Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 07:19
Static task
static1
Behavioral task
behavioral1
Sample
3d8c4196a887f0056103f09ca6717826.exe
Resource
win7-20220812-en
General
-
Target
3d8c4196a887f0056103f09ca6717826.exe
-
Size
20KB
-
MD5
3d8c4196a887f0056103f09ca6717826
-
SHA1
b8993d7cdeab70f1775f486837ae671ed3cce456
-
SHA256
aa9deb2a1d67a4e73e7419b86535f1197dc8b7ffebdd392fb35f7c10d92b9dc1
-
SHA512
88c8ccad020ea479b7eba1dd4b4b8e86ac13485c79f41ef39f552b58819fb70d6a75e339ebf9cea8a06d7e5ab4dd775081da91ce46a5f952453ce4471b6a2d22
-
SSDEEP
384:MntlikEpJ6xs9oNUhW2Ob0JaMRPJFInKZBsgbN1aO9sdBnfk7:MntZ0fyb0JpEalpv6nfk
Malware Config
Extracted
quasar
1.4.0
SKYNET
173.225.115.99:7702
938cda17-a814-4925-8420-83a35a350164
-
encryption_key
F04A75E6507173FAEEC2BB82C564030A5E8413FF
-
install_name
FileHistory.exe
-
log_directory
Logs
-
reconnect_delay
4000
-
startup_key
FileHistory
-
subdirectory
FileHistory
Extracted
orcus
146.70.143.176:81
712d31c7a3f54904a08d968a15b836e9
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\orc\orc.exe
-
reconnect_delay
10000
-
registry_keyname
orc
-
taskscheduler_taskname
orc
-
watchdog_path
AppData\Watchdog.exe
Signatures
-
Orcus main payload 6 IoCs
resource yara_rule behavioral1/files/0x00080000000122f9-68.dat family_orcus behavioral1/files/0x00080000000122f9-70.dat family_orcus behavioral1/files/0x00080000000122f9-71.dat family_orcus behavioral1/files/0x000600000001493b-120.dat family_orcus behavioral1/files/0x000600000001493b-123.dat family_orcus behavioral1/files/0x000600000001493b-138.dat family_orcus -
Quasar payload 7 IoCs
resource yara_rule behavioral1/files/0x00080000000122ec-66.dat family_quasar behavioral1/files/0x00080000000122ec-65.dat family_quasar behavioral1/files/0x00080000000122ec-63.dat family_quasar behavioral1/memory/1520-67-0x0000000000F50000-0x000000000121A000-memory.dmp family_quasar behavioral1/files/0x0007000000012703-92.dat family_quasar behavioral1/memory/1708-93-0x0000000000E70000-0x000000000113A000-memory.dmp family_quasar behavioral1/files/0x0007000000012703-91.dat family_quasar -
Orcurs Rat Executable 7 IoCs
resource yara_rule behavioral1/files/0x00080000000122f9-68.dat orcus behavioral1/files/0x00080000000122f9-70.dat orcus behavioral1/files/0x00080000000122f9-71.dat orcus behavioral1/files/0x000600000001493b-120.dat orcus behavioral1/files/0x000600000001493b-123.dat orcus behavioral1/memory/1632-124-0x00000000008B0000-0x000000000099A000-memory.dmp orcus behavioral1/files/0x000600000001493b-138.dat orcus -
PlagueBot Executable 9 IoCs
resource yara_rule behavioral1/files/0x000800000001230f-75.dat plaguebot behavioral1/files/0x000800000001230f-74.dat plaguebot behavioral1/files/0x000800000001230f-77.dat plaguebot behavioral1/files/0x000800000001230f-79.dat plaguebot behavioral1/files/0x00070000000126d3-83.dat plaguebot behavioral1/files/0x00070000000126d3-84.dat plaguebot behavioral1/files/0x00070000000126d3-86.dat plaguebot behavioral1/files/0x00080000000126ae-146.dat plaguebot behavioral1/files/0x00070000000126d3-147.dat plaguebot -
Downloads MZ/PE file
-
Executes dropped EXE 17 IoCs
pid Process 468 nitrsso64.exe 1520 FileHistory.exe 360 orc.exe 1476 plage.exe 792 winmgr.exe 1708 FileHistory.exe 656 blmkgrp.exe 808 blmkgrp.exe 816 WindowsInput.exe 1856 WindowsInput.exe 1632 orc.exe 980 Watchdog.exe 316 orc.exe 1936 Watchdog.exe 1192 Process not Found 1928 nitrsso64.exe 1452 nitrsso64.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winmgr.exe plage.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winmgr.exe plage.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winmgr.exe winmgr.exe -
Loads dropped DLL 11 IoCs
pid Process 900 3d8c4196a887f0056103f09ca6717826.exe 900 3d8c4196a887f0056103f09ca6717826.exe 900 3d8c4196a887f0056103f09ca6717826.exe 900 3d8c4196a887f0056103f09ca6717826.exe 900 3d8c4196a887f0056103f09ca6717826.exe 1476 plage.exe 1476 plage.exe 900 3d8c4196a887f0056103f09ca6717826.exe 656 blmkgrp.exe 808 blmkgrp.exe 1392 taskeng.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinManager = "C:\\Users\\Admin\\AppData\\Roaming\\discordnitro\\winmgr.exe" plage.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\orc = "\"C:\\Program Files\\orc\\orc.exe\"" orc.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe orc.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config orc.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\orc\orc.exe orc.exe File opened for modification C:\Program Files\orc\orc.exe orc.exe File created C:\Program Files\orc\orc.exe.config orc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 896 schtasks.exe 1832 schtasks.exe 1776 schtasks.exe 1948 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1296 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1936 Watchdog.exe 1936 Watchdog.exe 1632 orc.exe 1632 orc.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe 1632 orc.exe 1936 Watchdog.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 468 nitrsso64.exe Token: SeDebugPrivilege 1520 FileHistory.exe Token: SeDebugPrivilege 1708 FileHistory.exe Token: SeDebugPrivilege 980 Watchdog.exe Token: SeDebugPrivilege 1936 Watchdog.exe Token: SeDebugPrivilege 1632 orc.exe Token: SeDebugPrivilege 1928 nitrsso64.exe Token: SeDebugPrivilege 1452 nitrsso64.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 468 nitrsso64.exe 1708 FileHistory.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 900 wrote to memory of 468 900 3d8c4196a887f0056103f09ca6717826.exe 29 PID 900 wrote to memory of 468 900 3d8c4196a887f0056103f09ca6717826.exe 29 PID 900 wrote to memory of 468 900 3d8c4196a887f0056103f09ca6717826.exe 29 PID 900 wrote to memory of 468 900 3d8c4196a887f0056103f09ca6717826.exe 29 PID 468 wrote to memory of 896 468 nitrsso64.exe 30 PID 468 wrote to memory of 896 468 nitrsso64.exe 30 PID 468 wrote to memory of 896 468 nitrsso64.exe 30 PID 900 wrote to memory of 1520 900 3d8c4196a887f0056103f09ca6717826.exe 32 PID 900 wrote to memory of 1520 900 3d8c4196a887f0056103f09ca6717826.exe 32 PID 900 wrote to memory of 1520 900 3d8c4196a887f0056103f09ca6717826.exe 32 PID 900 wrote to memory of 1520 900 3d8c4196a887f0056103f09ca6717826.exe 32 PID 900 wrote to memory of 360 900 3d8c4196a887f0056103f09ca6717826.exe 33 PID 900 wrote to memory of 360 900 3d8c4196a887f0056103f09ca6717826.exe 33 PID 900 wrote to memory of 360 900 3d8c4196a887f0056103f09ca6717826.exe 33 PID 900 wrote to memory of 360 900 3d8c4196a887f0056103f09ca6717826.exe 33 PID 900 wrote to memory of 1476 900 3d8c4196a887f0056103f09ca6717826.exe 34 PID 900 wrote to memory of 1476 900 3d8c4196a887f0056103f09ca6717826.exe 34 PID 900 wrote to memory of 1476 900 3d8c4196a887f0056103f09ca6717826.exe 34 PID 900 wrote to memory of 1476 900 3d8c4196a887f0056103f09ca6717826.exe 34 PID 1476 wrote to memory of 1832 1476 plage.exe 35 PID 1476 wrote to memory of 1832 1476 plage.exe 35 PID 1476 wrote to memory of 1832 1476 plage.exe 35 PID 1476 wrote to memory of 1832 1476 plage.exe 35 PID 1476 wrote to memory of 1696 1476 plage.exe 37 PID 1476 wrote to memory of 1696 1476 plage.exe 37 PID 1476 wrote to memory of 1696 1476 plage.exe 37 PID 1476 wrote to memory of 1696 1476 plage.exe 37 PID 1476 wrote to memory of 792 1476 plage.exe 39 PID 1476 wrote to memory of 792 1476 plage.exe 39 PID 1476 wrote to memory of 792 1476 plage.exe 39 PID 1476 wrote to memory of 792 1476 plage.exe 39 PID 1520 wrote to memory of 1776 1520 FileHistory.exe 40 PID 1520 wrote to memory of 1776 1520 FileHistory.exe 40 PID 1520 wrote to memory of 1776 1520 FileHistory.exe 40 PID 1520 wrote to memory of 1708 1520 FileHistory.exe 42 PID 1520 wrote to memory of 1708 1520 FileHistory.exe 42 PID 1520 wrote to memory of 1708 1520 FileHistory.exe 42 PID 1708 wrote to memory of 1948 1708 FileHistory.exe 43 PID 1708 wrote to memory of 1948 1708 FileHistory.exe 43 PID 1708 wrote to memory of 1948 1708 FileHistory.exe 43 PID 360 wrote to memory of 1956 360 orc.exe 45 PID 360 wrote to memory of 1956 360 orc.exe 45 PID 360 wrote to memory of 1956 360 orc.exe 45 PID 1956 wrote to memory of 1400 1956 csc.exe 47 PID 1956 wrote to memory of 1400 1956 csc.exe 47 PID 1956 wrote to memory of 1400 1956 csc.exe 47 PID 900 wrote to memory of 656 900 3d8c4196a887f0056103f09ca6717826.exe 48 PID 900 wrote to memory of 656 900 3d8c4196a887f0056103f09ca6717826.exe 48 PID 900 wrote to memory of 656 900 3d8c4196a887f0056103f09ca6717826.exe 48 PID 900 wrote to memory of 656 900 3d8c4196a887f0056103f09ca6717826.exe 48 PID 656 wrote to memory of 808 656 blmkgrp.exe 49 PID 656 wrote to memory of 808 656 blmkgrp.exe 49 PID 656 wrote to memory of 808 656 blmkgrp.exe 49 PID 360 wrote to memory of 816 360 orc.exe 50 PID 360 wrote to memory of 816 360 orc.exe 50 PID 360 wrote to memory of 816 360 orc.exe 50 PID 360 wrote to memory of 1632 360 orc.exe 53 PID 360 wrote to memory of 1632 360 orc.exe 53 PID 360 wrote to memory of 1632 360 orc.exe 53 PID 1632 wrote to memory of 980 1632 orc.exe 55 PID 1632 wrote to memory of 980 1632 orc.exe 55 PID 1632 wrote to memory of 980 1632 orc.exe 55 PID 1632 wrote to memory of 980 1632 orc.exe 55 PID 1392 wrote to memory of 316 1392 taskeng.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d8c4196a887f0056103f09ca6717826.exe"C:\Users\Admin\AppData\Local\Temp\3d8c4196a887f0056103f09ca6717826.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\nitrsso64.exe"C:\Users\Admin\AppData\Local\Temp\nitrsso64.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nitro64" /tr "C:\Users\Admin\AppData\Local\nitrsso64.exe"3⤵
- Creates scheduled task(s)
PID:896
-
-
-
C:\Users\Admin\AppData\Local\Temp\FileHistory.exe"C:\Users\Admin\AppData\Local\Temp\FileHistory.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "FileHistory" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\FileHistory.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1776
-
-
C:\Users\Admin\AppData\Roaming\FileHistory\FileHistory.exe"C:\Users\Admin\AppData\Roaming\FileHistory\FileHistory.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "FileHistory" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\FileHistory\FileHistory.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\orc.exe"C:\Users\Admin\AppData\Local\Temp\orc.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\c_c2ycuc.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7D5C.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7D3C.tmp"4⤵PID:1400
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:816
-
-
C:\Program Files\orc\orc.exe"C:\Program Files\orc\orc.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Roaming\Watchdog.exe"C:\Users\Admin\AppData\Roaming\Watchdog.exe" /launchSelfAndExit "C:\Program Files\orc\orc.exe" 1632 /protectFile4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:980 -
C:\Users\Admin\AppData\Roaming\Watchdog.exe"C:\Users\Admin\AppData\Roaming\Watchdog.exe" /watchProcess "C:\Program Files\orc\orc.exe" 1632 "/protectFile"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
-
-
-
C:\Users\Admin\Downloads\plage.exe"C:\Users\Admin\Downloads\plage.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN "WinManager" /XML "C:\Users\Admin\AppData\Local\Temp\NewTask.xml"3⤵
- Creates scheduled task(s)
PID:1832
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Query /FO "LIST" /TN "WinManager"3⤵PID:1696
-
-
C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe"C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe" /wait3⤵
- Executes dropped EXE
- Drops startup file
PID:792 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /F /TN "WinManager"4⤵PID:1900
-
-
C:\Windows\SysWOW64\cmd.execmd /C timeout 5 & del /F /Q "C:\Users\Admin\AppData\Roaming\discordnitro\*.*" & rmdir "C:\Users\Admin\AppData\Roaming\discordnitro"4⤵PID:2004
-
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- Delays execution with timeout.exe
PID:1296
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe"C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe"C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:808
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:1856
-
C:\Windows\system32\taskeng.exetaskeng.exe {DFBFFFFF-4DC4-4C6B-B936-2803C489BF04} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files\orc\orc.exe"C:\Program Files\orc\orc.exe"2⤵
- Executes dropped EXE
PID:316
-
-
C:\Users\Admin\AppData\Local\nitrsso64.exeC:\Users\Admin\AppData\Local\nitrsso64.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Users\Admin\AppData\Local\nitrsso64.exeC:\Users\Admin\AppData\Local\nitrsso64.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
2.8MB
MD5a73e083297e46d8e23f012d66a08f3a3
SHA183527df5a484494894ad2c71908a170a115751af
SHA2560ef4667fb2bd5b2184048913181bd7b03bf63d0e7959214b879efa4d6b75ad5d
SHA51278c2231eb48ed1f246b960b1afbd2b6b1c9b99495b2a1e8b45ea1aa90a21fbd23fd10223dbc7eba9aa057b5932290e20cdcfe2df583b1a93d2cea2bf350495f2
-
Filesize
2.8MB
MD5a73e083297e46d8e23f012d66a08f3a3
SHA183527df5a484494894ad2c71908a170a115751af
SHA2560ef4667fb2bd5b2184048913181bd7b03bf63d0e7959214b879efa4d6b75ad5d
SHA51278c2231eb48ed1f246b960b1afbd2b6b1c9b99495b2a1e8b45ea1aa90a21fbd23fd10223dbc7eba9aa057b5932290e20cdcfe2df583b1a93d2cea2bf350495f2
-
Filesize
1KB
MD57401d8fa59fe8d46d04559f375cfb420
SHA10d74b93db9b125aad744b47084ce5f51eed8bb69
SHA25663a033c704fe28c53b30a72d4bddb57c14c1385324e9bdbed668fe83722a7048
SHA51238e8feaa3ee8465f6db7d2b38e99b5700a1976018367d04ecf1ea97e435f7891832e1124da742e426899c7bd0b387ce58e0ed350418fc2089a392ed12880acf9
-
Filesize
1KB
MD556ac56c546390e9bb4936776a8bc80c5
SHA1b396893e2ade89f66fd17ac86d1d378f57ed8de7
SHA2563e1979b3e78cd9acd93a38b1e30ec0e543116d0c83733a4de690053b8c635006
SHA512e880316409d4e6d74d871498e1affed98b3426bd8cf66b4e80d878c0b4613ec7659368dd667a830dfb6d212e079f451bf1354bb624518b8669c78f43a2a8c665
-
Filesize
7.6MB
MD5cb565c1afd8469f43dd6917af55b733f
SHA1e71a56a7b13536d686ab9f4f2492d60c02a7790e
SHA2564a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056
SHA512d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645
-
Filesize
7.6MB
MD5cb565c1afd8469f43dd6917af55b733f
SHA1e71a56a7b13536d686ab9f4f2492d60c02a7790e
SHA2564a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056
SHA512d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645
-
Filesize
7.6MB
MD5cb565c1afd8469f43dd6917af55b733f
SHA1e71a56a7b13536d686ab9f4f2492d60c02a7790e
SHA2564a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056
SHA512d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645
-
Filesize
76KB
MD562e2273c268fee90870899c0a64f1e81
SHA190d73f792a5b9a3a299c64ce512a918210ae65f9
SHA25663f75ebabb3248c76abaf9222ef5cb16653b869c33f6f6634a8e71bd3d96e33d
SHA5129cfd32442ea30329cc55cd29271b41b6f0e3a1e929bc40fb9935c918ef996ddb6f23abcd78ba2da0214d6eaa057df578b8a1ca8d3f04941f8869d3022cc12929
-
Filesize
1.5MB
MD5e06ce8146da66871aa8aeedc950fd12b
SHA16ee749bdd0bc857a41ac8018c5553e895784b961
SHA256aabd51782e4edb80561dd2ff065079a8381c7c86a6db1c6884bc09c73cde07a4
SHA5120d8c16832d5242595eff4993a1563de09f1eba988ca6e9bcd9afdb0891a164ea2972ac9df40f575e8e1021d535c3b807ce025bc15788f08f84c71246d64f1198
-
Filesize
54KB
MD5ebd7887003feaad033856253c14de51c
SHA11ef092f6c79df2e57c8a49469e4b44815d384948
SHA256faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315
SHA512969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a
-
Filesize
54KB
MD5ebd7887003feaad033856253c14de51c
SHA11ef092f6c79df2e57c8a49469e4b44815d384948
SHA256faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315
SHA512969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
54KB
MD5ebd7887003feaad033856253c14de51c
SHA11ef092f6c79df2e57c8a49469e4b44815d384948
SHA256faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315
SHA512969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a
-
Filesize
54KB
MD5ebd7887003feaad033856253c14de51c
SHA11ef092f6c79df2e57c8a49469e4b44815d384948
SHA256faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315
SHA512969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a
-
Filesize
54KB
MD5ebd7887003feaad033856253c14de51c
SHA11ef092f6c79df2e57c8a49469e4b44815d384948
SHA256faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315
SHA512969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a
-
Filesize
2.8MB
MD5a73e083297e46d8e23f012d66a08f3a3
SHA183527df5a484494894ad2c71908a170a115751af
SHA2560ef4667fb2bd5b2184048913181bd7b03bf63d0e7959214b879efa4d6b75ad5d
SHA51278c2231eb48ed1f246b960b1afbd2b6b1c9b99495b2a1e8b45ea1aa90a21fbd23fd10223dbc7eba9aa057b5932290e20cdcfe2df583b1a93d2cea2bf350495f2
-
Filesize
2.8MB
MD5a73e083297e46d8e23f012d66a08f3a3
SHA183527df5a484494894ad2c71908a170a115751af
SHA2560ef4667fb2bd5b2184048913181bd7b03bf63d0e7959214b879efa4d6b75ad5d
SHA51278c2231eb48ed1f246b960b1afbd2b6b1c9b99495b2a1e8b45ea1aa90a21fbd23fd10223dbc7eba9aa057b5932290e20cdcfe2df583b1a93d2cea2bf350495f2
-
Filesize
967KB
MD5b03ccade490854df220914c4430967e2
SHA11911a59e8c4b427d3fbc8fc9c794886bd2d81305
SHA25681cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961
SHA5120c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
967KB
MD5b63bb68654e7be72058398809d6c4754
SHA14a7b43488029a2d4c960c9ee4431b99c8640a4b0
SHA2568db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe
SHA512c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a
-
Filesize
967KB
MD5b63bb68654e7be72058398809d6c4754
SHA14a7b43488029a2d4c960c9ee4431b99c8640a4b0
SHA2568db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe
SHA512c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a
-
Filesize
967KB
MD5b03ccade490854df220914c4430967e2
SHA11911a59e8c4b427d3fbc8fc9c794886bd2d81305
SHA25681cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961
SHA5120c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36
-
Filesize
967KB
MD5b03ccade490854df220914c4430967e2
SHA11911a59e8c4b427d3fbc8fc9c794886bd2d81305
SHA25681cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961
SHA5120c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
676B
MD51ad9a4cbe7f243926f489ea74c288c6d
SHA15fec9556ef5fd5413bd730581bc6f13b40ad5b09
SHA25608b9b0d129fcb9f1dd0783832735082266ed0a92d901d551f57b9657668c6c06
SHA51273396be014e62f1e1ec62499cb145a0411ccf7f7433baa23275d7b16649373301034e22639650b4474140f3d5f6dbd1b4840feabee42eb8906d3b90f3ceb712d
-
Filesize
208KB
MD5c555d9796194c1d9a1310a05a2264e08
SHA182641fc4938680519c3b2e925e05e1001cbd71d7
SHA256ccbb8fd27ab2f27fbbd871793886ff52ff1fbd9117c98b8d190c1a96b67e498a
SHA5120b85ca22878998c7697c589739905b218f9b264a32c8f99a9f9dd73d0687a5de46cc7e851697ee16424baf94d301e411648aa2d061ac149a6d2e06b085e07090
-
Filesize
349B
MD53a5c1f3b6545851444fb481a11d24745
SHA18590e0df640d56958ea9328473446804a8c673ee
SHA256ba19e7faf5b300f090e074eef5dd247d8be6d561f46d28fda777da2d9127eed3
SHA512f12e914f8109c568f44439f071e0a63ed59313247f3822f3ffd3720e7eb57dcd09b8025359da00c6f6198ff1ba3a5bc1fae8e31f9cbd5d0e74dd3c0269466ff8
-
Filesize
2.8MB
MD5a73e083297e46d8e23f012d66a08f3a3
SHA183527df5a484494894ad2c71908a170a115751af
SHA2560ef4667fb2bd5b2184048913181bd7b03bf63d0e7959214b879efa4d6b75ad5d
SHA51278c2231eb48ed1f246b960b1afbd2b6b1c9b99495b2a1e8b45ea1aa90a21fbd23fd10223dbc7eba9aa057b5932290e20cdcfe2df583b1a93d2cea2bf350495f2
-
Filesize
7.6MB
MD5cb565c1afd8469f43dd6917af55b733f
SHA1e71a56a7b13536d686ab9f4f2492d60c02a7790e
SHA2564a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056
SHA512d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645
-
Filesize
7.6MB
MD5cb565c1afd8469f43dd6917af55b733f
SHA1e71a56a7b13536d686ab9f4f2492d60c02a7790e
SHA2564a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056
SHA512d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645
-
Filesize
7.6MB
MD5cb565c1afd8469f43dd6917af55b733f
SHA1e71a56a7b13536d686ab9f4f2492d60c02a7790e
SHA2564a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056
SHA512d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645
-
Filesize
1.5MB
MD5e06ce8146da66871aa8aeedc950fd12b
SHA16ee749bdd0bc857a41ac8018c5553e895784b961
SHA256aabd51782e4edb80561dd2ff065079a8381c7c86a6db1c6884bc09c73cde07a4
SHA5120d8c16832d5242595eff4993a1563de09f1eba988ca6e9bcd9afdb0891a164ea2972ac9df40f575e8e1021d535c3b807ce025bc15788f08f84c71246d64f1198
-
Filesize
54KB
MD5ebd7887003feaad033856253c14de51c
SHA11ef092f6c79df2e57c8a49469e4b44815d384948
SHA256faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315
SHA512969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a
-
Filesize
916KB
MD5ac0431f34683bcbbb2cf23aaf29ea8cf
SHA1275ec0e362cb074d5f080aaa41c25a8ecebe3205
SHA2561780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb
SHA512156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c
-
Filesize
54KB
MD5ebd7887003feaad033856253c14de51c
SHA11ef092f6c79df2e57c8a49469e4b44815d384948
SHA256faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315
SHA512969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a
-
Filesize
967KB
MD5b63bb68654e7be72058398809d6c4754
SHA14a7b43488029a2d4c960c9ee4431b99c8640a4b0
SHA2568db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe
SHA512c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a
-
Filesize
967KB
MD5b63bb68654e7be72058398809d6c4754
SHA14a7b43488029a2d4c960c9ee4431b99c8640a4b0
SHA2568db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe
SHA512c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a
-
Filesize
967KB
MD5b03ccade490854df220914c4430967e2
SHA11911a59e8c4b427d3fbc8fc9c794886bd2d81305
SHA25681cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961
SHA5120c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36
-
Filesize
967KB
MD5b03ccade490854df220914c4430967e2
SHA11911a59e8c4b427d3fbc8fc9c794886bd2d81305
SHA25681cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961
SHA5120c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36