Overview
overview
7Static
static
3TeddyPcFiles.rar
windows10-1703-x64
3TeddyPcFiles.rar
windows11-21h2-x64
3TeddyPcFil...n).exe
windows10-1703-x64
7TeddyPcFil...n).exe
windows11-21h2-x64
7TeddyPcApi...ts.pyc
windows10-1703-x64
3TeddyPcApi...ts.pyc
windows11-21h2-x64
3main.pyc
windows10-1703-x64
3main.pyc
windows11-21h2-x64
3TeddyPcFil...g.json
windows10-1703-x64
3TeddyPcFil...g.json
windows11-21h2-x64
3TeddyPcFil...b.json
windows10-1703-x64
3TeddyPcFil...b.json
windows11-21h2-x64
3Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-09-2024 20:08
Behavioral task
behavioral1
Sample
TeddyPcFiles.rar
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
TeddyPcFiles.rar
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
TeddyPcFiles/Teddy PC (main).exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
TeddyPcFiles/Teddy PC (main).exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
TeddyPcApiRequests.pyc
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
TeddyPcApiRequests.pyc
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
main.pyc
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
main.pyc
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
TeddyPcFiles/config.json
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
TeddyPcFiles/config.json
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
TeddyPcFiles/saved_account_db.json
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
TeddyPcFiles/saved_account_db.json
Resource
win11-20240802-en
General
-
Target
TeddyPcFiles/Teddy PC (main).exe
-
Size
15.4MB
-
MD5
9476e32ffbaab14a58b721a28f6610ac
-
SHA1
47c39dcb14418da9d0b8c2e7cb5fbdae4f451f06
-
SHA256
da47548e770e8f1f2f3ea4805abc0c014a6050a0e9c97112ea0f20a25c4a2b05
-
SHA512
063bc342e6d99f15bec0621c6551db43c67d0af79fcab32eb99fd77f5f378813037c2bd0284fc578a50053e9634cffd584d8f944016f21f37ede7e89c7a59037
-
SSDEEP
196608:gD9XaO93xXh04A1HeT39IigwIc0/ajaA0W8/LV2ck3FR0XSOq33NUqfEx:NeXh0h1+TtIiFU/MaHW8p2D0fg62Ex
Malware Config
Signatures
-
Loads dropped DLL 33 IoCs
pid Process 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe 728 Teddy PC (main).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1132 msedge.exe 1132 msedge.exe 2604 msedge.exe 2604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2604 msedge.exe 2604 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3896 wrote to memory of 728 3896 Teddy PC (main).exe 80 PID 3896 wrote to memory of 728 3896 Teddy PC (main).exe 80 PID 728 wrote to memory of 3548 728 Teddy PC (main).exe 81 PID 728 wrote to memory of 3548 728 Teddy PC (main).exe 81 PID 728 wrote to memory of 2604 728 Teddy PC (main).exe 83 PID 728 wrote to memory of 2604 728 Teddy PC (main).exe 83 PID 2604 wrote to memory of 4436 2604 msedge.exe 84 PID 2604 wrote to memory of 4436 2604 msedge.exe 84 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 2348 2604 msedge.exe 85 PID 2604 wrote to memory of 1132 2604 msedge.exe 86 PID 2604 wrote to memory of 1132 2604 msedge.exe 86 PID 2604 wrote to memory of 2544 2604 msedge.exe 87 PID 2604 wrote to memory of 2544 2604 msedge.exe 87 PID 2604 wrote to memory of 2544 2604 msedge.exe 87 PID 2604 wrote to memory of 2544 2604 msedge.exe 87 PID 2604 wrote to memory of 2544 2604 msedge.exe 87 PID 2604 wrote to memory of 2544 2604 msedge.exe 87 PID 2604 wrote to memory of 2544 2604 msedge.exe 87 PID 2604 wrote to memory of 2544 2604 msedge.exe 87 PID 2604 wrote to memory of 2544 2604 msedge.exe 87 PID 2604 wrote to memory of 2544 2604 msedge.exe 87 PID 2604 wrote to memory of 2544 2604 msedge.exe 87 PID 2604 wrote to memory of 2544 2604 msedge.exe 87 PID 2604 wrote to memory of 2544 2604 msedge.exe 87 PID 2604 wrote to memory of 2544 2604 msedge.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\TeddyPcFiles\Teddy PC (main).exe"C:\Users\Admin\AppData\Local\Temp\TeddyPcFiles\Teddy PC (main).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\TeddyPcFiles\Teddy PC (main).exe"C:\Users\Admin\AppData\Local\Temp\TeddyPcFiles\Teddy PC (main).exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.epicgames.com/id/api/redirect?clientId=3446cd72694c4a4485d81b77adbb2141&responseType=code3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6bd63cb8,0x7ffa6bd63cc8,0x7ffa6bd63cd84⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1708,15247748243559545255,7539140882642775432,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1808 /prefetch:24⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1708,15247748243559545255,7539140882642775432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1376 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1708,15247748243559545255,7539140882642775432,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:84⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,15247748243559545255,7539140882642775432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:14⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,15247748243559545255,7539140882642775432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:14⤵PID:980
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e8115549491cca16e7bfdfec9db7f89a
SHA1d1eb5c8263cbe146cd88953bb9886c3aeb262742
SHA256dfa9a8b54936607a5250bec0ed3e2a24f96f4929ca550115a91d0d5d68e4d08e
SHA512851207c15de3531bd230baf02a8a96550b81649ccbdd44ad74875d97a700271ef96e8be6e1c95b2a0119561aee24729cb55c29eb0b3455473688ef9132ed7f54
-
Filesize
152B
MD53e2612636cf368bc811fdc8db09e037d
SHA1d69e34379f97e35083f4c4ea1249e6f1a5f51d56
SHA2562eecaacf3f2582e202689a16b0ac1715c628d32f54261671cf67ba6abbf6c9f9
SHA512b3cc3bf967d014f522e6811448c4792eed730e72547f83eb4974e832e958deb7e7f4c3ce8e0ed6f9c110525d0b12f7fe7ab80a914c2fe492e1f2d321ef47f96d
-
Filesize
185B
MD5fa88c3bfda3b1796f85a6a584c6d1aa7
SHA184d491531661b24cf143c3ec93cadcd5577c3424
SHA2569868ffd2c601b0c0c34326e353e44641cb4ef25177773db6c1d9a576551ad74d
SHA5124d32859e058d66d523fe873dfa5a60aa1566211758ac62e74ceb6afeb177d9444566bbb57886cd82f062f934b43619ca132f3ad1b306f7a9eb0800e6d949c78a
-
Filesize
5KB
MD5cacfc79783c70c20da20a0a2e537dcca
SHA173bab33671486db52c5e198da3ee6bbec186bb09
SHA256ec3bb353d1239b76cafe58312d473492643469c9165902f882f44b34871ec808
SHA5121f790943ea35db185f1c50cd9073f1e9df4f2c0483e235c356851fcd4a2401b85ca64bda272b148d6dfd1ef9e9875e6e6cd7280266ee0c5fe9d3f4500ab44817
-
Filesize
6KB
MD5cff0d87adb88c081b06874194ec92d7b
SHA14547165ba7b9d0bd17052a956c1e8792b9593933
SHA256cadaa1f1ef901fbf343d8140a419a0d15313ca279fdf1873b4c1062d86b5d544
SHA51266fd347bed3807a9b968773ce7617cc47be7766d34b4d8fc41242b973726daa0fb6ffa655230b2b50d4fdc44e448d3043885ba042b7dbc5d6cb82f9960659eca
-
Filesize
10KB
MD5d538faaa241ff36427557292a792e144
SHA1fe5ad3ad3487c9c4cd601bbdb89f14d5dd44634f
SHA256f7431f015468e9646e556ecc5b3020b8e0bc30937f9962d6f84e16cd83344cb3
SHA51282e21460a11c11e5c5d5adbb292bfeadb72e0b398ff93188f5a0056ad420372aa4e4a2d79f5a16227110109b73503114d7c39362584a1a7f72988483a01e37d4
-
Filesize
13KB
MD58013d237df05fd4e4c56a2735b666464
SHA1f48c1b06aedf324c14b98935461f3cf1d5cdb5ab
SHA25661199bfa141342ece07c99b1bd37484f569c0952672816fa8ebfcb34fd209898
SHA512e783c88c7a1082ef975222db6e7ec49009e311297ccc2e66895420447d10b2b9c331cee1f308ec37b6db9eab842982fd75d76f1530ced9d5c81e7a38cad708b8
-
Filesize
2.5MB
MD5f9439d732c0e23bb3e5946766b9b25ac
SHA1b94ca1150ec3a4c1e89dd5dba8677a144ee02683
SHA2569303b4219aca0e644cf6745a040a32f9971064014553a39162b099d14032b52b
SHA512d90df0ebde0d8a814b18d714df03b930a964ba0582db48bc5ac13f3ab12f3f6ead6d399a28b7a8a4b569039000cb397022427874d7293353058b0747f24c5502
-
Filesize
158KB
MD53151f5be4d073c7a25f5c492a4b99874
SHA16bb05a280ae97e5e4e6f5eb96c94c2f9fa61ecb4
SHA256db6a580afeb112af6abc4091f8cdb2f4275fb6fde5f02549ff3771db2d78c4b0
SHA5123d3d0274dc31399f6048aa3c211bb94c6a703cca808b01efbd621d5d3490db9acb80a19d6e56b273f422760c434bc4ae904355137904ee202d2cf164616b31da
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
63KB
MD541806866d74e5edce05edc0ad47752b9
SHA1c3d603c029fdac45bac37bb2f449fab86b8845dd
SHA25676db93bd64cb4a36edb37694456f89bb588db98cf2733eb436f000b309eec3b2
SHA5122a019efaf3315b8b98be93ac4bea15cec8b9ecc6eab298fa93d3947bad2422b5a126d52cb4998363bdc82641fba9b8f42d589afe52d02914e55a5a6116989fde
-
Filesize
82KB
MD537eace4b806b32f829de08db3803b707
SHA18a4e2bb2d04685856d1de95b00f3ffc6ea1e76b9
SHA2561be51ef2b5acbe490217aa1ff12618d24b95df6136c6844714b9ca997b4c7f9b
SHA5121591a263de16373ee84594943a0993721b1e1a2f56140d348a646347a8e9760930df4f632adcee9c9870f9c20d7818a3a8c61b956723bf94777e0b7fb7689b2d
-
Filesize
121KB
MD5a25cdcf630c024047a47a53728dc87cd
SHA18555ae488e0226a272fd7db9f9bdbb7853e61a21
SHA2563d43869a4507ed8ece285ae85782d83bb16328cf636170acb895c227ebb142ac
SHA512f6a4272deddc5c5c033a06e80941a16f688e28179eab3dbc4f7a9085ea4ad6998b89fc9ac501c5bf6fea87e0ba1d9f2eda819ad183b6fa7b6ddf1e91366c12af
-
Filesize
247KB
MD5e4e032221aca4033f9d730f19dc3b21a
SHA1584a3b4bc26a323ce268a64aad90c746731f9a48
SHA25623bdd07b84d2dbcb077624d6dcbfc66ab13a9ef5f9eebe31dc0ffece21b9e50c
SHA5124a350ba9e8481b66e7047c9e6c68e6729f8074a29ef803ed8452c04d6d61f8f70300d5788c4c3164b0c8fb63e7c9715236c0952c3166b606e1c7d7fff36b7c4c
-
Filesize
63KB
MD5ba682dfcdd600a4bb43a51a0d696a64c
SHA1df85ad909e9641f8fcaa0f8f5622c88d904e9e20
SHA2562ad55e11bddb5b65cdf6e9e126d82a3b64551f7ad9d4cbf74a1058fd7e5993bd
SHA51279c607e58881d3c3dfb83886fe7aa4cddb5221c50499d33fe21e1efb0ffa1fd0d3f52cbe97b16b04fbe2b067d6eb5997ac66dec9d2a160d3cb6d44ffca0f5636
-
Filesize
155KB
MD53273720ddf2c5b75b072a1fb13476751
SHA15fe0a4f98e471eb801a57b8c987f0feb1781ca8b
SHA256663f1087c2ed664c5995a3ffa64546d2e33a0fce8a9121b48cc7c056b74a2948
SHA512919dbbfcc2f5913655d77f6c4ae9baa3a300153a5821dc9f23e0aceb89f69cb9fb86d6ce8f367b9301e0f7b6027e6b2f0911a2e73255ab5150a74b862f8af18e
-
Filesize
33KB
MD5758128e09779a4baa28e68a8b9ee2476
SHA14e81c682cf18e2a4b46e50f037799c43c6075f11
SHA2563c5b0823e30810aee47fdfad567491bc33dd640c37e35c8600e75c5a8d05ce2a
SHA5125096f0daacf72012a7ad08b177c366b4fe1ded3a18aebfe438820b79c7cb735350ef831a7fb7d10482eefd4c0b8a41511042bb41f4507bbc0332c52df9288088
-
Filesize
50KB
MD5e2a301b3fd3bdfec3bf6ca006189b2ac
SHA186b29ee1a42de70135a6786cdce69987f1f61193
SHA2564990f62e11c0a5ab15a9ffce9d054f06d0bc9213aea0c2a414a54fa01a5eb6dc
SHA5124e5493cc4061be923b253164fd785685d5eccf16fd3acb246b9d840f6f7d9ed53555f53725af7956157d89eaa248a3505c30bd88c26e04aabdae62e4774ffa4e
-
Filesize
31KB
MD5284fbc1b32f0282fc968045b922a4ee2
SHA17ccea7a48084f2c8463ba30ddae8af771538ae82
SHA256ac3b144d7d7c8ee39f29d8749c5a35c4314b5365198821605c883fd11807e766
SHA512baa75f7553cf595ad78c84cbb0f2a50917c93596ece1ff6221e64272adc6facdd8376e00918c6c3246451211d9dfc66442d31759bd52c26985c7f133cf011065
-
Filesize
77KB
MD5485d998a2de412206f04fa028fe6ba90
SHA1286e29d4f91a46171ba1e3c8229e6de94b499f1d
SHA2568f9ede5044643413c3b072cd31a565956498ca07cdd17fb6a04483d388fdad76
SHA51268591522e9188f06ff81cd2b3506b40b9ad508d6e34f0111819bf5eff47ed9adf95ebfae5d05b685c4f53b186d15cc45e0d831d96be926f7a5762ee2f1341f1f
-
Filesize
172KB
MD5e5b1a076e9828985ea8ea07d22c6abd0
SHA12a2827938a490cd847ea4e67e945deb4eef8cbb1
SHA256591589dadc659d1ad4856d16cd25dc8e57eaa085bf68eb2929f8f93aba69db1b
SHA5120afd20f581efb08a7943a1984e469f1587c96252e44b3a05ca3dfb6c7b8b9d1b9fd609e03a292de6ec63b6373aeacc822e30d550b2f2d35bf7bf8dd6fc11f54f
-
Filesize
62KB
MD5b9433c77e6b04532ac587056d21947c2
SHA10bcbf7b0ae1c3b815788b62879384217d9744abf
SHA256a3488d90b5493dd0af5054750194cdeafbf05db42e881c78d92449932565308d
SHA512a0fcbf898038f2337db8b2aa5873e3fd8970f5f7d01725e9a20be091985495feab01d7dc7b8a6b7ab898d2875566029fd3d217883a1301bf67f8c4288bb29b4f
-
Filesize
24KB
MD5b21b864e357ccd72f35f2814bd1e6012
SHA12ff0740c26137c6a81b96099c1f5209db33ac56a
SHA256ce9e2a30c20e6b83446d9ba83bb83c5570e1b1da0e87ff467d1b4fc090da6c53
SHA51229667eb0e070063ef28b7f8cc39225136065340ae358ad0136802770b2f48ac4bda5e60f2e2083f588859b7429b9ea3bad1596a380601e3b2b4bb74791df92a3
-
Filesize
53KB
MD5e3d1b83909f6f1eee896ac57bb24bbdf
SHA120992879399bee44184240d5091172882da1019e
SHA256c0dafa83e6cb70a399028ce9d1f20931a597e11a8854e2fddb1fd90129d6da55
SHA512b4ae7f50f14795edfb355ed1fdfdf4902283b0b354d801bf440ca47e4ae55a8f990392c1f515e55b145ee414c8522382b67a5b7da0630b232fffa88f89cef033
-
Filesize
249KB
MD55b1b2e84229d6156b45ac9c2f3a8e779
SHA102101e65d75b6b74251632cb1d854da7da813955
SHA256ba8405808a14825cbc4c41968e21dae0bdfff7adcc30407c24de45dbdb6c124a
SHA512ed8a8f8cd54c0f2096c985e6648b82664c1eca8153f59b2971700350576458536f29ac94f5c2848e661d08eacd10809376adc7b0e4b15c86becaa342b21bffa2
-
Filesize
48KB
MD51351a17fe8b2915c7b939f85ed80eb11
SHA1480eac8f353e4a32c0d0ccf8a7d5fcec14a56137
SHA25629f767807ea5a9a463cbec1f4cd5b435e0e9259f7e43206dec15e6c7139352f8
SHA512a7c3d2382cfab1c5e856fd53115f074197a35b12d8e373d75709d48a68e88467c26e71df92864ab249ebbb82b8edd3933bb9a76d97a7aa4def64a97d41d2f21f
-
Filesize
35KB
MD57a783b3600b6c90ed11078bc9d25e78b
SHA1da19a65ba602658805ea5800de0f2089e002978e
SHA256c93ecab23a1d0d1088aa3b8c6273ca4ee2df9593d3c167d13dfb79bfc155b60e
SHA51280a7a9b47d75e1269c4ced87a196402dc16ec71e231d8e8841bb14aabaec0ae6b0338a659654af9d3068ec81f2ee439d342410192c65bf900181d0189f3684c2
-
Filesize
1.4MB
MD5852a31cacf70f1eb49e7141dd8ba3467
SHA1e95f27b99b94c4aa38b3cd57abad60beba7910ae
SHA2564a19b01c865bfb5d8a96e772d7986dc3aa9af72adf6ab20702538b7f38c2404b
SHA512b752313e966a6729da337fa542e63f62b2942381a2edbb70fa865b3f62af232858394720682283110cba12736a662ce156636a3ed9e3e0e4478516d5fe9ed7bc
-
Filesize
4KB
MD505eb3947ce9a8c3bef66c14d0f938671
SHA106ffc811ee51609809d88894022e222b339aefee
SHA256c9417470c16ced7a43d6c4a8e027afa6edc62c24d5aee7c4c2dcd11385964d3b
SHA5124db7c14fba78185edf6459016608cb8fa0a250dfb48432c552bb4e0466cf49622b34d847e17c254bb1c8d15bf365e91bce3ede552ba8733fde9d21779f7f1c13
-
Filesize
84KB
MD519a838a9f6b71d405c025c762ec67b9d
SHA12871b1ab459f6e4e10ba00553e7a7bb1c27a0588
SHA2560f7538441c1668248618ee15d11414ce68642c2cbdd1636b903ecefacf88652d
SHA5125d7b31b4ac745ea4815be122c622989fa408adaeb2f3ba37a9495497e58467dffbeb6d9cd595d49c82cae83e5869ad9a643dd9ca691f46761eb3a20a28d73a7f
-
Filesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
768KB
MD519a2aba25456181d5fb572d88ac0e73e
SHA1656ca8cdfc9c3a6379536e2027e93408851483db
SHA2562e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006
SHA512df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337
-
Filesize
45KB
MD553c003dec693f83c57f326b6df5d5f05
SHA16977ebcbf74a039501825697021c504d7cc63928
SHA25632555defdb044714dbaaec281820fa7a0c226545d40561b905294d2e0bdba102
SHA5122c4b9dff022d25906981d52f68a9bda8e7840597bea6cbea9bc8036392dea56fbecaedcd1b9f6547074c28b018266e424ca0ae8e66bad947544a8571f83fd2f4
-
Filesize
193KB
MD5d7ecc2746314fec5ca46b64c964ea93e
SHA139fc49d4058a65f0aa4fbdc3d3bcc8c7beecaa01
SHA25658b95f03a2d7ec49f5260e3e874d2b9fb76e95ecc80537e27abef0c74d03cb00
SHA512d5a595aaf3c7603804deae4d4cc34130876a4c38ccd9f9f29d8b8b11906fa1a03dd9a1f8f5dbde9dc2c62b89fe52dfe5b4ee409a8d336edf7b5b8141d12e82d2
-
Filesize
5.5MB
MD5d06da79bfd21bb355dc3e20e17d3776c
SHA1610712e77f80d2507ffe85129bfeb1ff72fa38bf
SHA2562835e0f24fb13ef019608b13817f3acf8735fbc5f786d00501c4a151226bdff1
SHA512e4dd839c18c95b847b813ffd0ca81823048d9b427e5dcf05f4fbe0d77b8f7c8a4bd1c67c106402cd1975bc20a8ec1406a38ad4764ab466ef03cb7eb1f431c38a
-
Filesize
29KB
MD5e07ae2f7f28305b81adfd256716ae8c6
SHA19222cd34c14a116e7b9b70a82f72fc523ef2b2f6
SHA256fb06ac13f8b444c3f7ae5d2af15710a4e60a126c3c61a1f1e1683f05f685626c
SHA512acb143194ca465936a48366265ae3e11a2256aeae333c576c8c74f8ed9b60987daff81647aef74e236b30687a28bc7e3aa21c6aedbfa47b1501658a2bfd117b4
-
Filesize
1.8MB
MD5ac6cd2fb2cd91780db186b8d6e447b7c
SHA1b387b9b6ca5f0a2b70028ab2147789c4fe24ef7a
SHA256a91781fe13548b89817462b00058a75fb0b607ec8ce99d265719ced573ade7b6
SHA51245b24ca07a44d8d90e5efeded2697a37f000b39d305fe63a67292fdd237de3f8efd5e85b139b5702faa695f9f27f12f24ac497e005e2f3c24c141d7cd85305b6
-
Filesize
1KB
MD5e9117326c06fee02c478027cb625c7d8
SHA12ed4092d573289925a5b71625cf43cc82b901daf
SHA256741859cf238c3a63bbb20ec6ed51e46451372bb221cfff438297d261d0561c2e
SHA512d0a39bc41adc32f2f20b1a0ebad33bf48dfa6ed5cc1d8f92700cdd431db6c794c09d9f08bb5709b394acf54116c3a1e060e2abcc6b503e1501f8364d3eebcd52
-
Filesize
1.5MB
MD5499fa3dea045af56ee5356c0ce7d6ce2
SHA10444b7d4ecd25491245824c17b84916ee5b39f74
SHA25620139f4c327711baf18289584fa0c8112f7bb3ba55475bded21f3d107672ed94
SHA512d776749effa241ba1415b28d2fcff1d64ed903569a8c4e56dfddd672a53b2f44119734b1959b72a9b3f4060bb2c67b7dea959cc2d4a8e9f781f17009c6840fc1
-
Filesize
1.1MB
MD55cc36a5de45a2c16035ade016b4348eb
SHA135b159110e284b83b7065d2cff0b5ef4ccfa7bf1
SHA256f28ac3e3ad02f9e1d8b22df15fa30b2190b080261a9adc6855248548cd870d20
SHA5129cccbf81e80c32976b7b2e0e3978e8f7350cce542356131b24ebab34b256efd44643d41ee4b2994b9152c2e5af302aa182a1889c99605140f47494a501ef46c1
-
Filesize
93KB
MD53ccc89b98dab137bc5af9c1e62923829
SHA155d93e9782094925d80e4ce27d13a0a9761b7002
SHA25640e91aaa369a5c171c0d30630707ae9bb64412fedf149aeecfa5707a2324f770
SHA5124ebe427c75d83c019f8d378a030ae21e07decf30cd10623115eb0cc6ad7a689159e95c7fabac82ce82cea3720fae6c6faf712b600236dad039255884872eb6c0