d2e40c81d99a7c93dcad75e47e4
-
Filesize
321B
MD59a038a734ea405948385046a1d02a699
SHA1d8561606bd1495321a58a59c83fa7a86b66c55fa
SHA256cd41eab0f13b962e97bfac78e01520fd280e500703fd406aeea41246dc6f25f2
SHA51201255e9260c7fc60e469140e51c14cdae93732a6ef1438d183580de83e7cafc1b5b67bcd9a45fff941b3986a4c51f1f223796122e77d41be7e627147c41abe69
-
Filesize
328B
MD587fa21e36c8948cb6ed5bc7086508a28
SHA1a5d457bd5f38586d475ff8d8b6b7d6cb80bd5ea2
SHA256d0ea1daeb433793f938066ff0f5a77664fe216078ec9b6089b3ee5efb4120552
SHA512cd7658d651b716b3403ec9d51a43b131603aa276fbf09013166d8e4e03c9cbf448db5ef6159a5337c6077297a5f63722212a0d431633bb22c0b13ed0b013f1ce
-
Filesize
342B
MD545573c724cccb85c7240a9fd0a21aa84
SHA1900cf42dec15b8f179f9bbef47c3e4ff1d04bef1
SHA2560e29e48b7efb40612ca9e9698e01e55246e5a86eb899a42f4b97f0e0b56eeb6e
SHA512289f4f6873e3335258f9110cdf398516c4387ea6cfefdfad265959193efd9458ea5bc2f7b3607d4a06c54e585fbb6362cbb2e8748c23811bbcf5c16afa90620d
-
Filesize
356B
MD506033485b8e7c45f956a8ba7a40aded5
SHA149853710b657e98f7307a76adfcef173319ed70a
SHA25643a23b61ebf485a220b3fc4911231601dd1d2e50438cccbf9bf6f60feed44069
SHA5127f787dca9ec36f128e3d064a8da64496a4a4e568fab3799558d2979ea6d3a12d47178be4c6d72a0b651493e7674dd4aae7ab460bf1ffffe5b193971a9d920551
-
Filesize
370B
MD5c4935dd8cb10849adbc66e69a48e3634
SHA103ff959c9616c69ebcb45373d15fb0a3705e4458
SHA25649fc04c7fecd817ee350179bf5b29f2143ded8eb4c507bceec9754bbaf7f3bcf
SHA512e5e44c704468cfc58c9b98afee94b6cc465213aedd8a7d2353d465baaead8bd968ad2ce20a89e17754dcea5f6de4c7e1b8308970f27166d7b445569cb786f5e4
-
Filesize
384B
MD511defc7ce654bfd7601bdbe6a9b23f28
SHA177abcc578cf2411a969f583cdec74a9e5a04dc01
SHA256ab96baa02f141a683a8d89bb8a2dd29abe7fedc9c3c5cd3e57a4b3bb7d36f56f
SHA5129b95daa6762c0cecdfe73631bd3b501af9a091fba67656cb806fe8e975904b3cfc0dc522ba83ae819dfbf67abea8525f856b6c1dcd2c2611e425d786586b8fd3
-
Filesize
398B
MD5a732cd09c8eec26e052d35ca95a95b65
SHA1aa85c792e747a4efb41bc037a224baee9c87357b
SHA25605c32ae39a9d0811fda92bff6fb5c3624cbcaadbe7ffa371ec28ef23d4cefec5
SHA5128996896d9630aa0829145b5cbe2377864938c3fa8ae55d101f2fb229e3b363bc2e037157536de25a35f2fdb63605656781bd9151390017bc83323b5bb8cf05e5
-
Filesize
412B
MD54f2202e88f27af60c1aaa58d31858e05
SHA1810d0d00962584dc963cd282cf51f8e8d3fb0952
SHA2564efaf4a89d06fed3cbd39152b24096a8a6b9cdd6d1db9c0fa61e05c432899f0a
SHA512767a6d46f8e3dbb2dda6750b5beb05ab057440035f7f64855ed2ca1f339000fbb3a26468cec692272ceb0fe4796de7d565647fda4d740c4e7475dc1f3d4d6b15
-
Filesize
419B
MD56c4534c6ef108f5041b431b8bca88378
SHA1ef28b9608e93e737d47dd5981519e94f437bcaa4
SHA256023d26f1614d9dd887086dbeacc2ca185666f119789e75a2ae86eea908df1074
SHA5125e7f63c9dafc2ae694faf0f8100ef04e777cbd52e3cf0d29d2268c1ce01ac67f476e9ee9585bb56f4eaaad8f3c09099ea1b78c9d9aa584d247c333e975904d4f
-
Filesize
426B
MD5b8aeb0b3477553e3305b48bee71d1453
SHA1b56c662895139f714f32d23142fe6b629f013b5f
SHA256c5e84cf6c555e0e0287c0448036ba9756590ebd2e5d467573d677626aaf41437
SHA512795ba5ccb7736be3a0023d7052a17619712caaaefdb82f7ea4ac29288cfffea3ae418373af5831bbdee08cd9beb91dcf80cce34bf4cd655a2060bbfb0863fbec
-
Filesize
440B
MD5a02d50501e31fc1a1139f1c06aa1e250
SHA1b6248ec5e0baaea34fd4aa9f5e03b1097305bb64
SHA2562f1b9c0e6d52219b8d5120de56f479decf9aa40dba9eb2dc9b32cf362ffa8d02
SHA512b5ff7caebfb52ae545f4c1629856e75b3af60cfa06a5671294647d1bbe1a46279c539e66d5da4cf6a2901b4133503951e3d7c8d593b6801321f9e8ed75a82690
-
Filesize
454B
MD50028d77a4829af6fca93350f7c907ea0
SHA1c30de5f4b20470719bdd71013f3ec04617bc2a18
SHA2569e55568b195e35a291c5a72b3b05f4a5f35cbb137b8c5cde9a09a556a7d98e96
SHA512c4f48f5df0b26c9c65ba22db7038659c86e8fb0f5ef66c42baa34fea1f703ec69a34cccad46efa668a4b571a3a5b501f67d899fdc0f47edbbdfe2af73f000c11
-
Filesize
468B
MD5148e70132c99d97a7f49640966278c0c
SHA133ae9d972b1beaff1437a50df153870ce3ba61d4
SHA256b2f3b1753226c27deb9ec84e404d6cbcb4b9bb03eaa289baf7745d677f952a32
SHA5124c2e846784a9660fba421b0dad3e1f92b2e42a9a32ea7f3c069701659bce1d45686c93f4374edff11fd3517c5a693be74779cf9d814cb08ab5a4abac51181f64
-
Filesize
482B
MD522ecf681dd5b6818a21f491c12a8e739
SHA15d057af945384bc8e5f4e169249b33c3d8921fd9
SHA2565b9d8cc7087b20cc69ecc3184bf37cd0f545d54cc9ad31518e880c4cb025eb1f
SHA51277360a08ab265decc2bd5c2314ca1771b7813dfec7bf3c07a074ffa1137c96d89a147956ee020bf51e441da20e328fdd2dbb74c19cec5920c12fbca406d32b96
-
Filesize
489B
MD5d2404c83556a30dc02201b3e4552a8f6
SHA1a7fd10f4d3940398fb2c1c10ab6a1244c156ca5e
SHA2564a363b89d5d83b0c11cb7a282eeee7cc732c11a83cc3055d3124da5c0bc9df09
SHA512cc51fef667348379603c0b386eeb423e6360fa3d9592880254c482f9b6c3817f6e1709b1b9563b2f4982d41f783527a19f34887d793b86ee53aa75e9914ed1f7
-
Filesize
496B
MD54818bf2ee13a602794c98da6a141a7e8
SHA1d5ca3b5a3aa365119cd49ba5682d80ae8a510f35
SHA256986d80ffaeeda295431c2e8558b2656248f8085e1e90c7e663006d87fe92c35f
SHA512ad841874a81fe0452fe7617b1339b093dbdc04d9387e56fcb1cbfa8d6eb20f350860f376939ac8fc2c235435aa22cf57fa5ab6215f9a2c7374fb005ea776219d
-
Filesize
510B
MD522c4abdcb24299f054503667798e5cfd
SHA1c1770fd974b682f9de156c0fd83bec020240ac56
SHA256c9802aa1b9229d3209c7ef2ccb885c021e4048ddde4c1912d090963b84f3e36e
SHA5126ed6ce8280e725d828529af9100b9d74b06279d24852f9deca689d51faa203248077061f923bace3bd5fae2d6431c5b23ce588508873ff65912f9f90a00f66fc
-
Filesize
6.6MB
MD5fa3e01031f5803a4dccd1e5235e5ab1b
SHA1882e412934f9f3738017b869af3f963625f86a07
SHA25687e764bb06ae42302fc74e68586505b8b82232604197583065c800c957b740ae
SHA512070bb504cc8ecda1d4a22a012d8b15a25a1ccaad4c714d4d45c45a2054638cbd20f9535900431904df4c907eeadce71a76a410f668ed28647821d24d1fd2a00d
-
Filesize
6.9MB
MD5e137468873c473b661cebba61aef3a0c
SHA1cf130a1699d0412c8b94247b11357fe6b0a0b837
SHA256c697d309b3bb7d5d54f234397ea04e2be8877f56fc2038b6a2c109d4a5850d07
SHA5122b18dd158427b75882fcc8f790c9c508caaf149b9ed9cb30ef4657add2311916c052c806512eec3e925382042ed06c0f1a2107457046768d7328f12ffcbd3718
-
Filesize
40KB
MD58585990d8e7a765e5579ca33048c887a
SHA18f342b9456df0d7a343a6740846e22fbd9aed43c
SHA256785e1ef080e65e5b9041faa3981b2f25b8c4658eb99a8d6290059f9db94daaa2
SHA512908bf6e5287e5a5aac55f7aab7e7391e20b4af4e818edee39dbe8f68a8cb09fd3758cea81ddcc8db104c1f88590bdc96ce895a07fa3e25c49248310262c6a483
-
Filesize
40KB
MD5f0fb6830c0978acfc3eba617802f7c90
SHA11e29cc526d08c56320d75de9837ee33e410664a0
SHA2568cae51eda1da54ef42fcb2e82392ca99d65a9385fbe91c3890e3ca72e3bd1a91
SHA512c433b41042359d6d18c3b87ab4f28d91dd4d6a0b78841fce410be8305c84fd07da04bd7e6b1ac522d4597f6e2579b91d63a21ec5b463770e4ab92e8a749590bd
-
Filesize
232KB
MD560e907c5d3c0aa96e45b8db5d2a2ca80
SHA12e23304cf254c39bbfae227a6c7dde34eedbbc3c
SHA2564e61c25d6ef620a0b4c800091860cdc38928f2ec75e2097700d4d94cc0f87265
SHA5121ea98aadd284ce7222c488ca32f69eb422532d5682e17453b199b5dcec9318da7bfe6667bc87bff46460881e39ab28d254d6675eb0dd9c06f22a02c5bf204fa4