Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-10-2022 20:05
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
18KB
-
MD5
89ad448d079c97e6223bd48892a4c8b1
-
SHA1
c864447470fe553ccbb0574f8596200c72283145
-
SHA256
2ad50133104bbae5d82e85737296e39eecbfec15c270afd2a3b6aa981d53215f
-
SHA512
ad594497d29d3eebddc6ca56bc9cd5ae64fd5c27fb1087634e198e846cdaa92fa60043ee64d9712b45d8833d7485c64f7bfab3a1cdbb3bee0c8d02125d47562c
-
SSDEEP
384:UKsy+FgAgVXn4S4gy2OVP3WKgieC+qcLoJfPp2IJB/kr:UxfSnk0eKilcEJHpv/k
Malware Config
Extracted
orcus
146.70.143.176:81
712d31c7a3f54904a08d968a15b836e9
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\orc\orc.exe
-
reconnect_delay
10000
-
registry_keyname
orc
-
taskscheduler_taskname
orc
-
watchdog_path
AppData\Watchdog.exe
Signatures
-
Orcus main payload 6 IoCs
resource yara_rule behavioral1/files/0x0006000000015e3d-67.dat family_orcus behavioral1/files/0x0006000000015e3d-69.dat family_orcus behavioral1/files/0x0006000000015e3d-70.dat family_orcus behavioral1/files/0x0007000000014b6f-103.dat family_orcus behavioral1/files/0x0007000000014b6f-105.dat family_orcus behavioral1/files/0x0007000000014b6f-122.dat family_orcus -
Orcurs Rat Executable 7 IoCs
resource yara_rule behavioral1/files/0x0006000000015e3d-67.dat orcus behavioral1/files/0x0006000000015e3d-69.dat orcus behavioral1/files/0x0006000000015e3d-70.dat orcus behavioral1/files/0x0007000000014b6f-103.dat orcus behavioral1/files/0x0007000000014b6f-105.dat orcus behavioral1/memory/1616-106-0x0000000000A30000-0x0000000000B1A000-memory.dmp orcus behavioral1/files/0x0007000000014b6f-122.dat orcus -
PlagueBot Executable 7 IoCs
resource yara_rule behavioral1/files/0x0006000000015ec1-78.dat plaguebot behavioral1/files/0x0006000000015ec1-75.dat plaguebot behavioral1/files/0x0006000000015ec1-74.dat plaguebot behavioral1/files/0x0006000000015ec1-80.dat plaguebot behavioral1/files/0x0006000000016b94-86.dat plaguebot behavioral1/files/0x0006000000016b94-89.dat plaguebot behavioral1/files/0x0006000000016b94-87.dat plaguebot -
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
pid Process 660 blmkgrp.exe 916 blmkgrp.exe 768 orc.exe 1216 Process not Found 876 plage.exe 992 winmgr.exe 1728 WindowsInput.exe 1632 WindowsInput.exe 1616 orc.exe 1996 Watchdog.exe 1524 Watchdog.exe 456 orc.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winmgr.exe plage.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winmgr.exe plage.exe -
Loads dropped DLL 8 IoCs
pid Process 1808 tmp.exe 660 blmkgrp.exe 916 blmkgrp.exe 1808 tmp.exe 1808 tmp.exe 1808 tmp.exe 876 plage.exe 876 plage.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinManager = "C:\\Users\\Admin\\AppData\\Roaming\\discordnitro\\winmgr.exe" plage.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\orc = "\"C:\\Program Files\\orc\\orc.exe\"" orc.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe orc.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config orc.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\orc\orc.exe orc.exe File opened for modification C:\Program Files\orc\orc.exe orc.exe File created C:\Program Files\orc\orc.exe.config orc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1208 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1524 Watchdog.exe 1524 Watchdog.exe 1524 Watchdog.exe 1616 orc.exe 1616 orc.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe 1524 Watchdog.exe 1616 orc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1616 orc.exe Token: SeDebugPrivilege 1996 Watchdog.exe Token: SeDebugPrivilege 1524 Watchdog.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1808 wrote to memory of 660 1808 tmp.exe 29 PID 1808 wrote to memory of 660 1808 tmp.exe 29 PID 1808 wrote to memory of 660 1808 tmp.exe 29 PID 1808 wrote to memory of 660 1808 tmp.exe 29 PID 660 wrote to memory of 916 660 blmkgrp.exe 30 PID 660 wrote to memory of 916 660 blmkgrp.exe 30 PID 660 wrote to memory of 916 660 blmkgrp.exe 30 PID 1808 wrote to memory of 768 1808 tmp.exe 31 PID 1808 wrote to memory of 768 1808 tmp.exe 31 PID 1808 wrote to memory of 768 1808 tmp.exe 31 PID 1808 wrote to memory of 768 1808 tmp.exe 31 PID 1808 wrote to memory of 876 1808 tmp.exe 33 PID 1808 wrote to memory of 876 1808 tmp.exe 33 PID 1808 wrote to memory of 876 1808 tmp.exe 33 PID 1808 wrote to memory of 876 1808 tmp.exe 33 PID 768 wrote to memory of 1544 768 orc.exe 32 PID 768 wrote to memory of 1544 768 orc.exe 32 PID 768 wrote to memory of 1544 768 orc.exe 32 PID 876 wrote to memory of 1208 876 plage.exe 36 PID 876 wrote to memory of 1208 876 plage.exe 36 PID 876 wrote to memory of 1208 876 plage.exe 36 PID 876 wrote to memory of 1208 876 plage.exe 36 PID 876 wrote to memory of 1992 876 plage.exe 37 PID 876 wrote to memory of 1992 876 plage.exe 37 PID 876 wrote to memory of 1992 876 plage.exe 37 PID 876 wrote to memory of 1992 876 plage.exe 37 PID 876 wrote to memory of 992 876 plage.exe 39 PID 876 wrote to memory of 992 876 plage.exe 39 PID 876 wrote to memory of 992 876 plage.exe 39 PID 876 wrote to memory of 992 876 plage.exe 39 PID 1544 wrote to memory of 1396 1544 csc.exe 40 PID 1544 wrote to memory of 1396 1544 csc.exe 40 PID 1544 wrote to memory of 1396 1544 csc.exe 40 PID 768 wrote to memory of 1728 768 orc.exe 41 PID 768 wrote to memory of 1728 768 orc.exe 41 PID 768 wrote to memory of 1728 768 orc.exe 41 PID 768 wrote to memory of 1616 768 orc.exe 43 PID 768 wrote to memory of 1616 768 orc.exe 43 PID 768 wrote to memory of 1616 768 orc.exe 43 PID 1616 wrote to memory of 1996 1616 orc.exe 45 PID 1616 wrote to memory of 1996 1616 orc.exe 45 PID 1616 wrote to memory of 1996 1616 orc.exe 45 PID 1616 wrote to memory of 1996 1616 orc.exe 45 PID 600 wrote to memory of 456 600 taskeng.exe 46 PID 600 wrote to memory of 456 600 taskeng.exe 46 PID 600 wrote to memory of 456 600 taskeng.exe 46 PID 1996 wrote to memory of 1524 1996 Watchdog.exe 47 PID 1996 wrote to memory of 1524 1996 Watchdog.exe 47 PID 1996 wrote to memory of 1524 1996 Watchdog.exe 47 PID 1996 wrote to memory of 1524 1996 Watchdog.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe"C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe"C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:916
-
-
-
C:\Users\Admin\AppData\Local\Temp\orc.exe"C:\Users\Admin\AppData\Local\Temp\orc.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qujbihir.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5F13.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC5F12.tmp"4⤵PID:1396
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1728
-
-
C:\Program Files\orc\orc.exe"C:\Program Files\orc\orc.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Roaming\Watchdog.exe"C:\Users\Admin\AppData\Roaming\Watchdog.exe" /launchSelfAndExit "C:\Program Files\orc\orc.exe" 1616 /protectFile4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\Watchdog.exe"C:\Users\Admin\AppData\Roaming\Watchdog.exe" /watchProcess "C:\Program Files\orc\orc.exe" 1616 "/protectFile"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
-
-
-
C:\Users\Admin\Downloads\plage.exe"C:\Users\Admin\Downloads\plage.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN "WinManager" /XML "C:\Users\Admin\AppData\Local\Temp\NewTask.xml"3⤵
- Creates scheduled task(s)
PID:1208
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Query /FO "LIST" /TN "WinManager"3⤵PID:1992
-
-
C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe"C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe" /wait3⤵
- Executes dropped EXE
PID:992
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:1632
-
C:\Windows\system32\taskeng.exetaskeng.exe {E19010D4-8666-4CF1-A368-1C3AF819BBE8} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Program Files\orc\orc.exe"C:\Program Files\orc\orc.exe"2⤵
- Executes dropped EXE
PID:456
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
1KB
MD558055afb9af4ef65f72780a701f226c9
SHA1bc6a6b3b4bd0822cf980d7d9317c5d8b4ac5f350
SHA25628c529d454ca980d4fb6a34f5fc72cdade267548941e9d17c0d1fd552e82adb9
SHA5128b3ffb21b29815e28da279039bdb04c7abae4e3bc83b6b05b7223441e403447b28cc6833a2a05e315925fe6f6fbc361fec4dd0dd61cd942aa79a75b39cadb135
-
Filesize
1KB
MD5384ba8dd21ae36cd1407ef1b54615679
SHA171b9c04335dffc9202b1659a000302821d3ff63b
SHA25694b8ca35e1671c258367133576d244bbcc933b9eb81d74c6d21a8ce0c87d078e
SHA512269dbc0a142fd596eb40e21e1a53b247813baef8df6149b5c827da35bcf0bcb4f822dd6fc2a4e5b593d7456659cc1cd13aeb389b3f82708e2a8aecbfbcc9c410
-
Filesize
7.6MB
MD5cb565c1afd8469f43dd6917af55b733f
SHA1e71a56a7b13536d686ab9f4f2492d60c02a7790e
SHA2564a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056
SHA512d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645
-
Filesize
7.6MB
MD5cb565c1afd8469f43dd6917af55b733f
SHA1e71a56a7b13536d686ab9f4f2492d60c02a7790e
SHA2564a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056
SHA512d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645
-
Filesize
7.6MB
MD5cb565c1afd8469f43dd6917af55b733f
SHA1e71a56a7b13536d686ab9f4f2492d60c02a7790e
SHA2564a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056
SHA512d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645
-
Filesize
1.5MB
MD5e06ce8146da66871aa8aeedc950fd12b
SHA16ee749bdd0bc857a41ac8018c5553e895784b961
SHA256aabd51782e4edb80561dd2ff065079a8381c7c86a6db1c6884bc09c73cde07a4
SHA5120d8c16832d5242595eff4993a1563de09f1eba988ca6e9bcd9afdb0891a164ea2972ac9df40f575e8e1021d535c3b807ce025bc15788f08f84c71246d64f1198
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
76KB
MD53cbc8728bf659f132e923e88fd991ccc
SHA18a605e3991932a792ee53f45d1b014584582321b
SHA2562d01e26661ceb8c230d1501a0b6b82436f19629a7016c89c9c226f44f25ed75e
SHA512baa94ac544e1b505d04f01f231db43a97517062b00660b252dd1028a0c9747b050750189aba054fb5631916b256d4563b9da8c64eebf1468590870261e6feda9
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
967KB
MD5b63bb68654e7be72058398809d6c4754
SHA14a7b43488029a2d4c960c9ee4431b99c8640a4b0
SHA2568db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe
SHA512c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a
-
Filesize
967KB
MD5b03ccade490854df220914c4430967e2
SHA11911a59e8c4b427d3fbc8fc9c794886bd2d81305
SHA25681cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961
SHA5120c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36
-
Filesize
967KB
MD5b03ccade490854df220914c4430967e2
SHA11911a59e8c4b427d3fbc8fc9c794886bd2d81305
SHA25681cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961
SHA5120c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
676B
MD5a821e7ea528e850888c81bd3e8528f51
SHA10e7577a5b2336e7630302d96f7d1aea936e36811
SHA2565400e4e228ed9b64a4b1dc0329adfe1e30bbc69ed6c237a9bcde0e887ceeca82
SHA512179c3d60330dda13f882be74d16f3c79a765222b06f2b61847731204e267bac211652f24af2e4b76d5cc020d5af22bde5ab1dd7bbee8fee01089df54ae1a9fba
-
Filesize
208KB
MD5250321226bbc2a616d91e1c82cb4ab2b
SHA17cffd0b2e9c842865d8961386ab8fcfac8d04173
SHA256ef2707f83a0c0927cfd46b115641b9cae52a41123e4826515b9eeb561785218d
SHA512bda59ca04cdf254f837f2cec6da55eff5c3d2af00da66537b9ebaa3601c502ae63772f082fd12663b63d537d2e03efe87a3b5746ef25e842aaf1c7d88245b4e1
-
Filesize
349B
MD58a5eb3d30631a00ce4556a215645d0c6
SHA15309a8ae9980ec2ae9af6235406c81f64b8e214a
SHA256d3893f44e60af30bbb1cceabef8e780f9385521b188ecc066c5957009825b7db
SHA512a685925faf0b523ce9bf507e814fdcb244f382bd5660336c0008ab554985fc1ad6714ec526629b98f6698c96be2a54236bfce40ad873f53f489a728d6f89fed2
-
Filesize
7.6MB
MD5cb565c1afd8469f43dd6917af55b733f
SHA1e71a56a7b13536d686ab9f4f2492d60c02a7790e
SHA2564a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056
SHA512d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645
-
Filesize
7.6MB
MD5cb565c1afd8469f43dd6917af55b733f
SHA1e71a56a7b13536d686ab9f4f2492d60c02a7790e
SHA2564a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056
SHA512d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645
-
Filesize
7.6MB
MD5cb565c1afd8469f43dd6917af55b733f
SHA1e71a56a7b13536d686ab9f4f2492d60c02a7790e
SHA2564a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056
SHA512d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645
-
Filesize
1.5MB
MD5e06ce8146da66871aa8aeedc950fd12b
SHA16ee749bdd0bc857a41ac8018c5553e895784b961
SHA256aabd51782e4edb80561dd2ff065079a8381c7c86a6db1c6884bc09c73cde07a4
SHA5120d8c16832d5242595eff4993a1563de09f1eba988ca6e9bcd9afdb0891a164ea2972ac9df40f575e8e1021d535c3b807ce025bc15788f08f84c71246d64f1198
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
967KB
MD5b63bb68654e7be72058398809d6c4754
SHA14a7b43488029a2d4c960c9ee4431b99c8640a4b0
SHA2568db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe
SHA512c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a
-
Filesize
967KB
MD5b63bb68654e7be72058398809d6c4754
SHA14a7b43488029a2d4c960c9ee4431b99c8640a4b0
SHA2568db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe
SHA512c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a
-
Filesize
967KB
MD5b03ccade490854df220914c4430967e2
SHA11911a59e8c4b427d3fbc8fc9c794886bd2d81305
SHA25681cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961
SHA5120c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36
-
Filesize
967KB
MD5b03ccade490854df220914c4430967e2
SHA11911a59e8c4b427d3fbc8fc9c794886bd2d81305
SHA25681cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961
SHA5120c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36