Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe
Resource
win10v2004-20240802-en
General
-
Target
f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe
-
Size
1.6MB
-
MD5
622c5261ea1ddc535ae501e235ab3680
-
SHA1
e4eae471d69197a8d275e0b2aa3491fb859d316a
-
SHA256
f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014
-
SHA512
d52df5697abc6324c9aa0076942dc5cb458d1d11667fde9f3135d6c79ba8be1101b45a174be220c87bcf20c2c8fe38f122d9bbacfb15a8a5782bebee416d0220
-
SSDEEP
12288:MwwwwwwwwwwwwwwfrxCrGbaL2Lp4rM17Pa:MwwwwwwwwwwwwwwA
Malware Config
Signatures
-
Drops file in Drivers directory 6 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\gm.dls exc.exe File created C:\WINDOWS\SysWOW64\drivers\gm.dls f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt exc.exe File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\drivers\wimmount.sys f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\drivers\wimmount.sys exc.exe -
Manipulates Digital Signatures 2 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File created C:\WINDOWS\SysWOW64\wintrust.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\wintrust.dll exc.exe -
Executes dropped EXE 1 IoCs
pid Process 2432 exc.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\kbdibm02.DLL f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\powercpl.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\ctl3d32.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\C_20105.NLS f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\LAPRXY.DLL f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\printmanagement.msc f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\remotesp.tsp exc.exe File created C:\WINDOWS\SysWOW64\SecEdit.exe exc.exe File created C:\WINDOWS\SysWOW64\AuxiliaryDisplayCpl.dll exc.exe File created C:\WINDOWS\SysWOW64\PATHPING.EXE f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\tree.com f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\tsmf.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\encapi.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\efscore.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\Display.dll exc.exe File created C:\WINDOWS\SysWOW64\appmgr.dll exc.exe File created C:\WINDOWS\SysWOW64\d3d10level9.dll exc.exe File created C:\WINDOWS\SysWOW64\odpdx32.dll exc.exe File created C:\WINDOWS\SysWOW64\poqexec.exe exc.exe File created C:\WINDOWS\SysWOW64\TCPSVCS.EXE f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\AdmTmpl.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\msidntld.dll exc.exe File created C:\WINDOWS\SysWOW64\zipfldr.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\dvdplay.exe exc.exe File created C:\WINDOWS\SysWOW64\C_20838.NLS exc.exe File created C:\WINDOWS\SysWOW64\KBDHU1.DLL exc.exe File created C:\WINDOWS\SysWOW64\label.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\MshtmlDac.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File opened for modification C:\WINDOWS\SysWOW64\msvcr120_clr0400.dll exc.exe File created C:\WINDOWS\SysWOW64\slc.dll exc.exe File created C:\WINDOWS\SysWOW64\amstream.dll exc.exe File created C:\WINDOWS\SysWOW64\EhStorAuthn.exe exc.exe File created C:\WINDOWS\SysWOW64\gpapi.dll exc.exe File created C:\WINDOWS\SysWOW64\LocationApi.dll exc.exe File created C:\WINDOWS\SysWOW64\NlsData0018.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\radardt.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\RunLegacyCPLElevated.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\scecli.dll exc.exe File created C:\WINDOWS\SysWOW64\duser.dll exc.exe File created C:\WINDOWS\SysWOW64\fontview.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\ndadmin.exe exc.exe File created C:\WINDOWS\SysWOW64\netapi32.dll exc.exe File created C:\WINDOWS\SysWOW64\NlsData0019.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\NlsLexicons004a.dll exc.exe File created C:\WINDOWS\SysWOW64\PerfCenterCPL.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\clip.exe exc.exe File created C:\WINDOWS\SysWOW64\esrb.rs f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\KBDBGPH.DLL f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\msls31.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\NlsData0027.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\openfiles.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\runonce.exe exc.exe File created C:\WINDOWS\SysWOW64\services.msc exc.exe File created C:\WINDOWS\SysWOW64\bitsprx2.dll exc.exe File created C:\WINDOWS\SysWOW64\wecutil.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\sysdm.cpl f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\certreq.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\cryptdll.dll exc.exe File created C:\WINDOWS\SysWOW64\dmdskres2.dll exc.exe File created C:\WINDOWS\SysWOW64\efsui.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\SysWOW64\msmpeg2adec.dll exc.exe File created C:\WINDOWS\SysWOW64\sysmon.ocx exc.exe File created C:\WINDOWS\SysWOW64\AuditPolicyGPInterop.dll exc.exe File created C:\WINDOWS\SysWOW64\C_20880.NLS f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe -
Drops file in Windows directory 52 IoCs
description ioc Process File created C:\WINDOWS\twain.dll exc.exe File created C:\WINDOWS\twain_32.dll exc.exe File created C:\WINDOWS\fveupdate.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File opened for modification C:\WINDOWS\PFRO.log f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\twain.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File opened for modification C:\WINDOWS\msdfmap.ini exc.exe File created C:\WINDOWS\splwow64.exe exc.exe File opened for modification C:\WINDOWS\system.ini exc.exe File opened for modification C:\WINDOWS\WindowsUpdate.log exc.exe File opened for modification C:\WINDOWS\WindowsUpdate.log f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\winhlp32.exe exc.exe File opened for modification C:\WINDOWS\PFRO.log exc.exe File opened for modification C:\WINDOWS\Starter.xml exc.exe File opened for modification C:\WINDOWS\win.ini exc.exe File created C:\WINDOWS\write.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\write.exe exc.exe File created C:\WINDOWS\twain_32.dll f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\hh.exe exc.exe File created C:\WINDOWS\twunk_32.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File opened for modification C:\WINDOWS\setupact.log exc.exe File created C:\WINDOWS\winhlp32.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\mib.bin f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\bfsvc.exe exc.exe File opened for modification C:\WINDOWS\DtcInstall.log exc.exe File created C:\WINDOWS\explorer.exe exc.exe File created C:\WINDOWS\mib.bin exc.exe File created C:\WINDOWS\WMSysPr9.prx exc.exe File opened for modification C:\WINDOWS\Starter.xml f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File opened for modification C:\WINDOWS\TSSysprep.log f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\fveupdate.exe exc.exe File created C:\WINDOWS\notepad.exe exc.exe File opened for modification C:\WINDOWS\setuperr.log exc.exe File opened for modification C:\WINDOWS\TSSysprep.log exc.exe File opened for modification C:\WINDOWS\DtcInstall.log f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\hh.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\notepad.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File opened for modification C:\WINDOWS\setupact.log f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File opened for modification C:\WINDOWS\setuperr.log f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File opened for modification C:\WINDOWS\system.ini f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\twunk_16.exe exc.exe File opened for modification C:\WINDOWS\Ultimate.xml exc.exe File created C:\WINDOWS\bfsvc.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\HelpPane.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\twunk_32.exe exc.exe File opened for modification C:\WINDOWS\win.ini f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\WMSysPr9.prx f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\explorer.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File opened for modification C:\WINDOWS\msdfmap.ini f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\splwow64.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\twunk_16.exe f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe File created C:\WINDOWS\HelpPane.exe exc.exe File opened for modification C:\WINDOWS\Ultimate.xml f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "8" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "423" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "423" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "122" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "118" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "122" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "108" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "118" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "233" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "122" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "118" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "366" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60369f96920fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "366" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BED2B711-7B85-11EF-B895-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "8" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "118" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "233" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 864 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 864 IEXPLORE.EXE Token: 33 2200 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 2200 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2112 iexplore.exe 1104 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 1104 iexplore.exe 1104 iexplore.exe 864 IEXPLORE.EXE 864 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 864 IEXPLORE.EXE 864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2432 1868 f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe 28 PID 1868 wrote to memory of 2432 1868 f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe 28 PID 1868 wrote to memory of 2432 1868 f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe 28 PID 1868 wrote to memory of 2432 1868 f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe 28 PID 1868 wrote to memory of 2112 1868 f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe 31 PID 1868 wrote to memory of 2112 1868 f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe 31 PID 1868 wrote to memory of 2112 1868 f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe 31 PID 1868 wrote to memory of 2112 1868 f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe 31 PID 2432 wrote to memory of 1104 2432 exc.exe 32 PID 2432 wrote to memory of 1104 2432 exc.exe 32 PID 2432 wrote to memory of 1104 2432 exc.exe 32 PID 2432 wrote to memory of 1104 2432 exc.exe 32 PID 2112 wrote to memory of 864 2112 iexplore.exe 33 PID 2112 wrote to memory of 864 2112 iexplore.exe 33 PID 2112 wrote to memory of 864 2112 iexplore.exe 33 PID 2112 wrote to memory of 864 2112 iexplore.exe 33 PID 1104 wrote to memory of 2200 1104 iexplore.exe 34 PID 1104 wrote to memory of 2200 1104 iexplore.exe 34 PID 1104 wrote to memory of 2200 1104 iexplore.exe 34 PID 1104 wrote to memory of 2200 1104 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe"C:\Users\Admin\AppData\Local\Temp\f161c9e2e19ce87e3546b548af50e580015c46ac53d8ea3bdbe67bb0159a8014N.exe"1⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\exc.exe"C:\exc.exe"2⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2200
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564bd589f91e680c885b580780c4bbbef
SHA1017d732dc5ec799c64d0463555808274e8f8a1e6
SHA256502515d0196026975e47d351161981b101b52660835b8027df24338f50b8f75d
SHA51238ea4d6cdb5736a13f3f121cffdbc732040703300b37c091798f8bbf7bc3ee9d3587f6126b52a0691ce8cf43c02a66b7da20cd787b9cb4375d9b6727f3324e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b92b0f79c2cc23f343fecdc31ee26dc
SHA1cf16c3d52de618952c7ef6ba68d62ba18d42c640
SHA25657b6755600b85a2ca1437a4f93d48662efe156ee7038a10a03ce6a281aac4ce1
SHA5128c0a161762e3bd465b786bee58381690c2da1c81375da7c6cb3ac5aeb48430126540032fe6eeaaaf0c21c6b142a0953f84aed2e4618c02cdb187d570541a711f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575de6204c5d09236003f9ca65315254e
SHA13e1542a93f27a727957dab8d8c74650af1a1ccbe
SHA25684c86e79261fe20829c16817befa8b6a1bd59f3268034b0129b60d5fbc5f5c8b
SHA512aaab1d3b6dbb4440beaab152d48def4bbf8ed3e8ab863cc008ddc5520c131e916633593738d85a1e19b22a92b6e843b7ad9541b559151f39e0e36a7caae2ab6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403385344fe1a848291820051b291240
SHA17be1863f3926df164618a6ccb9b6876e849202b8
SHA256b0a57d8d5782628a5993b5931753cc253f6670f1a219fce97abe76e17f6877f5
SHA512f5e253abfc28dbcf3fec9f610c0347848a485572151ffa0c07627f08d2dba0d35e8e6eeba3ff891d769dc21b9601fa38b5408ea9bdd07d0d6c5fb6c44dc162aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58525e3d55bc15286cbb7428fafe31af5
SHA12e5da724a8266fd823fcec60e7ddc00c3a887387
SHA25653724ff4275c49b0ff27227a54a85543c0b1a7bb79cd3999d9b578e2849b0c22
SHA5123c8c207e89187d35bf5ab19d0281d73faaa89c88988e82ce6c544e92131cd1e8660e3074dd203c497b1ac6ba09c0198036a06f020afda99254acc6e698baad16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512bf1566b02d54e5fcc8b6611ac39fc2
SHA1fa923d1e13d71020ceaccf08489558687a2c8ef7
SHA256525982fab5c18690d7b54beb49b6a6567d108cb64917abdc940ebecd3f0845cf
SHA512cca2aada9b073dfcfff83778ea662a2961c6197558994189a6e605897de56775f0b40a4e0573243a292721a3a7a8cf37d0a07509cb9eb817e6c6b92f08075683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558bbce349cf5f27b9bf0f1d730ee00a9
SHA12613aab6def9a02dc26d07eb7145f221d0cca700
SHA256500e6d6cad138c046604e5c850a87df8aa96dde0ece4ca1fd8da50a31870a011
SHA512309d7e58536e53198e85a6a6df4b4960afc7a7e8f3947d68a9182063d08fc92d1847efd3691f3e4e1c4b9c06b4978ccd6bf801a68152bd2b7d544731da4cb83f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56edadcd8a8bd123366cdf19139eb3dc9
SHA1528719baddd2054d308b49268558228ac2fec82c
SHA256f0bd5062d51c0e19d2a458e074d406c85916a517fcd2f76622edd0a80a35a4c5
SHA512d506a8ad4b0d6501347af2ab708ff5e794aed8b3cef679eb721629591e4a27478c3ebbaa2a958b346145262cddc8418d50c2d3691175954629c680ce1908a3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5853aa33d13baf8b0aeb00e867f9a9d74
SHA1cafdec7fa07e371696e1da2d60a09d03f413acc3
SHA256258b5c4f2f6953bf52b41f2f67902c70e18d9f1c3388d43d5c801672a6148095
SHA51236c2056ac0c47a66945e77f1867c39cf4b60f3b492aa2bf4a913d303d72ceb1d80166ab115431b6a249a5d90fd7c28c3e5e60afb1cd3ae64fb5cc1940dd3a3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f21daf5d64703e6769c3f803be6aff
SHA1736bb8e4815e353dba35997d1f166ea6fd0e0846
SHA256181f4367a036c4d15a8910837f79ce4ad2e447f30fd6e56a318ff24ee21dd4a2
SHA51226a3256b2a839c1cadb4bf31bdc9e330ac2f6d0454133ac531f170db8d4ab79911a0cad1aa93d1f4162ab530c77e3566d617b6eb1fc6f044b2fd97f9131b927f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e44c35bf2ea71c2e02a833ab8bc5d2cf
SHA175418e09c7264e9a0719128d782b84fe453c9f7c
SHA256256bb7542ae5fff0f87b4c9ad08cb6d510b29cdd25b07345888f96521c4c9a43
SHA51286071f9de6112b15c105db5c0c9a31fd2fc29e950c2d28cc763a5fb30ed7e01dfd3db30ad4f5145cf8ef4306e004fab577b7474357de4d10b2efa4b797648d7d
-
Filesize
224B
MD59deb86dfb5cbc182e7e691fc82c14023
SHA1063626284107439dbcdec5f3b765c83a52ea32fb
SHA256e545302a78080fa6e529ce16dd5549a6dba78bfd813c4cf6717996775eb3f776
SHA51229e6f5e2ca9616c1dbec3300417ddfe9b7905c25956eca752c68235598fd5d71481b5b9460d30b90784fbc068623cbea241ebb2dfa779b7c6ac8649416cbf663
-
Filesize
437B
MD5cb7ecd2569ccf7959879fc63c5c47998
SHA1f58ffc9e73d6b72e09705bf841d371165355b52b
SHA256dd219245bc43b5040c71d19677434fbb8d7d68ec77a0796b9c24a3cd3783fa50
SHA512762b4af5c73a3a48062ce932c7f6d1d9b0ecc94e27d8fa98c69f999925666f92d279574ccb6b0d8b812a9266318144847ea8ab4e008b0b2ee5bf94b8dd77a16e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\favicon-32x32[1].png
Filesize1KB
MD513e4a579c3cfa586f665ecd794e0462c
SHA1b629b7170f76734c495630191e665b6a88024268
SHA256a961b4999fbb3ea58527df10b36cfd5c6ac7cf9fd12a0ecede32a8f7f48fec30
SHA512813d424cb854ecda3bd1cb73e87af2e1072364e5e6345e2a7ff0c93cdac34628146786f1f5fbfa869b95d72ff0071414af13c4453545e76b3f627c1343cbdc8a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\otSDKStub[2].js
Filesize20KB
MD5a3e7570799838f456ea59051edf9b177
SHA1714e869857b96ddeef2578b26f7151a494254be3
SHA25691b0809d8b9dc57eaa09cb0e13c210b24edfaeadb94a8cff0fee02751c1b0b5f
SHA51205c30adb56d3d9f0ab84e4e5d0bfffeadd2feaa815ee7700e7a5806d01173aeb548bbe390e8487e0e541b27e08663f156f8ad49b7c5d3f6a4202a3fc4ce475ff
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\OtAutoBlock[1].js
Filesize5KB
MD5d20dd37c0551ffb1ddbf07bb14eb8673
SHA1ef2d7f3f351d4f066b9b114e45ddd1fff86e9da9
SHA2562dac11b6349b6fbbefe783a2cea3f35e8a9f2bd7e88a786874c0928700a9ac70
SHA5125504c2067982eb19c8e4aa929171d3b4d2dd88eb059fa4716b83f81e72fa67e445868a6c4715276c4289c931ba9366cec4f839cfdd4990c4caba76f16628b6f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\gtm[1].js
Filesize375KB
MD5ea8355577b4e602bf4d405bd7df38cf7
SHA1a6acd9fb6aea836f2e6854c6cfa1a1978afa32ff
SHA2564bf8da0f29c3717cfaf589db9eeec5cd773745be4dd7c984b49ebdcd0cdb8982
SHA5121917c1d3c949e8b741560b99b517d892dc2ee0136ca0e4356dedee4b1785dba2577c8bd42047bf73f5ae28cb17d069151d51ece99b8fd9cd2de3d1121534eb72
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WUBCGJ0A\9F3DH-WHDX9-7CG66-F4G3J-99FEC[2].js
Filesize140KB
MD5b1290dfc24cf0fa7fc8086f1b9dd99a3
SHA19e3ff4c4b46853c46fb8f6bfa46939b92b1bcbb4
SHA256b38b56cc66465707f7a28c32aaa60859276bf30d268eb6d3a90a02bfb6d74ba2
SHA512f3fad1e09005557fa72fc402fd3024c15350a5c30a3532989253cd4e9d1523719b7c7c6a5ee673a2b86b61519c7e3e73febfad60527f9774f59ea60feb7288b1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WUBCGJ0A\gtm[1].js
Filesize292KB
MD558efd62f6161385d872039eb82c2c05d
SHA123b506de6e7379189b3cc8053801b49a83423176
SHA256fbe752f24e8dedf2469abe422796df9533d0ebe7b34be740e61e7ccf15eafb33
SHA5123661dc79ac6e6abcd033c33fd7748e7d72e47877ee5e7b12cc537f2d93a897a2c48820ad39f6aaa979a56732e702cfd3e53d7a47b4673cf2f795c9727f1e81a5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZOGPI1N2\otBannerSdk[2].js
Filesize421KB
MD565d6272013fd813bcb3bb059c3611dad
SHA1f3d451ec0b826d15f1d7dd7b6f3f56f9d5fddc4b
SHA256ee39d0cbc9e9cd88b7dac8ebca680b89e8879081f855152f21772c7834474437
SHA512b800d2bb9d3100ef9baa8f095e5f574ee665414664ced3f9e334725ac155a419dbbde7f242b21e8868038dbd9e9f1eb4ae9dec39b3c39f98a234cf9c22cab400
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
57KB
MD5746ff046b41b3cdbac99e9885d7a5960
SHA1a5d91fbfe0cb76eabad656c1e0efbf1815241097
SHA256a3228f0ee92039d13a5ba8206605bf6e6dadd28831983df3e2bc12f21e947d3e
SHA5124720b5a2321b5a329967a8a5dfbb8120b0d2662bdc6e9c38d874b8ee40aed559c57a6aebfa103dd2681d2414c3853d1eb624ce598ca7cbb2fd336c2e2b6d1d34
-
Filesize
60KB
MD5f5787fe51c6a413dc9f7288fae5dc924
SHA1a4cb503745ddf11a56520c71e4de3d03f1463cf9
SHA2568a7359c83c66ef591b5032c1cfe899f53778da3921a4e1728400fe51d7ee17cb
SHA51269abe535dfe77c4a519f0622968753eafcbbcc72f7f93969ea7d8349d41e52f588a292df84f906fd3e67f3af0a866a869b1c2f46f8f102349798bd0204590099
-
Filesize
102KB
MD5c93f68f8cc8078ed6ecb9939eeac540f
SHA140b472b4d4801a01ef6e716999bb600826995ca2
SHA25615668ae54d794583057d42d5ce29bdd126a55a46c1c4f79c08ab668c3a78f880
SHA51225ddd4f49f030b44d7239cd272f8fa4f259a6c3176b786b15467f4c4928d36cd5e4dc6b19e963d567bf0a9cd4cd835a70dfadb17f4c088f5ab871925810b1ed0
-
Filesize
11.4MB
MD5392a3780160338a3aecd675d00c389e0
SHA12458dfd5ef35e3eee74b529582a907c345edf1c9
SHA2567fc8178cbf2f4ce4032c3f627e5a8276a27a698657d5955d3869a95702a30988
SHA512d062f2558582c493552aef048020dcce9e59f9a0c5d429e5fa06ab17afd2a2a3699c0b05cf41bccaa342658ecdef7a663e94ab544b6b57b46d280a56d344dc66
-
Filesize
168KB
MD59766902a1e4425391551965dec126f0e
SHA1e301288605596b86c68ba1454b2819cfc7f27b35
SHA25699aa938f1359d44b7187f86eb0aeb5c7d809d5c76fe9378073839baebf458cba
SHA5120c2d9ac6c9e2a4a4f131ca7fe84740416eba64565a7521a03b219b325db48b8113db7a9feae15350cd931cf015fed5763b4395f76b528c0463ca1cf9b7861b8e
-
Filesize
55KB
MD579f656e396a78534394ae7b205cae0df
SHA1331c6f7d08d0086c2b63b65cd18e12cfe3ee60fe
SHA256a2eca88eec3d1100da68fe385c69eeb4c968081c98d1e78b4f77a86a69199620
SHA512b2ebe0923b7095f14ea477476494f4e95aea325bb9fb6f3d9a8eb5f6997d394860765391622e569ff313d09d2c24a7c80bcc9d5f83f830d40bcc3080c1fac713
-
Filesize
4.2MB
MD513f65f7a9b076c5657b038537fb43e5b
SHA1aef2690531fbe9b9c976f2386e2e4b9fad551c80
SHA2566d7ec32cdf494f60ade64d6a4b0575f33fdb4c06b062f8858a98be129855910a
SHA5128f075d9490eee8e017f6b86b4c04a85a719a306d83c683c27afe8c6faa994b77ec734fd33e845955b1e6010c7957b65887209317d5e400e3bf42e0068fdb70ff
-
Filesize
90KB
MD576a33fc7c7b1a789c8bdcba4b0ee69ae
SHA1ced57335167dcf7366e3eb8a1a53c1fce2ae8d68
SHA256eb4b083a344ce316dc7cade23cc00ffc07b369b7a058217ecd6de0a1236e1553
SHA512dbf6a84cb81525f922d6ce29a7f2a56f654b05f28ace36ffbf56a0541e240bb793e245f4a57de0cad5b88643809ef69346a7c7cfc2b4a0acf41a92e5feba26a3
-
Filesize
90KB
MD5fa2861d3c776bd6c066a6bcd2651f027
SHA18b66b719ef0265f3ce1bfa7ad5ebffb3241823c8
SHA256dc83add53f6ccc0355f20ce2e71231ca946f998d8d3460d0d318e85e32f19785
SHA5122c62da88ce42aadc5a4fa7588d96a5eccf08ac4fdf4b43b2634f95e58b11c49e55fb86e5ebfd0b5f8431b6f9d6f6263e976ce61ab56303c07f96360664392569
-
Filesize
118KB
MD5470f5ff3712967b9c53260c69e0e90bb
SHA18f2e18b5610986a6f89e2f0d3daec76208bb2d1c
SHA2564e85b7d05dbec2bcffd8d473315a32dcdfa3cdd8a4719b8a684d3ec6d9413298
SHA512f16da09ac15d212f0b96700ac78f8feb3dc3963f5b19a58b22c98ba4ac4b7eeeb1b68af034953e86afdcda3031217ec70d396ac8284eb6fceba65c1d81b67fd8
-
Filesize
109KB
MD5c883cac032efa2c5fc035c130a27a071
SHA1c7b3ba5b203c59ecf1b216a0c75bbfac5ae2f66d
SHA25640c4f78c75cb8932db671b8b7f566d7d6d2adb464219df4ed3d38692c37c29e8
SHA512425f59700c70da907686010666d8486677f093b6a778a8b99f8957027be13c699ffb60bdbbdfd687f66bce2516f704ce7031676a6e7b3042dc29d2662c3c8d43
-
Filesize
117KB
MD59dbaaf471ae5ad9ee5d673e8aad4db0f
SHA1e0dfc0ebdb01b18c456ce64809dfdd2ef21b4971
SHA256c1b2f6bf741d4fa9ecf704ac7c6203f6001110306335edafaea21a7f37b15f4e
SHA51226824e894f05df1ae931f5314e4792ee54c0cc980dc48d1a26fe030f97d5d6ce7ed812af5efe91609e4f464e91bbfbf99674bca1ff1835433a2ed4b0d4f4423a
-
Filesize
118KB
MD5efb8883ada60f1f6f0d92b90b2e62fba
SHA1722b93a0d94b26de2c5ca9217df67efdc8d1e5a2
SHA2563131ea64ea26f965669bedaaa9c2c34aa165964958be1b33138e7bccfeecad32
SHA5121cd473549ab3d06ca20e6973f1934a835f992516d806efc9ae3a70c674ef357902d77a4084d6613c4183594b757fc99b616c99ced808b45ddda69907cd7bc833
-
Filesize
116KB
MD5058959cfee4e175f1ba1d55b6a8b0ef3
SHA1c8f87552a181ff8ef3386afc869dc13a2785a491
SHA2560c98b5621edb97edce9326f719a1f5baf4c8d508af07b6eaaaa422ba2ed38b40
SHA512d97138edf792903817287f3e1aaaa0bdc24cb692a5530861ddffa911c661f753a10eb4311a4e17151f2be01acc6a8b7196b38f04b04c00733c05aa6caf7bba3c
-
Filesize
98KB
MD522f45d8c12e080f76e2e3a2787e438b9
SHA1725668d88bb90f93000500892653f485a383f91d
SHA256733cf0883caf86da59330a5082760f995a7e57647a225cdbdc97525242fa7106
SHA51283d777aeb9201cad4145a49c15a659a64f335968444fadf4b0654577aeb95ec1240da735305fa443ddd0f0003d75718bbb5c734aafae031897351ee412acbebd
-
Filesize
97KB
MD515bf487b2ecdf072753d7e3f7158fc37
SHA181cc783f6de8269d88ceff83c72390b646124a76
SHA256baf9f0c8ddcdfffae6616ab46afa02d30fd6fd1b2cad5dfb50728014997dba36
SHA51217205a95438e5d0c1c383cebc799efb2c7bede26f674dc0ef35fd9521918eb4bc7f674c8a6589aaaa44cb61c40c9cdd3070cf679241e38ce512dcad0528f6e0a
-
Filesize
114KB
MD59145dc3ba22bb154d0808d838a7a50b6
SHA1a76a037e05046c676d0237d47324f8853ae6ff17
SHA256c3f13d8707015cf91b6eb58fa87f47d3d99919ceca38b7442c8a97d1c89096f8
SHA5128a068aee29743e4e59182c50b8de4376bdd3fd6bd37fbfbaaf5bd30fba11c7dc8d77702bf7c52a34d0637880c8998e80c5f5fb6ca8357a04acaa2c8235288ace
-
Filesize
4.2MB
MD5f2081a56cdd077cb76ccdb6b3ab584e2
SHA1a9167dd0477d900f056792c04b42793bd0e89f30
SHA256c16fd04fee2b9eb4d0c2a3cf691603af91274d655f51dd174953183466fdb036
SHA512715d6b0ea240bb08d8db3f5f243a751654513240d8b2dc85d7a77aff27f28fec100ef376df8adc97eaf1dae2899688beed5c6f00d50684064436484d072aa696
-
Filesize
4.2MB
MD57b3dd3348352f1da968e26e8c1cacbf6
SHA1f5e9002f4de918021d724d7a50a18182a63a82a0
SHA2562f9b3c55547d91316e6042dd71898dbb396310f6edf7d8e050cd4e115ae9e3aa
SHA51231854d863a45e330b8faca7f62963f9d3ac1873808c571b32203c67a98c304eb7ba2b08b776a4446da9c5c197db1a7cc297dd2c3eb202e2c6896f351a1dcf7f5
-
Filesize
72KB
MD5e77a4f7a4c4e8b56eb345ddeaca646f4
SHA166da7521cafa4e23ca3e8b3f775518deae8d9ade
SHA2565d0afab5d1c34015c594d627cb5c1279ee25bee4ba353b949274f551bd6d4c47
SHA51221ccffbd2befcd168f6291539956fc7611e575b66e553d86298c65d55125747b195cb2849a479219c5dadebfceeadb03f9e1eaf95e32537add110058e6924717
-
Filesize
72KB
MD5c6f7cab38b0fa871f5997bcdde8feac2
SHA1e2d60aa3e1af8ba8f646631f0a2579c793219165
SHA256abf93e30f4ee766f95f6b35119f861fde753f424592ca89e0dd1a20258115894
SHA51284fe923a7a2454f637210d920f4a222fd6b640beeb12a7120656d0383b7b5dc182680877d46f81765572b5cadcbf83a8ede2003387d378ed9c5acc1c2522fd69
-
Filesize
100KB
MD5c7bb7318ceb936b2d186d888936a2b8b
SHA1dbe398836ffa79277467388ac20a267caa5787ce
SHA25660f6af33c5a514187c8c71834648c6e852147da86eabe6296acd653647223180
SHA512211172fd35a6b1ccc1e453408be9b49767b74d6148e02db0c8e94b7eac39c058bef9562cf6c0842ac9771abd1d98ff28478fdf20b84ab3bb666b585e1a905bca
-
Filesize
91KB
MD5dfa35e49b21564c8d59d220ac7100de2
SHA118336dc22c7bc224a72a09bb96e76607fcf12e08
SHA25676e2a77fe636364c9d803656dac8d5389c4031c897f4dc142d5e45223331174c
SHA512d5c533e2fc1c5780c3a7bd47426716b010dd359ee517ba7939552fee140eb5e5eedf5c4e362214db9129affcbe88d7453385f246105ad70118c8838fa2f1fc6a
-
Filesize
99KB
MD557ee0abf876efec12403cfe2db303844
SHA1234219a69a7ce5bbbbcbd51243de3aea586a34bb
SHA2567d4cd8695416ac146da841523d0123c89275cd734eedea335007f657ccbda927
SHA512f4e5a28ba6f3591e7b421bb0ba1224a42269240a79a81cf35f68edcfe23388911a511288d808e29016eab31fdd45c41b91fec45adaf96e577d589272349c39f7
-
Filesize
100KB
MD5a75fde630bd772d47ed047317d127d22
SHA1806abdd1334962ac22f8305ffa078af8a925f372
SHA256365585ec2a276ac5c58abfc9e483af56ed0c5560648569a0f0d33a6144813546
SHA512ec68ebf9093421d1666ffe74829f294b3d4836bd648b5a6f6b574b529cbbacada4f2fda0fd4b52313a01c0a61e09d9a10d3dc9185f5fc12bd577171a3d7850bd
-
Filesize
98KB
MD5b4d44356156eca44f5d4ff89104987df
SHA10c8605cbeda18e9d9ea54df53f1d5b559d85c48c
SHA2560e98a3b90ba79782634e7771da954f5446eeaffab9d080660198ad7ddf9f6b45
SHA512860573d4d96a8215841f0149ce41107b15c42487418444b01922f6863b74d31a119dd738f9e4ed4ac23205972f4fece21a8578895a03d00f95691d658c022c26
-
Filesize
80KB
MD54563561f888b2692006f66a4ec7f7184
SHA1ff54ec0dbabf4dafdf9eebe928ef3cbfb5c71f36
SHA256d302d9a08fa0f5c7dbc56e208f008902a0c50c0e1f130a740a7f289de99e2aa7
SHA512b51e303a9c7b13ffa1b24fe3f191a57deb08271e7742a513f1f34e8ee6a92142ed4f65ce7d23f7f442e28eefe86667e02d90e107d5372a1b92d267390923cd5e
-
Filesize
79KB
MD522d6bf99c5489f8e4720470530587545
SHA14ea4c04ac7b7ca17e345fbb3e0b9d8177d55fe56
SHA2568df122bc2a3aeedb52c00fac09d567fd5f06fbebd4bb85bf4344a30bb102c0e5
SHA512d507e95a60d097bce2bf06277029792c40b1ca3da999871ec6144951b016e6648f877b079b39a5da76e612aa00f14bee84cc74289c5e2a73e7db0298e5c29d88
-
Filesize
96KB
MD5d290c36e3ef85ac8a2e301815527d1b7
SHA14fdb88d9283a530874ccd237a2561551acf5e8bb
SHA256b2527213b3271f8cd933bd2501e944d33255810a9d4edb635ccb4725fb3f1643
SHA5122c7c5834e128456e6d932e46f54085724b2938f90207d06a5eb8d9911d98d83146f74cfc66f2180e2bbd6b647552adb691ea97c17134256806701824a85d215e
-
Filesize
4.3MB
MD56aead4a806fda9850b4ddfe73ceceab2
SHA1f6b798d32767cf94bea74cad3d972a8ce95aa6b6
SHA256539fc41c29353bc16fb0f2bafa64bdf6a2811373e7200d4e1433cd93246f8c37
SHA512f9737624e2bca02954d7bff7805abe2248c00fced2ed313df7749f9b687636dd57714e2c78165005e5421dd775f1c644bd6b03453e4d61766d3f11acf8817495
-
Filesize
4.2MB
MD549ca852e0e9f565ace61ae6641a3bf0e
SHA1b1e6517f0693a43bddf41a49686322fcf08642b3
SHA256ba5a24e05dca3502a6d5355ec8a9ef2f0a54a25094c229b510bb571b50217e8b
SHA5123a52b4d6b4ddc313e14dfbed2dade741685659555fec0b01324d6dd37eda0b3d5187c2102feef9c5a4f504f0c0148065ee4a03253daec07a66605c8bdf1fcec1
-
Filesize
72KB
MD5d0e4263173a96ddcd371a49b9b5b52fb
SHA19b1f69645542a2d430b521f7d593794264035832
SHA256a02ad2a83719b6d1e88ff83e67dd7ece09bd2ce6944d498d912e1e5c7a2260ce
SHA51279c17baa2b2a09e2cd92886b195196dc9ac9f99d4b5fbdd9d9d2a10c17432c549afd4188a24f5a5778d42ec345617079ee16a3b34351e2672220e54c6915b07e
-
Filesize
72KB
MD59ec1f228fc4a9c20ece6ee2d3aea1c19
SHA1e749dd00380490dfd7fc94a8be04ea1dd8171717
SHA25638dd11ab2264867b66eec8b7f01fd4b1ad606ede63c71ed4416e730edaf0d6e6
SHA5125daf27024d4b0770dd5084249f16ac54150f8616792db0d234a4d0ba7d2e68e3247589ba580da9cf05a4a922c140e4f47937450c76f3aa5e98fea9e415940a63
-
Filesize
100KB
MD5d1903c7eb56071b83b9520d590e1fdb5
SHA11aa1f4423b0a6694f1600617935616248f6b3837
SHA256842e60feb6690ec18946ef3cd65d1ce2399947d065472083f3055f54978537c1
SHA5124f2df3fc00245e786ae7f2b358513e18f5fbea5981f29361b90eb1ae845dd7d57beddea5c93108be9b8dfbe6b76e79f781d95753943fe3a6f366a467745ef112
-
Filesize
91KB
MD5a4ec9d2d8a69c4a2d70d066fed7010b3
SHA16f762ac9490aa81768b4b799756f5e3a464dd531
SHA2566bc014b72bf8899d140f72a5ef841074f87e9c45be9cd1f470cab665d6b984d1
SHA5128984945560b0ce835b362b0b7742baf0cf13c77f2c62d3b6ac0151d573052b6759c44d0e08b2a9c7509946d5f3b8fef91875e840a050504ae172826a30f4c978
-
Filesize
99KB
MD555d288299d183cc1f8a7981d44393a26
SHA18e7c31bb402528e15c6c32b3bef21fb98b127219
SHA256f7f1a990e3c8d7117cdbd13862c543f0a479e7f1ddb6741c7e78c98e98b01665
SHA51254da54e91432183b0a10cb18ce86cce2fbc5c88eda0900cbe7fd5653be4df62d69ead62f33e9f2dad5647c5e666d8841f58ae99979ece0aa6c797456fab0fdb8
-
Filesize
100KB
MD5ed55da97a7ab325b3c47cfc0f10c24fd
SHA1878e48bc84a4847c215eb48c5f234d1237fbdaf3
SHA256e63600e254a9e004865e4070503befe9646a97e6ff94d216b29e42067d6cd9a1
SHA5122da4d0dd9ebb93774b341ca07837d10f6dc3decd4d394211e04e047d4416348b5fa988e8c558f133e737a33d95cce33a3f14f16a7036df55deb0fa3c92d56caf
-
Filesize
98KB
MD57ba3cf7cd14c1c3fac4c9f9abc6c25ff
SHA14c1d65e501adeba586a60c9350bdb8287a95922a
SHA256f1324903d7ef1ee95818fb96de01408c72ac94e42833a22e986147cb43d8ab66
SHA51254db81734c22d02d291950a7b241a7a8a6401ec81b51c686d6e9831963a29024b4008ed868fc53aa7c7639f39d1c74b9c03d3e4abcd5c9708f0a18a33575a233
-
Filesize
80KB
MD5775b5b683e16189cdf0692c98f09ca03
SHA10cb2d6814d518ffb6bd56cdd2e397e1a7fb369f5
SHA256da42252611a9f93c0d738ce55a80ed453931bf24a9abadd1958a9b2b2cdc15ce
SHA5123e28706d9056487028b75b31966d4a1e6fd9fd804de937a75553050190f649411a63fd88473e472f53de2f8bb98de81f6e8fb8a294ff5f1d6b9b3b8765b82fad
-
Filesize
79KB
MD55a82b1bbc009a7c48a3848d681af5b8f
SHA19d37caba2a5a08dc85ca447552533b9bcf1f131c
SHA256bded2cc9715cc2f5cd3b808246e8b326a5ba180a74d1cd5d212550560c5eba70
SHA512e8af9d3077aa9c693e30348e76c8a3ff66f213d18bf7fe29e21c378ef465d0703de2a3b1f965e85b603a45738ee9cdd5819f08b089a886352b6696aeabd7f0bd
-
Filesize
96KB
MD58c7d4f80e93982d9ad812ab80cf6de2a
SHA1041862365ce6dedded4ca8876189c9a515ba8f01
SHA256f95dc7c15fe86e6431ffa11f55d3aa7c4adc568543418d1757dd465c1e281184
SHA5122046e91c45d0e0af9379d329833f1eaa620b612de56a659fb144b9f4b888058e47071aa3f66dbfef95f307bffc431da8bba1e3e05bb5a0a127e8878475b88723
-
Filesize
4.3MB
MD502d9999cf3ff3cc4a3b6102daf80bf4e
SHA1647b33ba8cc7f7ff57c63c419d2a1309a4369a3b
SHA256749a293d5e13c3207de4b2e5b1591041b016d6d09090d65417be54a93eb1f54c
SHA512bbcfd26807c156fbf80727def11c5bc210797e3f6c547f6a09a7081ba18a20e8236caebcad1be92a66acdaa9869fe09cb4f0c411550e18d7bf380e93f64c3885
-
Filesize
4.6MB
MD586fd9fe80c5529b58f7dbe6addba68ad
SHA11382a2ba8cc1b0a926be4bbf8ea78aea8667abe1
SHA256fa9f4b641899bd7555ea96a2cf123b89175ce43bbf96e6aa80d298581760e19c
SHA51240d2cf009c6b9ed8dfc07512c89bf7bfd480f60ae7dda0e9bf5d56c427c7cfe6fe869d1d269b6eab73eb6882ab943cfa8dc81c5c916db2f8828a18dfa7cc9b06
-
Filesize
66KB
MD591ebb9d6ce1b2b76b2d141d10b404039
SHA15aaf0e6d4f2b7475b3afe81703d0f28b64631f94
SHA2562cd1b406b51c2a5121d224f6dfbb4422d63c4df3ede85112a96b3ab474ca61c2
SHA5121d84add96725fe2e84fffb170c630a6d9f3f13f242ca796b7f84c6ed08b8df69b07def47f3936f07f8d0420b1fed57e58eba75d0284b0a46232b0cbd2b515b13
-
Filesize
66KB
MD564677ae24f39d8143934da2e3dd0af91
SHA177ab1c5daa46bd32daed7cc40a53e4b7b6b7fbb8
SHA256e7861188435f96441157865c5a1bf2301952a75491d8f0f9f3023003fd70f8c9
SHA5124accb26b337125ca266e6a9df83173e5d63ab0a93c1c55c841965425adb68c8cab9c6ae495befe17d230a2f831a86faa58394903ef1c38c989a2ca7374403ac7
-
Filesize
94KB
MD5a3fef3c8d0bd27c050d7da58608169f1
SHA12761d79f992d1ad20d90115c40d843479b1cb387
SHA256adee2e1f781438c7f0f34a68e60648e5f5175d2bca465b0736f47fd2b0bb5a90
SHA5125be5e111d4960b7cc56626116ed05f53c6bc08d7555f016319e51d730fac68febe722d9988d82a0cb14b753b6244d1e2fcaac213c2e96f112d2ee3cc60835b53
-
Filesize
85KB
MD57d9822e7905bcb61c5da7d2709687192
SHA1701f11796fa9ed00c776907934da29228481fdbd
SHA256d33392e290fd6903f48f80ecbbdfd6cf147d1768554dda1b807ba19c3508414a
SHA51273e28e5db2cc09492a086795fd91133a5fa05cbc8794aef9bcc50675e3acd3857570b51f73740cdb0b91cb12b2b69adbb3882d6c3f1482f16a5bf4878951aff0
-
Filesize
93KB
MD54058ade903847b655b3f1ea51e9518d6
SHA19cc7f8a10fe241b9723e81167317300d67f6c748
SHA256f80f4593f1201da2beb451d8adc09220045fe7b2275e55654494feef187bf0a7
SHA512e65c6d1cc87c3cc3495f8c874c6ea25ec67d0fcd0feeffa2af8309ab3c9639fb4f5a4aabe21a2660355a005ddfe9298f579e1120a191d07f53bf4b4b41b883db
-
Filesize
94KB
MD58ce595d38ebba359652758b258a36671
SHA1272bca4f1cb06d8f0b9ef0b18e0dbdb0e707a972
SHA256dc1d2151cd0095995edf3a9ce6445145e97671fd4e06c07c014e65d6f571837b
SHA5129153dad0e7bd511e20c3a3f2afdfbeb6f6e791e72de42ece539fb99e2db42a4fd0d3bba42646cdb93fa0c0624f4c282b2eac14fee16005dc023489c408e48061
-
Filesize
92KB
MD5af39f279d1098e9b1074b9f167929aa5
SHA18eb3ab86b8c8a4a40201daac06941d804a814f6e
SHA2565625802ca635b85902d1edfca70a112e7bbf04863a020120bb917980dc94e710
SHA512da1a5d0e91def986ee6eb38ec4f83b6a67ffa74bf2892239bd92a69c66ff347ae47ce242b7a4493e316b60786390735bf4c1bf21f4019610c111a976a2d05740
-
Filesize
74KB
MD5488739ee1d02626148365931477d977b
SHA12db696b9435e8b91e5ae6debcd29ee69cfc982e6
SHA25690e909cd3d72cb5b025eb4c89a1637bdcf802ff3d2734b7f419b1cce6e645287
SHA512ac08643ecb5eb62ddc553a585f790d841a409ff829e2f81d9390533516baa28a571ea0a9396bb202a013d32af3025b8cd38bbdc9b59737f5c82666d38950b221
-
Filesize
73KB
MD514d6ef7b50e2ca87e03e56f880c544fd
SHA13d9db71f8fbfca68f4efc373d7b0bdf35f9e0dab
SHA256bb8184f98ff622a8d78fd4dc7b1945062a90adc655aa4458a8a2f437f5a2d9a1
SHA512f1920018903d03241c95100de3187a56557a9cdb209dde6379b317b4c9d59ef2125441a5a9ee12189c6b6f74d667e7c2e9359ddc392891d4abad29cc598b61d4
-
Filesize
90KB
MD5344197a5492d69501018a01686d804fc
SHA15ebe7313a615ed93e19b1d70c82e76930688cf73
SHA256ee18b860c306aad5a3e4f9e7e1b785c3d74f62d7b4104bd038de4abc71946413
SHA512fe3bb3c627a120a619947a98236fd5b6ba43e4b7634af4f4a4e47cdf9a7424e0eba8eb93be661f09a0be28f9f63e407c7ba310bb7f623da38a69e3c94080fff4
-
Filesize
4.7MB
MD5ed15c3170c28fd42d5de20ccf2e11448
SHA10ca9e71828b29781060cf525581c36dddf2a1be3
SHA256572aad80fb128e9fc47dbada5cd0c16a9ace1c4f92fa29a11592c6f89dbf37ea
SHA512f367aa70780d367afd0563507d68cf625c29c89664be3c3572ccf6db2a11848f47a950e13495c99b1210546a801fc6bcd42c773eeee17178b3d57f43bff29cc3
-
Filesize
107KB
MD5ba3f6bd811fb94e241576d7b8a24d448
SHA1e88a8a3b7e985fb89f372a7a6aadc6562cc91a2a
SHA2564b376bdaf0d6499a0939e249cfddce64d3d0bd8c78c24a2eeda5baf28592dd3f
SHA512d51fc15bd7375efac73b99855d25af76fb06e3c12f7b878f015422c27e5f1a7ac4d020937a851960832164fea0a354401cbdcdbbd7080a711d4d856782f5966c
-
Filesize
107KB
MD55c473e27fcd0b478cadf36002a81e9a5
SHA12303c22755464cecc023ac941bbb8bdc2cb09d67
SHA256aa608879ecd75124db86ed818248453fd568191dc106dd2f8634719831113c27
SHA5125bbac32486f4035f54b4c30a3b58510dba5054badb702351becde9ee0e0238a990c6e06a7d389e33de479f62003d1cc51a18d84ce649940e0331bf3b5ccb2350
-
Filesize
108KB
MD5a40a802d753fb77b25a534a7d0f89cbf
SHA1465b06648378257d1d52637ca6042fd6f06c8792
SHA256e355cf02e889b11ee91695bd51fb76eccd5681c39deff3687619e4cce7dc0e33
SHA512d0fb85b4f2646ba7da694aff9bff0d1ec0adb026a8fd6e3dcdaf9e7de4381032f9d22fc5157475a56501bddd96488899d35d1ce16dab7e961030aa75c4977cdc
-
Filesize
56KB
MD528962b034f6a55629049b167b0507909
SHA1a1b3610533850fbfde9a0956c0dced147f048328
SHA256d06a68d69eb46d0f641c29a29b5f00c0992badafdf8e2d832065101c7b54e51b
SHA512b0ff023345874b241c33872e9cd946f7c2f911580e1f9642ba2b3b6df677765dd21103d673e9c095711a517f8cd2c590f89391d3c3848a7b90d9caa1c8eee44d
-
Filesize
56KB
MD5e1c4ca1727c1260b1573380195759ba7
SHA1d71f892ea3c3c1839e692332e03e200481c34621
SHA256fdcf8bb218fc09753d606b47c315e0cd4b1c8008499484539b4fcec5539f2733
SHA51285bc37e90de00d1335c9c5d6373ef5385728cbc64b931af3e64c60c3acee41992964cce4d1f526ae3ccce546dd87610ca3722aae349c4d7701707397ac81f26d
-
Filesize
76KB
MD58ed18b15521709c6211cfab6a96b9f13
SHA18c309716098c6b827fa8041364f2040213cc225e
SHA25670444894c5d677f6899170810e82b4e3e0baeb1dd7e7aa6e6800e00aac433991
SHA512a4d52c326ce0cbfad0605e4f445c9990cb8d3cf0010117fd485d32b8fbb05a7da7d051c657625560f0c951e35c6c36970e08c0ff834b981603e451fe33823c6f
-
Filesize
55KB
MD508ca7b3a91387911e6361cb25675e1cc
SHA1a3fb5d9ea93650936cae65b9267b043e4af43991
SHA25662eecb9bc18f13edd83c8c51385fae36f665a65948f2da488eb89faea9a2d083
SHA512337545def12b2c6f56e1cdd5bd3c92a6037583bb96854361db0b2795b2fe4341d5ce1cbbc91aa5001944b363dcb5262a9695c0d791a4354c8a7bd3703ca231c5
-
Filesize
55KB
MD50ab9a2e31ce2f889c075394abaef06e6
SHA1cdcfb5bcb3d5f60450281602f91149664fa4635f
SHA2563cc1fab894a9b44ca6d2cc4bdb9ab04e65fa22057013587fbd54bd0c31f884db
SHA51243b599103f997a6244359df8002de3432ac5923f4e050a7d74e4f5c1d1502c876fd7fee30e9c26268977d99dde0818fdffecdf9ba6ed0c8e4e4ca5fece527bd9
-
Filesize
1.6MB
MD5d010ba45055cb0c3dc8fc3f5cb1b4695
SHA101f1e093ee276ba37f230f0abb762f0ec788c159
SHA2564f9df474b10196ce8faf7aad951a95df55d3fdb0a67012a6b705485f5304b5f2
SHA51229b03988b929abcad9ad98ad164890ef254a91348e1531d468beeb36e6eb9c27233fd7e1a983aac3662c65f8675d15fcfb2f7ec79a8761978646e34ee8e452db