Analysis
-
max time kernel
218s -
max time network
231s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_31dc0356df6e527fd7a95361bf866710_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_31dc0356df6e527fd7a95361bf866710_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_31dc0356df6e527fd7a95361bf866710_mafia.exe
-
Size
520KB
-
MD5
31dc0356df6e527fd7a95361bf866710
-
SHA1
f6182ffcf49b599ed86cd1f0f5795bcc3cf3bb6a
-
SHA256
3cd0905d5c6f69d3cca642f51a6d722c39d580e7b5c3e7ac5ad43b5da29e1e88
-
SHA512
008313c4a1bcbbb5e96abacf80d5fbc0505e36fa831c29816a083e57033d5ac1f2cb5b7e078713789c1960a41ab0a8bf8bb5f25b2f1554a7ea6f55843a02d3e5
-
SSDEEP
12288:gj8fuxR21t5i8fQINmLF+LVVabzVLqSTQGP2cyNZ:gj8fuK1GYvcwvWfTQyxyN
Malware Config
Signatures
-
Executes dropped EXE 35 IoCs
pid Process 3684 D349.tmp 3864 D3D5.tmp 1544 D443.tmp 4604 D637.tmp 1776 D6C3.tmp 1896 EDD6.tmp 2784 EE72.tmp 3616 EEDF.tmp 1432 F17F.tmp 112 F1FC.tmp 4440 F298.tmp 3108 2E0B.tmp 5080 2E69.tmp 1828 2EC7.tmp 4264 2F24.tmp 1372 301E.tmp 4732 308C.tmp 4348 30F9.tmp 2000 31C4.tmp 1712 359D.tmp 3284 679A.tmp 4404 7507.tmp 968 9A62.tmp 2532 CFBA.tmp 1956 D018.tmp 3628 E7A7.tmp 4264 E805.tmp 1352 2183.tmp 5032 3653.tmp 4376 472C.tmp 1012 55E2.tmp 4428 7800.tmp 2740 9C12.tmp 464 B519.tmp 4916 C044.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4768 wrote to memory of 3684 4768 2024-01-01_31dc0356df6e527fd7a95361bf866710_mafia.exe 92 PID 4768 wrote to memory of 3684 4768 2024-01-01_31dc0356df6e527fd7a95361bf866710_mafia.exe 92 PID 4768 wrote to memory of 3684 4768 2024-01-01_31dc0356df6e527fd7a95361bf866710_mafia.exe 92 PID 3684 wrote to memory of 3864 3684 D349.tmp 93 PID 3684 wrote to memory of 3864 3684 D349.tmp 93 PID 3684 wrote to memory of 3864 3684 D349.tmp 93 PID 3864 wrote to memory of 1544 3864 D3D5.tmp 94 PID 3864 wrote to memory of 1544 3864 D3D5.tmp 94 PID 3864 wrote to memory of 1544 3864 D3D5.tmp 94 PID 1544 wrote to memory of 4604 1544 D443.tmp 95 PID 1544 wrote to memory of 4604 1544 D443.tmp 95 PID 1544 wrote to memory of 4604 1544 D443.tmp 95 PID 4604 wrote to memory of 1776 4604 D637.tmp 96 PID 4604 wrote to memory of 1776 4604 D637.tmp 96 PID 4604 wrote to memory of 1776 4604 D637.tmp 96 PID 1776 wrote to memory of 1896 1776 D6C3.tmp 97 PID 1776 wrote to memory of 1896 1776 D6C3.tmp 97 PID 1776 wrote to memory of 1896 1776 D6C3.tmp 97 PID 1896 wrote to memory of 2784 1896 EDD6.tmp 98 PID 1896 wrote to memory of 2784 1896 EDD6.tmp 98 PID 1896 wrote to memory of 2784 1896 EDD6.tmp 98 PID 2784 wrote to memory of 3616 2784 EE72.tmp 99 PID 2784 wrote to memory of 3616 2784 EE72.tmp 99 PID 2784 wrote to memory of 3616 2784 EE72.tmp 99 PID 3616 wrote to memory of 1432 3616 EEDF.tmp 100 PID 3616 wrote to memory of 1432 3616 EEDF.tmp 100 PID 3616 wrote to memory of 1432 3616 EEDF.tmp 100 PID 1432 wrote to memory of 112 1432 F17F.tmp 101 PID 1432 wrote to memory of 112 1432 F17F.tmp 101 PID 1432 wrote to memory of 112 1432 F17F.tmp 101 PID 112 wrote to memory of 4440 112 F1FC.tmp 102 PID 112 wrote to memory of 4440 112 F1FC.tmp 102 PID 112 wrote to memory of 4440 112 F1FC.tmp 102 PID 4440 wrote to memory of 3108 4440 F298.tmp 113 PID 4440 wrote to memory of 3108 4440 F298.tmp 113 PID 4440 wrote to memory of 3108 4440 F298.tmp 113 PID 3108 wrote to memory of 5080 3108 2E0B.tmp 105 PID 3108 wrote to memory of 5080 3108 2E0B.tmp 105 PID 3108 wrote to memory of 5080 3108 2E0B.tmp 105 PID 5080 wrote to memory of 1828 5080 2E69.tmp 103 PID 5080 wrote to memory of 1828 5080 2E69.tmp 103 PID 5080 wrote to memory of 1828 5080 2E69.tmp 103 PID 1828 wrote to memory of 4264 1828 2EC7.tmp 111 PID 1828 wrote to memory of 4264 1828 2EC7.tmp 111 PID 1828 wrote to memory of 4264 1828 2EC7.tmp 111 PID 4264 wrote to memory of 1372 4264 E805.tmp 106 PID 4264 wrote to memory of 1372 4264 E805.tmp 106 PID 4264 wrote to memory of 1372 4264 E805.tmp 106 PID 1372 wrote to memory of 4732 1372 301E.tmp 107 PID 1372 wrote to memory of 4732 1372 301E.tmp 107 PID 1372 wrote to memory of 4732 1372 301E.tmp 107 PID 4732 wrote to memory of 4348 4732 308C.tmp 108 PID 4732 wrote to memory of 4348 4732 308C.tmp 108 PID 4732 wrote to memory of 4348 4732 308C.tmp 108 PID 1352 wrote to memory of 2000 1352 2183.tmp 114 PID 1352 wrote to memory of 2000 1352 2183.tmp 114 PID 1352 wrote to memory of 2000 1352 2183.tmp 114 PID 2000 wrote to memory of 1712 2000 31C4.tmp 115 PID 2000 wrote to memory of 1712 2000 31C4.tmp 115 PID 2000 wrote to memory of 1712 2000 31C4.tmp 115 PID 1712 wrote to memory of 3284 1712 359D.tmp 116 PID 1712 wrote to memory of 3284 1712 359D.tmp 116 PID 1712 wrote to memory of 3284 1712 359D.tmp 116 PID 3284 wrote to memory of 4404 3284 679A.tmp 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_31dc0356df6e527fd7a95361bf866710_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_31dc0356df6e527fd7a95361bf866710_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\D349.tmp"C:\Users\Admin\AppData\Local\Temp\D349.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\D3D5.tmp"C:\Users\Admin\AppData\Local\Temp\D3D5.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\D443.tmp"C:\Users\Admin\AppData\Local\Temp\D443.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\D637.tmp"C:\Users\Admin\AppData\Local\Temp\D637.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\D6C3.tmp"C:\Users\Admin\AppData\Local\Temp\D6C3.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\EDD6.tmp"C:\Users\Admin\AppData\Local\Temp\EDD6.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\EE72.tmp"C:\Users\Admin\AppData\Local\Temp\EE72.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\EEDF.tmp"C:\Users\Admin\AppData\Local\Temp\EEDF.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\F17F.tmp"C:\Users\Admin\AppData\Local\Temp\F17F.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\F1FC.tmp"C:\Users\Admin\AppData\Local\Temp\F1FC.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\F298.tmp"C:\Users\Admin\AppData\Local\Temp\F298.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\2E0B.tmp"C:\Users\Admin\AppData\Local\Temp\2E0B.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2EC7.tmp"C:\Users\Admin\AppData\Local\Temp\2EC7.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\2F24.tmp"C:\Users\Admin\AppData\Local\Temp\2F24.tmp"2⤵
- Executes dropped EXE
PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\2E69.tmp"C:\Users\Admin\AppData\Local\Temp\2E69.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080
-
C:\Users\Admin\AppData\Local\Temp\301E.tmp"C:\Users\Admin\AppData\Local\Temp\301E.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\308C.tmp"C:\Users\Admin\AppData\Local\Temp\308C.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\30F9.tmp"C:\Users\Admin\AppData\Local\Temp\30F9.tmp"3⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\3157.tmp"C:\Users\Admin\AppData\Local\Temp\3157.tmp"4⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\31C4.tmp"C:\Users\Admin\AppData\Local\Temp\31C4.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\359D.tmp"C:\Users\Admin\AppData\Local\Temp\359D.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\679A.tmp"C:\Users\Admin\AppData\Local\Temp\679A.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\7507.tmp"C:\Users\Admin\AppData\Local\Temp\7507.tmp"8⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\9A62.tmp"C:\Users\Admin\AppData\Local\Temp\9A62.tmp"9⤵
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\CFBA.tmp"C:\Users\Admin\AppData\Local\Temp\CFBA.tmp"10⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\D018.tmp"C:\Users\Admin\AppData\Local\Temp\D018.tmp"11⤵
- Executes dropped EXE
PID:1956
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E7A7.tmp"C:\Users\Admin\AppData\Local\Temp\E7A7.tmp"1⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\E805.tmp"C:\Users\Admin\AppData\Local\Temp\E805.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\2183.tmp"C:\Users\Admin\AppData\Local\Temp\2183.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\3653.tmp"C:\Users\Admin\AppData\Local\Temp\3653.tmp"4⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\472C.tmp"C:\Users\Admin\AppData\Local\Temp\472C.tmp"5⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\55E2.tmp"C:\Users\Admin\AppData\Local\Temp\55E2.tmp"6⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\7800.tmp"C:\Users\Admin\AppData\Local\Temp\7800.tmp"7⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\9C12.tmp"C:\Users\Admin\AppData\Local\Temp\9C12.tmp"8⤵
- Executes dropped EXE
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\B519.tmp"C:\Users\Admin\AppData\Local\Temp\B519.tmp"9⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\C044.tmp"C:\Users\Admin\AppData\Local\Temp\C044.tmp"10⤵
- Executes dropped EXE
PID:4916
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5ad66071b75e5daebff5ab2fce55e8880
SHA158824a846acd2322e00823d5d860ec20f48c949e
SHA256d152f23ab5e55b924bf23c90a52b0e4b69289599f8000213413a45d65fa23b6d
SHA5128b07c1971355ff393529e71c6d32f341103d7b0bac335b36cc3598e6f8b13f532f12a5465a8a2943a3bbd2591b4f20e09cc1cf6077614792c69c01da299d04e9
-
Filesize
35KB
MD518d1049a7af3f564e3cd19590b26905d
SHA12d0286ca669fc37d7ef8997db7a4a5c4817a655e
SHA2563466e9ae96722e7ee1a983bfc30f3c375ee2ea2ec77586632e6de198459ee34a
SHA512f467078baa3cbc814dae0c126151319e2ac96b88752193e92a1926b812cdfdc273b6e8145eadabf7bedc7fb7afd57484b05ec55ae31d39556db264f63a3d1cd5
-
Filesize
30KB
MD5c0517091bba8873323963098f9fd5f15
SHA10ab58d15b0681c884d3158245feca4c63b2d426b
SHA2566ace1bf94061ebed41254fb7d4479270bc87c0e10b4069c6978479f4782da3fc
SHA512dc9cc9827663beaa7252a0626512b7e94ec0483780ad27bc72764466ea77785ae13d526875b7bf88debf2981b35bff714587c8a932951f90af6bde0bcdf20e71
-
Filesize
40KB
MD5d80a0ae766d592f568e35da831480518
SHA1cf90632b04889063c123b7c2eae4ad341f5b2ea8
SHA25659868d02cfc1b15258a337d7892b2f3acf8e2a896de3d51d8206fd63bfc61e3a
SHA512f05cbfe637ba2c9ef92f50e93740653541a76594302975a335e7d93d2899dde310e197ef0715bbaa49658c3a47b65869761b3d3c808fb3f038036b6ebed3ff37
-
Filesize
25KB
MD5f0520cae5ad56afce739af186f1dad75
SHA11767a4ba6df35152cb996293f18f18fd70d5dc10
SHA25634a073f698f2e968bbf87e344170824c8d795ecb2f1c3b9c2e58e6ac5caaa1cd
SHA512c954dbb0cee52d5d1bf5f6cab6fbf9a5fc7c21a666532f35902afb0a705a9ebe75639111a19ad6e7e9eb4238aaf5e85e8e561fed66606a6ad482f2f0bf804386
-
Filesize
47KB
MD5cc21e5218510a00d3c4b3b27ecab55fc
SHA1bec9a508af8068de69876c6baf5a12b5f319bf9f
SHA2568d70141693ae2ec40bd5625140155974978b120ec6deee1d858d26f96d0111af
SHA5122d4b7497b7cf6751d318df33c1a11589c8eb23f0ffcee0ab6b0c126fbee05435f7b6a687828a88e3d7b71761f26ead903979c526f0a90be63d44e69f2479a5b3
-
Filesize
42KB
MD5a05ba65b295b589e231c9e99f81f2eb9
SHA1d05f49b7b5c42a98f37553414543df143bff87ef
SHA2568ac0f316b3fa5f26d7de7ec176297d36992584d421ee165a7a3cfc86edc10825
SHA512992144da5308808ad5a35fbf76648f4eceffe131e693d9d77fe5e5e89e7eb137ffa39f5cf90ffca5da80bd58ee9ed351e2ac7c66abb453a4bc21b7a3265e0460
-
Filesize
37KB
MD5e6f593a9eec4409fbdfcbcd72b785797
SHA1b469ed7b9811fe45ceadf3175ae97fcc616d6026
SHA256833da788ce5a9005c9e5a459cf27dddeb90f9c45c4b14de1e656ffcb5e64a05f
SHA5124b5d29305f41d4369571219ec00591e8734c3ef980dbb376b3ee60d6913028358819b011165a1a2dd9662619d95e24b33794446029d43bd8f26b8f3346c01295
-
Filesize
41KB
MD5ee78707e82cf977ea7c9b64a32fce130
SHA1b096c74be9296f722e3a23c76c94634e31c7209e
SHA256a89a04c514a4823c43a6c3cf5ed390b1709aaf936ef9f143df7638db1eba4881
SHA512859e7b066032763e5f0974d89d388a84525568bb8ccbc46117022c2fcbdc504a64548c2d9adf1e4fc52a985a433b7c15d4f62ef0a8d76382913c910d9d15faf0
-
Filesize
18KB
MD5217dd4fc5367b2e82574145310cb9614
SHA108456723dfe6f7e00c9a8a5916a81f7f81cba851
SHA25608ed4535855d7135eed02817b9ff2c5d60a9c5c1bb44367f8ba57096d06fa8b9
SHA51255ea230903a17aa4a9ceb66f754204d6a95af79f014f9337a5a296a781316bd6576dd18812205fab2809e4bb321f49c79ccdeb09d78c3cfc795d02ec8b8b70ad
-
Filesize
35KB
MD5471230ecadd16e25cf5879c90979181f
SHA11b8f3421d9f388ec0d49db3a08e20f38239610c9
SHA256710b0f857d47039021b4b8060f3d6844663993f0a70e729d6eadd2a746142db4
SHA512dffcd666513f1a17a7345e0291f61d1eb8c6b7b1c48cb64dcfc722ed381c91d560fb718eb8dcffc1815474279b7e28a57f4e34016bc21d811a4ddd3ec6f5b327
-
Filesize
31KB
MD5d3b1fc204ef8c9f7e2d0cd5becb8918d
SHA1470d821dc6430bd95024267262a70f2d646f4e36
SHA256dfb147837fbf4dd21d4dbf7736397fffca73ced53683d831de3fe405e4d1c2ec
SHA512386af89f431461e5826f6bd0918e8a99547ca9804c2eda51511061de41ce592e04baf9d5dd171dc74e07d9d60892e8b789145d4d18e67b247a652074b367f733
-
Filesize
61KB
MD5538a5c63ca0cc757347a0d64eb211e91
SHA1b61266bc1dd99a7d0c6fad313a4dd83dc1d7cd5d
SHA256fa5e8c407d247d8682bb6b4f2e33d2b6c355d96ac8cf7e8b1d1d254f61e7f156
SHA512a0e8ffb2c8d41326349c1715686b1a03d084439099cf54c815dac290a02294d16bb9b5e0f8b018a8fd43a8bb429945657591e1c7fc6131ecef806ac27422a413
-
Filesize
23KB
MD59f10bf1c404e12be15c91ae8b1b755f1
SHA167feb188cfeff085ce49e5b77363972148668a43
SHA2560d8aa71e176a66d8cc2d3974ec114ac4a70b616daeb1a33b1d5c46aa156bab3d
SHA512047c9bada2180592369840caebda65ac3d01ad626acb71e0e3ef8361503eb672b2092c6f1c2016871b2ce42470a44296c015672e2f20480623f1f4dc09978020
-
Filesize
25KB
MD55a6c03ff0b7f3913b87665091d9c5cee
SHA16997a0e0dcde931a3aaa9552772041ae585ba03a
SHA2562a6afcf0f3aad47aa8cee31078987f39b280a5c85e4db7de8e62475a3292a8d5
SHA51260087e89b89217002b9f03a50a54717b9c7870bcc625375cee6d8bce43528c9e507cda1bd30a6099a246c197b4e2a92d2cb7b6ecdac413a811f32d813f444f85
-
Filesize
1KB
MD50348cb2d15387ab1d36e51bc5a7276b8
SHA1ea626cb018d610f5b0199554831568191243ce52
SHA256831e359db614b4c2c5ceaa385f1b98fc709d7d5089c711281fdf13b0267f5d84
SHA51282a7c70c9a707e923c3c688e7a3942fe35d64d71495eb41fc2ae33d77a21b6023ce23d02615f8781ccd2836ac9aa98729f8817a43424118f3f66e4d4d3455f80
-
Filesize
5KB
MD5fee30c9bce5eeb19d6dc58a4dd68f23b
SHA137d4cc483530c91ebfeb28871b10bc4e7798590d
SHA256bb4c0012bac01b421137e9c709e61e41610124687ae2fed2b769ae17ec3ebf2b
SHA512b8d031a1f0b4c5df49c2039f8a5a5a4967058c5e9f3cf5e58f8aa7811d8af9a0a8e23597bf1bbff2b538deeb28fdbfa1c2490c3112fbf7236b8ea74a8251f848
-
Filesize
16KB
MD59dd9a16b6a6053c60382771d61b0f0f9
SHA1a4b4e611217a9b98254c0f722856724cca5056cb
SHA25618496ec990ac3ed75c16a8be43b15d2895e7019944aa41bef568e6ae51f7f26a
SHA512ff91d04d95127ce2f69b35f46b9e7cb0eab15570d1fa96ec1f5f2834ceab7bea86235c2ae90cd5c1b7934b2dcb6ae89353c4e86e698842264f2f1516ca7cbaff
-
Filesize
122KB
MD5db770947bd2452843999b0e488c58348
SHA11bb61d2765cfc160dc6bd0a40317c1e37ac08708
SHA2562132250cce049deb9f947f651dde39af80227fbb493346b84919e6e0d2358450
SHA512a1d83f6322e0f30b7c671bbc5550d85948953567045e629791823eb4f5bd156930a1f0a39e65908b5b820fa82aaa0edbed92788c64af3d88af6cdbf50cb047bd
-
Filesize
117KB
MD5f0d25585e21ee050e102fbfaec865792
SHA1fb0fc2a347dcdbc40e086f21890c8d9c8e11a528
SHA25644695116928e51963380e68736a532a3ecb61595dfa555c8b51c3b3b29334345
SHA5128295b61f75a216aaaa2523c3908a36d4fa9ab11287914880fe75a04513e4a084994dc0cad1e34a632d1e3e7135f4018539436dbacd09dd66a79d8f8494a3eeb2
-
Filesize
56KB
MD518e5642a0262020ace79d1928198186d
SHA10bd8b0cdd8739e0109618591508500aa5102a8ca
SHA2569d2a1f0292dbd524012cbeb2ae91438c551d8b03d49a1d041111382687550b0c
SHA51213ec3756105657dc472453ba67376a3f7bf93f1828ec5d896d12c59d761f1203da5fa651f60d82e633bb5dbcf82eacbea6c4021b38508918decb1e9d52286762
-
Filesize
78KB
MD56ca83fb58c0a605148cf8c248863d343
SHA1d6c407c7059dc3499808594c08ed8aa02dd445ac
SHA256febc97cfbab1e4472b72d6f8027f05916c65ac5b7f4fb3b950236e45c34ad59c
SHA512bbe993cedd99c3afe21991644e30f55c8a58deb915d9411f186daba3b4c602e1ef7726c8ffe92a35c780992f6f4bc7d5ac1abf3c493b87b90a351163e7ee2463
-
Filesize
137KB
MD5b5b75ba2cdee34dc499244c5033a06ca
SHA1641675dc565a0edd3e927c46979d3b3f49939b3c
SHA25686547754c89c2068ebbc745c54c000acd71f41742f1ccbbfefd5056c2b09e624
SHA512397567aba1f9890c06ab4361b6d4542182ced66d367aa4e25d2f75e49cf98f3e1933239195409529e33a0f754623b7bf53a3c123e61cd7422255c46c6553b733
-
Filesize
520KB
MD5005944ee038e3c0b8a8f9673fc7a09a7
SHA19d0176d2b5e2807dad2e1c0d796cf61e4a484d7a
SHA2564c31b416c8edf82a9451f87ef5cefacb30d700973eeecd1c23bcb4cc90043b16
SHA5125483a8f5904616570b534058a9745f67f9b730b4ce1921c4d775ba4d9d859077598750bf378c4fd95122a91dd0e1f67d23adadd6298692f72f68fa32dc74ad92
-
Filesize
36KB
MD5a6dacc747a596cadde5c406f80b319cc
SHA186f4f4c0d377c5ff2ae4e4aaef2057f79c20cb1d
SHA256fc166c73ffd568885668ae399f8c0d153d62281f26716f7ecc45cdd5d838e82b
SHA51222a1a206c08f88deab0fa9b1aaa702af9991df2966340450a692ea31cba434bfd38ff7fa47ef1903098c3705118f6f53d32692f29cd8408f4d243b8802d61183
-
Filesize
40KB
MD5407745c5a74adaef94e5000f55534267
SHA18cca52b7be2d2fbb2d0c9b315192a244e919d3bf
SHA25657e8ed40643318778f5aed12ce95f4f50e99983d17a996682cb250f05bde3753
SHA512b91d91d5066ce556f74857bf3169ff0bb4f3bc0698df20de4073dad8b2df0d77b232ac4b28ad8c12a0114e531efaf825da803b7cd17f1696fd4dfcc1dfe77c7a
-
Filesize
19KB
MD51cce716ab38a2dac5ef57435a1b48d43
SHA1f1efda47cee8bd0876b653c426d42d6cb9bc7591
SHA256d443ddec13e37bd6b1cc529f0ad7296bf33509ba63c366ad79d2dc3a2ace43cd
SHA512edd25db72bd639db6e2e498c9e28fd4a2ca9b3469ab5edd2e8217fee760df74cfa471a344cd4757e04bb05ad960d7d189828ba3b3608129d7bc71bd5bef490ce
-
Filesize
22KB
MD5e2c664d8df118868e8edf42191481619
SHA1a0c28155eb7a2360378767030d3a5087a4d32807
SHA2566f6a036dbf774eed31b7a3e92f94805a803d870207726b3b9e9ca6b44abe6bd8
SHA5124247851c27091ecd28c479712ac7f3e49acc146bfe177e4799c6d36dbc401a45481f5c739ae7bda61637de0b3daa83d88e14f85dc145221770595ec4d4467e79
-
Filesize
520KB
MD5c2d8dafa399d63301e14f9e01cebdc8d
SHA109e3de58a04c3ca95e56a3434b2de2c3099ed99e
SHA256dfcc4fb09788e2c10c578c1ed60b18f72dd86284a5d93e809c8f922a2c99b890
SHA512cdcb0447c37358fc95267e9217c31ec082530128bc00f1e9e3d811e6927e86677d567b3e29e48f3edcd78f7122b067321932d5d4bb1327c2162acaaf93a7e554
-
Filesize
17KB
MD53b3561c28f74bad60fbf0958ef24bd6f
SHA1b2635256d154c93d5ba95c01bf471a183f8c8bf6
SHA25676c9a6998aefeb58118c0e90db7092992a7d007fca69a96cc6f231782b5b65bc
SHA5129f945eaec43808dca0ef627939a99b3866116f87c0db8d15a5fa24d860357468d08274c95cf26d832483e184430a52d6827d0291309e52cf372071548072b01d
-
Filesize
16KB
MD5563dc550afbcc5d92747730fa239fb4f
SHA15222e88cd4bf8eba833b7173d262b149f9bd42e5
SHA2564c48f4811cfef9d1b354d9a01552ec05342a702dc0ec7df4d9721b264343fc0b
SHA5125861bb7f38f9e9ff7eaeabbbe061eadb092ad080dbd901af4148e0f012cbe5142bae56e067c5df26c61c74ff1a1bff39a8599b1e922bfc393600d507740e3100
-
Filesize
520KB
MD5598f88973e58399280f64c5cc38f277c
SHA1de032b945925ace56d173c58063837f5ef837b40
SHA25636ce189eabd1f834c2117d189e5a341939c0f11fdbf9117cd9cd8ecf684b72ec
SHA51214493fb813c3861fb76792b700c984f7b371e252a50091dfb171b7f50aa6d366dd5cfc13c9fa7bb64771647db331a59a034785387a2deb1b71dd04f6cf638528
-
Filesize
114KB
MD56ca04ba7e8610a506a036df736369a36
SHA1dc1bf801f5ea4c1109404a52113efa3542a0629b
SHA256b1ff86f3c6747ed60b3f45fd0d642c78d680b55a932867f28cf023297e9383d9
SHA51231b745a81691cc2b6df5871388d49d3fb034ee64c6af43c3f77422b675d65eceeb72345f934687db8194f455e83b082b4b5b12455049b47aee50ce5f15d26092
-
Filesize
25KB
MD56dfaedc5f9897308497bf15580b35ebd
SHA1e99dcb07fefa2f4af4670c7a09028939179ea045
SHA256324cf30b212456cb4f65e8557d2c17bcd70670ba9f308e599d9036dd4c5a0d23
SHA5125cd2d9c95db87455fc6e56f32e4e37454be6e4d15f4e2a1777e84f98a487b45343a601605260e28919bc99db97424e1444e9c8cf651bc156ca48697759ef8628
-
Filesize
520KB
MD59cbf72742cfb9b42b581d2f78d602e38
SHA1c34f58669fb37df4235afd2a63c06b983d47ac41
SHA256699c0a7c1ecef0302d33c199a33b529eddfe742e2809d5aaf171d420ecef5ed3
SHA51247bfb6b381b83b9deaefc6ce878a941c05e56dfbe30d25e246d6da6562a689bfeb06255d5d70fc7cf5577a7c99aecca5a60b06bc98fe0d83d744136c5d01f9c2
-
Filesize
64KB
MD5a97eaa19e3397a005138785c7321d6ab
SHA1ddf9983eb993d48f72e1dad510a6c0ce453d9749
SHA256854bcf4dce8b74d69fd294783a8d94b200f9a52dec0081053e67abf1bb0cc389
SHA512d4fadc2c22b45af2bb9a42e66fa0f1726ed63e861e3b5894b1720ee838071422ed76572dcef9fff58d143dfda89341882ee1ee9be120cac2a8dc8238696f4b8a
-
Filesize
22KB
MD586f02f9ac1cd898e5a6c574c02cd3f62
SHA161f86dcd1da6023f4c9fdc8ea1e64f919f31be38
SHA2568462c5f35088b4061d7e57be513b58b9b8f7caed37ca6c9f84640cc33cbcba1e
SHA51235eaf6f38357111be477e12ff62bccba61f9ceeb88291d4e92f2ee8e498c4010f112ac06f105514123789a69a6f5530737d1b72018d8f98639782d0c877f4005
-
Filesize
420KB
MD5cc64276dc241034ed65b8a629acc8168
SHA14212b89aed17c667f99ed18167dc9191c45dcfba
SHA2561ab65bcc2fb056b577fd7175fa8b0fdbb3c37b59d82aad95b5b54ccadd08daf1
SHA5121f67b6789ddc32e6be294847ab15fd4219c83c5a1365fc2e6a38a6b578b5ec5647085415f03c5ef693f47fc63ec781125075fae43d0cbe866a1feede536665d5
-
Filesize
242KB
MD5123d0ad9ec199bd8f9034b07326a2dc7
SHA1f3fd390b7ed9a20ed3cb0bba80938f4c064ad151
SHA256c29527e8d59c33f051a4880f64b40ffaf8f9e9e69d51e13602e94e2e9b59eef2
SHA5120a22d2029648d068219cb0230e286087d48d66a0cd6fdc687d93bd9d3ad01207c47d6a9ca7c5b36cbed8455f3ac5cc34b3c5b5c63eec2e05ba4f5f6c68d2e056
-
Filesize
358KB
MD50031fd3525c81fc8fa89f0bf8860d959
SHA1f88c4e8d051ae04f30f6650e93c484b299b5da23
SHA2561e8056f4fc00af3080999508f067e6c45430792c04033e22cc1172ede108161a
SHA512b405b8d2f386fcd2cc460bd366f995498bc5d42bfa896950d70e0d201f0d95014484041392fc591e734d8b082c96d491c25ce7341c9b77b2806361dc29ef35fe
-
Filesize
212KB
MD537fcdfa20155ee759714c455a4476352
SHA1a637c8a631db7a40b1bafe17414f53de7dc03016
SHA256c947b294662f51e5b617d9e82fe47cb9c1a8efe345ef1e045dc988a800452f1f
SHA512300acd2a3ed344206f06e87e29d3f120cf573ccf403eb330d0d4d8eac8254e7a36e28e8c75ba9ac65396aa144b17e947c24b4cdf6950364dd27f76b1c4ef9682
-
Filesize
189KB
MD5489f9cb3836ff109516d7faa33be4385
SHA14ac3ad69fefea97a96fb830a15ac13033e8c7de6
SHA25643ae57bac0871dd913a3e2a7cdb67ca7211ffcce6429aca1a5360c84fe869bda
SHA512901a07b635e011f61fa37c7c436c5f7cb5352ad60d309ee684bbcf734f4d948c136928bd1edad5d59c504a2673e48d31defaccb55d415b42649e238ecd878645
-
Filesize
520KB
MD5db8ca40d9f68c3a8d750fbc8cc3a8674
SHA12f4177dab4523cea315fae49733f19aecb38edff
SHA2569f59d33e8cb09040b0dd3a503fe1a99204f541e2f29318e1e527fe37dfe93165
SHA512068dae52a2a0ff1790418896a4f59a6172559210ab4ca305bd6fbc0ad2a676096ac1a31478395bb35d383ede837116709a3a119554b05ca565d57420080bd038
-
Filesize
107KB
MD5af0189f1dcf0789dd4d48ab32fff12bf
SHA13b36bdc5244d21f2a64625ce9d87264b72b74a81
SHA256be71cf999b0077d67f3e788bd93ea33f2f265824e03f3c17502da3467b69045f
SHA51257196789e84aac1748c7d06337f1a9568c7735011f6c110f34631ddf9a7860e721652a2aff43bbcc25d5585edc8f938dbe542eff9afdb7b6a2b149ccae0c0dd4
-
Filesize
64KB
MD5646ed702922eba575bf855e984008800
SHA1f48a25d319cd1e084f3e5668302a6d61600d64e6
SHA256e2acf1b7d834e6a27fe1a2efca46f3c7e2e6cd06b0f8a90af5b15373f87d869a
SHA512eab8cc60a1d3c762d641687cb0eeac7b04a24b82e3ec2e6f67cc368b89181b39bdcdf19accd3907721f66606a6fc94f8e8a6223ad29c44f7283143c1813a3a77
-
Filesize
97KB
MD5affac13e50be372b9c7d9b5aacc4cd1d
SHA1a4925b5606943652fec95db8cf94a15751585ab2
SHA25623697303a412159d5caa947346e13e12b6771cb58b588ad00e796c027ab930e6
SHA51286f1ef69d1d08923d2cb067a05942e47d215290f70069a67c6452147b470d6310ac2ed7deb138d5cac90938d741ed59cc0807d134bb4a68eac3432bf870cc34f
-
Filesize
68KB
MD589c35263db7f0eaba521644ac52c4e93
SHA195e6e59f68ce570434b57c74a31a7e1c003e3a34
SHA25689a9f6bc5dfa36b8f75505c9899a2b5e5d2c6297c45db29fbe93784bcae8d9f5
SHA5125fd2ed2b5b44d32805bdb46a1a377025df84e3d0162d72f9d585a01f428f23657e6d91df934cdbc531c126170cf2263f5dfc00a38d71b1fc9c8404b4b441c1da
-
Filesize
264KB
MD56861a610a49f3f6bc92301e613b7eb4c
SHA15c99862d7d1bffb675929581836040790c71e96c
SHA25614cb04a09a728d81b9892e277cd93a75674dd4d74a14c8b3b12f4e7d5f6db8af
SHA5125b316e17e0e634815b641a622fc6bc3a083036312d6e6f2e8d9141635e385467eb302911fa593f8529bb1aa1fdb3240643df6a58383dbd7a1836a7867f1c4c51
-
Filesize
399KB
MD5db768db35155cfd682717b2e6bacb830
SHA118092472109c9fe3191c7fae4b978f977fea9675
SHA256cf5e3049e1d99b613a3b48b7bd8fdeb88e93c2559be303224292dfe6254b0cef
SHA51204d85f0c6d22d396257892fd0ae313e4d2c46ca059118b42e909e4bb86dd43d403aff892d03b767a2f771126d4de59b836ddf922933279db778a3d0a8f2a39af
-
Filesize
420KB
MD5c3c3fb344a736a067275ce8a4ecb009d
SHA1df1aa870b390b0a8946b246efcd37d68a3529155
SHA25673bc67a5da4c6441855e671eff351e9052a378bcfd33edcb34272738dfd61ae2
SHA512b466123f3f8ad1ee96b2625dd50d52610a7f3ba650e0bf8fafbc61965e620b58432cfcf9a203ed3b663c7d063bc0472f9fd18b01d3e8936bda3e99ea82e9ff53
-
Filesize
243KB
MD5536b64b9502bd16f2a20748d259940c0
SHA170140b40a479a320b6c2752b08da617d50d690b3
SHA256609c6fdf380a3a8edd01669cd027e5d23f8d49cc5df009699ce17e27a3a66f54
SHA5122f65ab820bae344f56a290ca8f26f0c613d9fd3e009e2a3870ac58dd30b4d1c1be4c547d5916cd508a3b27a5a51dcb937bca7cb782b712728a45504be3a42ad9
-
Filesize
82KB
MD5a65ebea98a21f9f4c2626d9e70b719ef
SHA15883e4de0f4f9f804898c00b17802d0ad07079fa
SHA256081f56aaf9a39213a6f10bb094d6f5f0828cc4123ad716a83553f82b3dcc6109
SHA512bddb03af2dd9ceed63c881eda0f3fb4dfb0aac34a3ebf196aedfb97baffbe0a3db2e66e360f8aab0582ce40bef4c3c374a407f72cfefd8f086dfadc4178ead7c
-
Filesize
57KB
MD59444aaad82634ed5bf7aacb2e98419a7
SHA19dfa5b366b2f6e7e8bd7a25cee40851bf5f2d7d8
SHA256c9e730e9bac742c235b50cc6ae17038bff6d5696ca26b3b7990e69586212e0a6
SHA512035e1c01898ec7c29d03275b914ff821d847ae136bde5478245ed79a2e966df2d963e89ce548f1cc91001211c2b369b245f040ab70c8c327cfe04edd3c0d0be5
-
Filesize
41KB
MD5adac0352734020fe5028d55eab854984
SHA13a8f578581ae0bb205fa06cc01a30bd3b69573ed
SHA256393cb66e72caeead8096cd3446e32d1cf946be72f981352349cc26fe0102d809
SHA512c1830a5ff0881ee7b83a0f750fd2fab875315ca1dc924bb866dfd27852356c8a1cb903b280062b59aa0e2920d7f82e59773000f2c5f7883a42fda85225e73930
-
Filesize
104KB
MD5e0688d144cbc66074719851ea8049316
SHA13ce8cc2ef0859ea0e4b4137dbd5e53371162fa8c
SHA2569b7c3841306c598d54bffde9c4bad89b70cbd124973a48827ba3aa15b9831f46
SHA512a55e4b386925e382eaf619bcb4664764665b16a9eb18cc64881fcf748b2abae6691784adcdd1dcaadab0761dd0d125a9c9bb436fb3dba79f0e5841ea90343761
-
Filesize
52KB
MD5909d7b65cbb715554fef32a477f5f9d5
SHA11573e5fb5837f9fd06e92a4a88569dadc8aba3f2
SHA256309be2ec8318e09b9192361c82c32c8c573f1cab39cd023c6c853a9342494c8e
SHA512c3ef2e42507f200ca9dcdeb1ebb3e3606845e73f8e77f31e7edbcdcf05f3d3f16ee4dd6c0c466bad963d4ccb9d4fd5e21c0f160d2c92dbe4ba33a17a3cd93004
-
Filesize
44KB
MD5cdd575d5b1de2d4549ab24d16f34491f
SHA17b8ff161d6914a220d57b0f7c51939b0710d3992
SHA256e8349b3453729c9029902d799d8bae4d136d9e83b31a57a6a9b7a17ae180cdcc
SHA5126d3c2b1286801cdb21c8a733ca80483f637bab049fb04768fd241c88ccf9b3c9d672879b5e621c60e29aedb4ae857bb0ef5936c5de68080c1a724ea8717bafcf
-
Filesize
49KB
MD55718acc18b72dc5e253e7e193f190b11
SHA178f1b4192a43f5aec685064d6bafba21dec5098c
SHA2569bd8d6d6f7a343c072296f7ca3e750b127b329f2c22c85d34051a2a2079a75a7
SHA512e346986a0a066c7067df415f37a172ad6c1590e691b90d0d773670a507915f9500e0ef295c87f9fb424d113f2b050c3951a03e6773c2e4849de899dfe590e3d6
-
Filesize
60KB
MD5fa9996099c1eb8cd07cae133b7538aae
SHA1117ef051cbb952cf981481ab835f6c8d5c26864b
SHA25655f9d8176ac40de7cf70b22556ce2c6fed7a77fa4e21163ed61505505b7417e1
SHA512e8a6ddc5bcc38e16b71733814a9a78a17eaac618dc83655ddfbc302eab782744cb551b78731dab34f822e2c7206ddf66ec710e8e7d7b49822bc68a03ff423940