Overview
overview
10Static
static
10keygen-pr.exe
windows7-x64
3keygen-pr.exe
windows10-2004-x64
3keygen-step-1.exe
windows7-x64
10keygen-step-1.exe
windows10-2004-x64
10keygen-step-3.exe
windows7-x64
7keygen-step-3.exe
windows10-2004-x64
7keygen-step-4.exe
windows7-x64
10keygen-step-4.exe
windows10-2004-x64
10keygen-step-5.exe
windows7-x64
7keygen-step-5.exe
windows10-2004-x64
7keygen-step-6.exe
windows7-x64
7keygen-step-6.exe
windows10-2004-x64
7keygen.bat
windows7-x64
10keygen.bat
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 08:20
Behavioral task
behavioral1
Sample
keygen-pr.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
keygen-pr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
keygen-step-1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
keygen-step-1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
keygen-step-3.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
keygen-step-3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
keygen-step-4.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
keygen-step-4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
keygen-step-5.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
keygen-step-5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
keygen-step-6.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
keygen-step-6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
keygen.bat
Resource
win7-20240903-en
General
-
Target
keygen-step-4.exe
-
Size
2.4MB
-
MD5
2ee9fd7fd5b40b30130679f4117664fe
-
SHA1
0d7e6b6119c8c0129973792f203b9cd81a6fed89
-
SHA256
d9fb3bd2fb13d72036461c87ed6dac9d05d316a574bb7b4e44c4ac76519a578d
-
SHA512
1d66b9cb930f16e8d417f6aa18881c182ab8526c83425741b12ff46ef74fb411155aa6818aaab827146e5a20c76ceba6f8e42b6b7dcfe0cacea14fbd6fe6dd97
-
SSDEEP
49152:Sunqy/yencuHj4WI03kPMPP4e2dlIObjo5RfksOlzdvU9ohducXFjZT:SKqynHSirP4LRskLdM9cdu4h9
Malware Config
Extracted
ffdroider
http://186.2.171.3
Signatures
-
FFDroider payload 3 IoCs
Processes:
resource yara_rule behavioral8/memory/3252-82-0x0000000000400000-0x0000000000759000-memory.dmp family_ffdroider behavioral8/memory/3252-86-0x0000000000400000-0x0000000000759000-memory.dmp family_ffdroider behavioral8/memory/3252-586-0x0000000000400000-0x0000000000759000-memory.dmp family_ffdroider -
Ffdroider family
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
keygen-step-4.exeCrack.exeGloryWSetp.exechrome3.exeservices64.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation keygen-step-4.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Crack.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation GloryWSetp.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome3.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation services64.exe -
Executes dropped EXE 13 IoCs
Processes:
KiffApp2.exeCrack.exeCrack.exeGloryWSetp.exechrome3.exeGloryWSetp.exemd1_1eaf.exeInstall.exeInstall.tmpservices64.exeSetup.exeSetup.tmpsihost64.exepid process 4832 KiffApp2.exe 3152 Crack.exe 5108 Crack.exe 2072 GloryWSetp.exe 1068 chrome3.exe 3588 GloryWSetp.exe 3252 md1_1eaf.exe 4732 Install.exe 4700 Install.tmp 5024 services64.exe 1588 Setup.exe 4060 Setup.tmp 3972 sihost64.exe -
Loads dropped DLL 3 IoCs
Processes:
Install.tmpSetup.tmppid process 4700 Install.tmp 4700 Install.tmp 4060 Setup.tmp -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe vmprotect behavioral8/memory/3252-81-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect behavioral8/memory/3252-82-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect behavioral8/memory/3252-86-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect behavioral8/memory/3252-586-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
md1_1eaf.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md1_1eaf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
Processes:
flow ioc 82 raw.githubusercontent.com 87 pastebin.com 88 pastebin.com 18 iplogger.org 19 iplogger.org 22 iplogger.org 81 raw.githubusercontent.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 40 ipinfo.io 42 ipinfo.io -
Suspicious use of SetThreadContext 1 IoCs
Processes:
services64.exedescription pid process target process PID 5024 set thread context of 4864 5024 services64.exe explorer.exe -
Drops file in Program Files directory 3 IoCs
Processes:
Install.tmpdescription ioc process File created C:\Program Files (x86)\AskFinder\unins000.dat Install.tmp File created C:\Program Files (x86)\AskFinder\is-D3EGU.tmp Install.tmp File opened for modification C:\Program Files (x86)\AskFinder\unins000.dat Install.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
keygen-step-4.exeInstall.tmpSetup.exeInstall.exeSetup.tmpCrack.exeGloryWSetp.exeCrack.exemd1_1eaf.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen-step-4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GloryWSetp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language md1_1eaf.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2812 schtasks.exe 3560 schtasks.exe -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 44 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 41 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 42 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 57 IoCs
Processes:
chrome3.exeInstall.tmpservices64.exeexplorer.exepid process 1068 chrome3.exe 1068 chrome3.exe 4700 Install.tmp 4700 Install.tmp 5024 services64.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
KiffApp2.exeGloryWSetp.exemd1_1eaf.exechrome3.exeservices64.exeexplorer.exedescription pid process Token: SeDebugPrivilege 4832 KiffApp2.exe Token: SeDebugPrivilege 3588 GloryWSetp.exe Token: SeManageVolumePrivilege 3252 md1_1eaf.exe Token: SeManageVolumePrivilege 3252 md1_1eaf.exe Token: SeManageVolumePrivilege 3252 md1_1eaf.exe Token: SeManageVolumePrivilege 3252 md1_1eaf.exe Token: SeManageVolumePrivilege 3252 md1_1eaf.exe Token: SeDebugPrivilege 1068 chrome3.exe Token: SeDebugPrivilege 5024 services64.exe Token: SeLockMemoryPrivilege 4864 explorer.exe Token: SeLockMemoryPrivilege 4864 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Install.tmppid process 4700 Install.tmp -
Suspicious use of WriteProcessMemory 57 IoCs
Processes:
keygen-step-4.exeCrack.exeGloryWSetp.exeInstall.exechrome3.execmd.exeSetup.exeservices64.execmd.exedescription pid process target process PID 1952 wrote to memory of 4832 1952 keygen-step-4.exe KiffApp2.exe PID 1952 wrote to memory of 4832 1952 keygen-step-4.exe KiffApp2.exe PID 1952 wrote to memory of 3152 1952 keygen-step-4.exe Crack.exe PID 1952 wrote to memory of 3152 1952 keygen-step-4.exe Crack.exe PID 1952 wrote to memory of 3152 1952 keygen-step-4.exe Crack.exe PID 3152 wrote to memory of 5108 3152 Crack.exe Crack.exe PID 3152 wrote to memory of 5108 3152 Crack.exe Crack.exe PID 3152 wrote to memory of 5108 3152 Crack.exe Crack.exe PID 1952 wrote to memory of 2072 1952 keygen-step-4.exe GloryWSetp.exe PID 1952 wrote to memory of 2072 1952 keygen-step-4.exe GloryWSetp.exe PID 1952 wrote to memory of 2072 1952 keygen-step-4.exe GloryWSetp.exe PID 2072 wrote to memory of 1068 2072 GloryWSetp.exe chrome3.exe PID 2072 wrote to memory of 1068 2072 GloryWSetp.exe chrome3.exe PID 2072 wrote to memory of 3588 2072 GloryWSetp.exe GloryWSetp.exe PID 2072 wrote to memory of 3588 2072 GloryWSetp.exe GloryWSetp.exe PID 1952 wrote to memory of 3252 1952 keygen-step-4.exe md1_1eaf.exe PID 1952 wrote to memory of 3252 1952 keygen-step-4.exe md1_1eaf.exe PID 1952 wrote to memory of 3252 1952 keygen-step-4.exe md1_1eaf.exe PID 1952 wrote to memory of 4732 1952 keygen-step-4.exe Install.exe PID 1952 wrote to memory of 4732 1952 keygen-step-4.exe Install.exe PID 1952 wrote to memory of 4732 1952 keygen-step-4.exe Install.exe PID 4732 wrote to memory of 4700 4732 Install.exe Install.tmp PID 4732 wrote to memory of 4700 4732 Install.exe Install.tmp PID 4732 wrote to memory of 4700 4732 Install.exe Install.tmp PID 1068 wrote to memory of 3736 1068 chrome3.exe cmd.exe PID 1068 wrote to memory of 3736 1068 chrome3.exe cmd.exe PID 3736 wrote to memory of 3560 3736 cmd.exe schtasks.exe PID 3736 wrote to memory of 3560 3736 cmd.exe schtasks.exe PID 1068 wrote to memory of 5024 1068 chrome3.exe services64.exe PID 1068 wrote to memory of 5024 1068 chrome3.exe services64.exe PID 1952 wrote to memory of 1588 1952 keygen-step-4.exe Setup.exe PID 1952 wrote to memory of 1588 1952 keygen-step-4.exe Setup.exe PID 1952 wrote to memory of 1588 1952 keygen-step-4.exe Setup.exe PID 1588 wrote to memory of 4060 1588 Setup.exe Setup.tmp PID 1588 wrote to memory of 4060 1588 Setup.exe Setup.tmp PID 1588 wrote to memory of 4060 1588 Setup.exe Setup.tmp PID 5024 wrote to memory of 396 5024 services64.exe cmd.exe PID 5024 wrote to memory of 396 5024 services64.exe cmd.exe PID 5024 wrote to memory of 3972 5024 services64.exe sihost64.exe PID 5024 wrote to memory of 3972 5024 services64.exe sihost64.exe PID 396 wrote to memory of 2812 396 cmd.exe schtasks.exe PID 396 wrote to memory of 2812 396 cmd.exe schtasks.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe PID 5024 wrote to memory of 4864 5024 services64.exe explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\keygen-step-4.exe"C:\Users\Admin\AppData\Local\Temp\keygen-step-4.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\KiffApp2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\KiffApp2.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe" -a3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5108
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\GloryWSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\GloryWSetp.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'5⤵
- Scheduled Task/Job: Scheduled Task
PID:3560
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit5⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'6⤵
- Scheduled Task/Job: Scheduled Task
PID:2812
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"5⤵
- Executes dropped EXE
PID:3972
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.office/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6BetGR/pnUtRI9a9x7kTNHhD/AzlqVRzHV746NYfGJ5T" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\GloryWSetp.exe"C:\Users\Admin\AppData\Local\Temp\GloryWSetp.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\is-EKIC8.tmp\Install.tmp"C:\Users\Admin\AppData\Local\Temp\is-EKIC8.tmp\Install.tmp" /SL5="$80296,138429,56832,C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4700
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\is-4H4TS.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-4H4TS.tmp\Setup.tmp" /SL5="$90296,506127,422400,C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD52af7209d90ad2e42e0deec16ac9250a4
SHA1fbd1c58ddd2e100cb1ce212a31cc319859b4fdee
SHA2565a5f3f1948134371d075cc67e5738330602aa8bdeb6fb6ddfa9efda5fb2e3786
SHA512b5ce13018c31ce42fb711057c993c4034399e228256b3b8257a6f9d77e235df73ea1b20a4b14a6e5f1ff8b10596ab221a9d90c507e80eb2188fa7bd3322845cd
-
Filesize
56KB
MD57126148bfe5ca4bf7e098d794122a9a3
SHA13fe6be3ee8bf1a0c99139b146913c8c6acd7dd64
SHA256f8c0350d71e5dd14438d477f73915c4845290c7f0620656624722183b76013f5
SHA5120bec6450d1be17489436de7a5186dbcb88089edd4227c3b5484460c9368e5ca0a2d88c385d31989f449a5d8cc347057c80a997682d6c0ed1b9cfcb85c677eb48
-
Filesize
185KB
MD53eabedf278cd8dd76b23497dad959435
SHA14ca403030401fee6be2d9dbfb4d638e29f9ef19f
SHA256a526e9dae9298bbd03ca2a8fc8a45809eac1543bbec4680182493c551d65f731
SHA5126cdffac5c48e0984eed3a2b28a2a49cf13f79da76763848bdd4c406fc14254f4d10d4fd77a6f444321c2e626d8f2f569c01c01ca70939c880b5847573dcd30d2
-
Filesize
381KB
MD558c203a58312c6121c932e9a59079064
SHA1f57f41180fbe8e5dffafef79ea88f707c5cb748a
SHA2563555826df75751600d127b343a3214a0f9b4c211b1fdcdf9ccceb1dda6be5f27
SHA512e141e9da04e6ba43d639c729d83fd9773bda1c51759dda84f59f27a017a5809e47e4ddaa5a2c8be92ef81ca58fabe06faeca37252a7b4ab64d18679fc5e8e406
-
Filesize
83KB
MD51c844fbbddd5c48cd6ecbd41e6b3fba2
SHA16cf1bf7f35426ef8429689a2914287818b3789f6
SHA2568f474d9f74192818abf096b2449564ff47f1ab86a14111179bbec73e2ffb6865
SHA512b4d12bd02029aab1eb9d609875df98b96391db86f3c0f0f4e82d6814949794668fd3aaba15439383e9a7bacaa3616454f2913222d018e195483507a7d675424a
-
Filesize
746KB
MD5fce837623f5184a71022ae71638c84f7
SHA1f89872d03aa84d7d445c447a917dbc118a25d42c
SHA256ac0cd27c71d75b6ea298c5169f845ab40e4b5750cb76368c5364f29178e0594d
SHA5125cd855b3493e8bb1f17f0ba809efb13c690eb1cc8a12006d2d74a5f8d69a3aadc77718a6e752a5c1455c218fd099895d54dcc41652ea889e41892c49d736755b
-
Filesize
14.0MB
MD59e412f303d3ffa06296121aeeb4b7782
SHA1e91ca31e150afb3184b2d4138b64c9f638c56b45
SHA256130ef60ec9cc9fe6d3974c7746daa0a1179e25b52104694a92d9b3f67ab111ee
SHA51230d26485680c2860c939ef1655554dfb646937a0db1e7237bfec9fd1e4a305539fd96a4205177227b21792d5a7c33e7b1442d0957541461085c612a9c1f84283
-
Filesize
75KB
MD5dcb8d016bf91f29f2f097965addc83a3
SHA1d716827f5f68e5f91d47da544cb17674d6e95ef7
SHA25641c2cdebd75c9e3af71418dcf890715c58d5355d9a7b90780d8fb38c1e12c9d5
SHA5129a898e4f3aeb113a5dad4c617037673a87b82ab329d2c50f7ed0cb200de28bf3362464747727bcfd1d8e6db9f48402306342790cf8bd3796203a11ffb30abc15
-
Filesize
16KB
MD5efd93dd10e242c97021572e8b67f27fa
SHA1768899764ba9f559e43719f284d8a28210bc39ef
SHA25619fc6e4006561d95d447c2c6420a58f64099cabb2d3f225063dac5737e51d248
SHA5120d1c64da0d5269879fa3a4582cd8cc8c4690bcc4b5e7ac876bbcae7ccfb209d3c8c322b1f0d18d101666e989f07990b949633de2b51c20f3423b5a0725b86342
-
Filesize
16KB
MD5c3548f0973df3fa1afe1a29dce822764
SHA1d790e4d65d066d3717c39012bfc4546280002f8a
SHA2566ab4deba1805e34e8c1b98c7b554c084ea2845b9de7b0f973d7ac82dee267ac7
SHA5124a4260ae63d4740ab19d3d2f6ecff1da34b7b59de087255d0118e456d112cda364dd51711d7bb79f1156966d9cb14b3e29326a4a4c08bd113e2d5806214d5179
-
Filesize
16KB
MD5e860ce649858c5ef0b41c2e048adb01c
SHA1a24ff9e241167748c7f9d03fc52378bc7af55574
SHA256f6b580e2535302df20b7e3bdd69a9a2c325f1943b52b5e2c406882e9fd35a8a1
SHA51200537ed26e5f0cd8a6c5371e3d983158e699e19a58b40757dfbbf171012701890b776e4a6cffb4a8c2311c7affdada6520e0411a0967955ee5e2302909420539
-
Filesize
16KB
MD550c076ddce29b4b937a17b3b78e236fe
SHA188cb46400b8c5b0128a456c3bd24d8a6bfa3679e
SHA2565b69560a22fa6157062a70004249c94420253db4902ecece8fcd59409880d549
SHA512886aeeae1084308bf86c23979036aea8eb1135a2fe4aa45cfa4313627f72c0720db9dd0301bbc7268a6eb8c0bcf27fa5c1107e1ca94539f60916d711ef647e9e
-
Filesize
16KB
MD5d87e4840a7089c333d08c9f0527cbb73
SHA1bea66b563a2b6adb759d26708f1d6f19ad67ad9c
SHA25686b4df4bb4f8d6587f0e0d2402fab10e77e91db8fac7ff200d0abb68604dd6d9
SHA51297d3be27cda19ee4dc0aa549619c52950d7df7e5b6ac6ba50a1010f74af8f7cd09fa4725c2d43a96525c0eb8b04632dc5ce657ec4e8ff7ab7a9ea94c1e4a00bd
-
Filesize
16KB
MD528f440a661c32afbaa45bd28ec123ee0
SHA1c0ccf699e7efccd57b49bbe201fcf9400eb19503
SHA2567d42c474553910696165d0667efbe2907b5e39ce3636c5eb5c0394db9f0c3fbe
SHA512fc7ec02167d893698a7c9efe02a0c42511a2c89dfd9edf6c901d3462d669af0a1f334a9354ce30e1d086e7fa9e48cf97d342e525e57e1925184a8872d9299d2b
-
Filesize
16KB
MD574dff7e5017ad08eeb77e74f888c7afb
SHA157852e2dc1fa4af361f4ffd0d2aa7fe440860099
SHA256679933db579d0c0db02ba886558cdfed291699d6f71bb0698a730603ccebabc8
SHA51271cf91a0fb0dd5e51a705fe229dd6a79a745fa7f9c7ac16788f5f955d458af0d216dc450a451498b9dc457d271548b204cac272e2b8f8ad7fd065080e4ec5e09
-
Filesize
16KB
MD57565ccf89a046e6eeb6237b34aa3cc68
SHA18a6fc9003f21cd9b29997b6b0866e80145bb0be0
SHA25617f3410c998551f094b438f8c1da7faa6b0fc89af7f23c230646166abee3c9ba
SHA51287425ba5c3e032a47ba303bb6386140eb5bc3281a007fc8e6767fdcc2cb443548ca6c3c7a12058e09e13ebf7e25e6437a49b29813f0e50d532f943f03c8f8a44
-
Filesize
16KB
MD585e81a682e07fdf46aaace0d0be96379
SHA15b9c63cfa61be6cbb80b55388f868a36ddd9464f
SHA256b96c333cc55740f09e1f0d6b459d9ccdb33c4fc8f391d76b5e5949b4633c0ecf
SHA5124e2869df27f3659562a716a1c73e697db6a81555209c9dadabb3953b2e025e6a2484041b6b33efe925901a5c1e6c7b28772fff3615689727efe58e60f8ce2593
-
Filesize
16KB
MD5de0224b7ac716957c81d621141e7b449
SHA1bbe70179d6adbd4e4d0a835be9acf3a0c51212da
SHA2568ad876ce1e34867ca28af82161aee1a5849c90416121b62ca684882e7eb5e112
SHA51251db4ed982545ecc97d6e9c8c6b2eef7cb82c0738c2451ef3592ace5cbbd5fd0e3a31eeb7cf5d7209293483aad3b1d16928429d0864026a77ca756bc2aa8f266
-
Filesize
16KB
MD5a7b0e88f16ded772a371f1f7a7ffc75e
SHA149e126f3b8f797172280e8bff20f3ef9da6efa1b
SHA2563ea1fde22377ac76d8a6f70494c291199513e0b4d00af890294bfb7044e8bdbb
SHA512f3581d35f2077a0218bc4672dd88ae309a89df962badd347e8327ca766327ea7e9e68767d922e1bfd15b18b770ddb287b3b92e4c9d52498bc533119169f39f5e
-
Filesize
16KB
MD5b3aa355873c820d7f05144d01838c924
SHA12c030d352367e73acbf676c73d884b0f2eee2e7f
SHA256fe2ee28d248cb6f4407d22e3cb9b57f761ccf8ea859cd52e2f1ef2c5683764b6
SHA512d8bbacf86494431e955cf7c8b81e703fcb7e6201f74a649762c76b3fc8e17b450d9791c7360c7126499adbef9f5f2c5efdc52add1ac22481883ac6a5003b72b4
-
Filesize
16KB
MD5dec0f332a0f2785396bb9eb3ac6bb6e3
SHA1e7acb3476105ac3c812f0f298304244c3966d26b
SHA2567fb761a70693a7a92b78aa846817f98a71e77c2a36443a683c2bcf69956bb7b2
SHA51238bea2019f33ed8a808aa9e83ae2d6f82693c12c0ae873c19055bd97c43e9ccbcdde66551fa09c0df6631df88beecdb040c733f2333e62ec1534dda9d7e6a0bc
-
Filesize
16KB
MD532c00ccf5d9d47bba6a9996ab1f7021d
SHA1529252248e3ed5cdba240744dd4aff9f5e5d5a8c
SHA25601f142951db1c369b8e8f02640d1d894a884ac3107ffdb8877d1f76aa4851d5a
SHA512a76ca96b0a70f2b95fb4ba66e1214bc59fa7574067e19ba21146ce11789dbd7de0162966f7f2b411b818e796de49a0bf4c24e08f5a9d6ebcf7eee37f53135c90
-
Filesize
16KB
MD57ea97bb995561d9f16d97fbaf491c102
SHA13c45646bf028ebd41bad94a8ea06ba262585d95c
SHA25609bb41520c067db26a2dc59f4f9255a9faf9a189c3cbf81337811838e760941f
SHA512ff970939de030a6be534c32dfb17321fbeb0b037cb9642fc7bbffc4db169d6054c1bcd55516c3c432acd0fc510f179157f44dc986b2da4276027fa7dda52d42f
-
Filesize
16KB
MD5752c367695a5f38326cfcfb64bcfc445
SHA161d32adec0a45a2d4b2fba4635088ba9358ae2b0
SHA25628f7bbd7813a2e67afb200979b309c594bd1bd2c65ecc1ae2b4409a595c4fdde
SHA5125c435c8aa3c154d4dea4b787a5ef5172fcf4d9b54f8502602f4b91aec178412b9fd4f47f77af6ea47b419b19da90840ee54628c124bd39a79ed39da667bc7b4f
-
Filesize
16KB
MD5fedf0bc8c671edfb25a4fcb03a8f1cf7
SHA1c1bde66cd8c02bdf060a829bd8e5c1587ab9a1f8
SHA2569b7aa9f4b74fe0d75bea58deeb9a821d6f7337246dd1918381d14d9f14ba87e0
SHA512ba19a059bf2349f87d4befafcd5f4f4c594a7edf8cf87162cf825c6bfeb96716378521e7825d0768ad202b6a2275ebe630f00d0099a9449f3993e02aaf6d6a7f
-
Filesize
16KB
MD5220f42ea2b3e6c3cfad966e1f3ce8ea4
SHA1d1ba8837a5fb63568805af944e7866bc9b54412b
SHA256f506854b0ae30adac8ae1fa1dbbb17fabd48b190a5761e72fa5ab2845fa68576
SHA512551375a2a969ad9c68f30101240132ef4b5f63250af87d1dd11fe61a19a7cc286cf2ca95ac11a2b5fb7c7327436c5519088182cd5458b229d175e7dd85e065af
-
Filesize
16KB
MD5af90c2454c9dd5f18d16799ae2ab5fc0
SHA1b33838719bb04ebc5b394596e16da9595179f80e
SHA256e56a077ddcdccd5ad8f57f09d7926c9312bbef049fda5593a14a058f6252eacc
SHA5122e94cafdadc97e326f93b32598510f14f010ccf2623c1a4588c3b5a5a042a93357775fc5f2fe056354f7dbd38c21231c4a011b9d04d6d5b0c4908f8fea5500aa
-
Filesize
16KB
MD53b5fbc1cdf124e9e78339e61a03df238
SHA1cc6d057c3c6a76f2ee4e15cf4bc1246fc38dc6f9
SHA256b6123454222108ba81b7a6654f2b205d503eb535dc61f0eb8d90d2c67db0bca3
SHA512cfd405969b83071196e6a21fbdf5dd718ef1f47e66e7c25f4fcb37e6143820bb6ff3f1d781bda4b39974ffff5a1a22fc52005790616a06e67e117c130a970ada
-
Filesize
16KB
MD57a3c05529205182b7343be60c9efc7ac
SHA1db483faab71686e900dd29c0ef1cc57e0f83cccd
SHA256ec46b2c78162aeec59d2d1d36c3e02110072533a43aaeed449015c0ddac8174b
SHA512a2f5ffa794cd688815703b4267e0206de26adfa3ce98ea902c54ee93df41eb77670578e938042e5fcb77ce78cf15998b2cfe48a5a3124c6187074642f326dc9f
-
Filesize
1.2MB
MD59b55bffb97ebd2c51834c415982957b4
SHA1728262abdfc4f0e8a84eb3b5cd2be9ea9d0acc16
SHA256a62cee3d2610ed0f693179838803e5c60dcd4f68028c60f5761b90c750125e11
SHA5124fa9d641aba15fd07a0711530ab1f1a4e8dbafe03e1ab71845bcdcd0a1efa9e59a05915834c5c717beada659dd5ee459aa7e08b4b0acc8f867ace07430eb11f2
-
Filesize
43KB
MD54b0d49f7c8712d7a0d44306309f2e962
SHA15f0a2536f215babccf860c7ccdeaf7055bb59cad
SHA256f996915ce7203dc3661afa686637426fab14c91682ada02054d2f64ce245af60
SHA51250dc00bebdafdc2cc1792a45cab5f13773ff0026c20618eec29f50000261afba65f58cec5d30be0fd5aaea17cac30b97b16be70c6f430987cd10a8488948ee2b
-
Filesize
1.0MB
MD5ee6709a95f2776394f70e2651e647b48
SHA10b4dcf16608f71dddd634f9799228752b8b2313f
SHA25681d5863c75b5d17e4be6b8decfd4b32be5a41e652cf803cea68271d51473f4cf
SHA512282f4a1add4a6db8c136d1a6b15e33ee37d6a280246757b805926468ae089d641a7a9366db8a16992987597401e4b1fafe22fe196387c3e7cdbc1981db61cc46
-
Filesize
200KB
MD5d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
Filesize
694KB
MD5ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
Filesize
7KB
MD59910203407b2605107587e954081c575
SHA18037bfb3b779fbbb3273df4f5c63d15b9589ce95
SHA25607b00c604d6473439dcd16b47cbefa450aad400871cb2215f0814547aca81b49
SHA512ba2c532d16eb259ae1621ac6ab668b4da28b2a842cb7320eee11982e2b835979c1ec6c566e3207e798fd2d0767070a568d2cd32dbb19200572afb2c7b32a68be