Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 05:16
Behavioral task
behavioral1
Sample
445a65c69917ee20d9908e0ad3a45d30_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
445a65c69917ee20d9908e0ad3a45d30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
445a65c69917ee20d9908e0ad3a45d30_NeikiAnalytics.exe
-
Size
133KB
-
MD5
445a65c69917ee20d9908e0ad3a45d30
-
SHA1
8c4b66100f84f0d38ffe4667d5c153db5d711c46
-
SHA256
e455f796af3b27f1fbd0b3d0c2ed0738d5757f145cb7d1ea611794d509293643
-
SHA512
df03b05d057912566987016f970a3bc389e269e94135b92fe1b806707241e22b0d6cddec35b68c42a49d21f18f76b1225b357ebeddfe674bb48925a6a50abf5a
-
SSDEEP
1536:67Zf/FAxTWY1++PJHJXA/OsIZISWh7SWho7Zf/FAxTWY1++PJHJXA/OsIZISWh7E:+nyi/SWh7SWhonyi/SWh7SWhE
Malware Config
Signatures
-
Renames multiple (4914) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 1868 _Get-AvailableDriveLetter.ps1.exe 3648 Zombie.exe -
resource yara_rule behavioral2/memory/3492-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x00070000000233bf-5.dat upx behavioral2/files/0x00070000000233c0-11.dat upx behavioral2/files/0x0006000000023276-9.dat upx behavioral2/files/0x000300000001e5ee-19.dat upx behavioral2/files/0x0002000000022ab4-32.dat upx behavioral2/files/0x0002000000022ab5-33.dat upx behavioral2/files/0x0002000000022ab6-40.dat upx behavioral2/files/0x0002000000022ab7-41.dat upx behavioral2/files/0x0003000000022ab6-45.dat upx behavioral2/files/0x0005000000022976-51.dat upx behavioral2/files/0x0003000000022978-59.dat upx behavioral2/files/0x0006000000022976-64.dat upx behavioral2/files/0x000300000002297d-70.dat upx behavioral2/files/0x000400000002297d-76.dat upx behavioral2/files/0x0003000000022980-89.dat upx behavioral2/files/0x0003000000022983-99.dat upx behavioral2/files/0x0003000000022984-103.dat upx behavioral2/files/0x0004000000022983-108.dat upx behavioral2/files/0x0005000000022983-117.dat upx behavioral2/files/0x0005000000022984-121.dat upx behavioral2/files/0x0003000000022987-126.dat upx behavioral2/files/0x0006000000022983-129.dat upx behavioral2/files/0x0007000000022983-137.dat upx behavioral2/files/0x0003000000022988-138.dat upx behavioral2/files/0x0008000000022983-142.dat upx behavioral2/files/0x0003000000022989-146.dat upx behavioral2/files/0x000300000002298a-150.dat upx behavioral2/files/0x0009000000022983-154.dat upx behavioral2/files/0x0004000000022989-160.dat upx behavioral2/files/0x000a000000022983-164.dat upx behavioral2/files/0x0005000000022989-168.dat upx behavioral2/files/0x000300000002298b-172.dat upx behavioral2/files/0x0006000000022989-176.dat upx behavioral2/files/0x000400000002298b-180.dat upx behavioral2/files/0x0007000000022989-186.dat upx behavioral2/files/0x0009000000022989-193.dat upx behavioral2/files/0x000b000000022989-201.dat upx behavioral2/files/0x000c000000022989-209.dat upx behavioral2/files/0x0003000000022994-213.dat upx behavioral2/files/0x0003000000022995-217.dat upx behavioral2/files/0x0003000000022996-221.dat upx behavioral2/files/0x0005000000022995-233.dat upx behavioral2/files/0x000300000002299a-237.dat upx behavioral2/files/0x000300000002299b-241.dat upx behavioral2/files/0x000300000002299d-247.dat upx behavioral2/files/0x000300000002299e-251.dat upx behavioral2/files/0x000400000002299d-255.dat upx behavioral2/files/0x00030000000229a0-263.dat upx behavioral2/files/0x00030000000229a2-266.dat upx behavioral2/files/0x00030000000229a3-270.dat upx behavioral2/files/0x00040000000229a5-280.dat upx behavioral2/files/0x00040000000229a3-284.dat upx behavioral2/files/0x00030000000229a7-290.dat upx behavioral2/files/0x00050000000229a3-294.dat upx behavioral2/memory/3492-2340-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x0003000000021440-8110.dat upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 445a65c69917ee20d9908e0ad3a45d30_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 445a65c69917ee20d9908e0ad3a45d30_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe.tmp _Get-AvailableDriveLetter.ps1.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Xml.Linq.dll.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\System.Windows.Forms.Primitives.resources.dll.tmp _Get-AvailableDriveLetter.ps1.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\DirectWriteForwarder.dll.tmp Zombie.exe File created C:\Program Files\InitializeConvertTo.svgz.tmp _Get-AvailableDriveLetter.ps1.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\StreamServer.dll.tmp _Get-AvailableDriveLetter.ps1.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\id.pak.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\LucidaSansRegular.ttf.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Grace-ul-oob.xrm-ms.tmp _Get-AvailableDriveLetter.ps1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_OEM_Perp-ul-phn.xrm-ms.tmp _Get-AvailableDriveLetter.ps1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\FOLDER.ICO.tmp _Get-AvailableDriveLetter.ps1.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Security.Cryptography.Xml.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\VisualElements\LogoBeta.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\MSO.ACL.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\hostpolicy.dll.tmp Zombie.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc.tmp _Get-AvailableDriveLetter.ps1.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\TrebuchetMs.xml.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\csi.dll.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\Microsoft Office\root\Office16\EXCEL.VisualElementsManifest.xml.tmp _Get-AvailableDriveLetter.ps1.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems64.dll.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Grace-ppd.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Grace-ul-oob.xrm-ms.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Security.Principal.Windows.dll.tmp _Get-AvailableDriveLetter.ps1.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN058.XML.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.Compression.FileSystem.dll.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Serialization.Formatters.dll.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.MemoryMappedFiles.dll.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\WindowsBase.resources.dll.tmp _Get-AvailableDriveLetter.ps1.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\System.Windows.Forms.resources.dll.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\content-types.properties.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalDemoR_BypassTrial180-ppd.xrm-ms.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\Common Files\microsoft shared\ink\tipskins.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\LibCurl64.DllA\OpenSSL64.DllA\zlibwapi.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Reflection.Emit.Lightweight.dll.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.Primitives.dll.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\ShapeCollector.exe.mui.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PresentationUI.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPointVL_KMS_Client-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_Subscription-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_MAK_AE-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Threading.Tasks.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Text.Encoding.dll.tmp _Get-AvailableDriveLetter.ps1.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.OneNote.OneNote.x-none.msi.16.x-none.xml.tmp Zombie.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\tabskb.dll.mui.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\Microsoft Office\root\Office16\NAME.DLL.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\WindowsAccessBridge-64.dll.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\prnms006.inf.exe.tmp _Get-AvailableDriveLetter.ps1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Retail-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial4-ppd.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_Trial-ppd.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019VL_KMS_Client_AE-ul.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordVL_KMS_Client-ul.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\MSSP7ES.LEX.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\vcruntime140_1.dll.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\System.Windows.Forms.resources.dll.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\System.Windows.Controls.Ribbon.resources.dll.tmp _Get-AvailableDriveLetter.ps1.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\cacerts.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Orange.xml.tmp _Get-AvailableDriveLetter.ps1.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Trial-pl.xrm-ms.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3492 wrote to memory of 1868 3492 445a65c69917ee20d9908e0ad3a45d30_NeikiAnalytics.exe 82 PID 3492 wrote to memory of 1868 3492 445a65c69917ee20d9908e0ad3a45d30_NeikiAnalytics.exe 82 PID 3492 wrote to memory of 1868 3492 445a65c69917ee20d9908e0ad3a45d30_NeikiAnalytics.exe 82 PID 3492 wrote to memory of 3648 3492 445a65c69917ee20d9908e0ad3a45d30_NeikiAnalytics.exe 83 PID 3492 wrote to memory of 3648 3492 445a65c69917ee20d9908e0ad3a45d30_NeikiAnalytics.exe 83 PID 3492 wrote to memory of 3648 3492 445a65c69917ee20d9908e0ad3a45d30_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\445a65c69917ee20d9908e0ad3a45d30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\445a65c69917ee20d9908e0ad3a45d30_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\_Get-AvailableDriveLetter.ps1.exe"_Get-AvailableDriveLetter.ps1.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1868
-
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3648
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD56bf210fcb0c370b10fa1c7e35398b0a7
SHA11e2510ee3abb17d3069dded713491b46cc9c056d
SHA256b18431eb802aaf9973fc4ee3084f0a53f44344db4ef373cf43c9fb4ffb0a1db2
SHA51286789629b235bb44b7e50afdba6d58a5a22c099cd32a42a5f7f08acc1921d96477ca979d0f9169d1c93c165657b880f52d41bfa882bb5ade8863bac5c7945ead
-
Filesize
164KB
MD5c6f044e477b3a37e18c3d32c549dc1c7
SHA1d76d0d02dccb3edfd66c22571751175a60d92f05
SHA2566201e13c9e1547a4d0a64400544a28a1f59675101e8a787982dabe18eac57f39
SHA5125e3d607a48140adfa9a2721d07d23919260c061c22eac41bdaaf54f34db38df5e2bf9290fedea4ae2e979beeb6bb529ca9c568845ac1ec2e802cc487410791c6
-
Filesize
612KB
MD536cf6805a58218271075f5221cfde006
SHA167c0dcfbf419e84bae795db64860c983d43c0836
SHA256c0cf9ea50c4a68939642be3f9abc9521f11b4d923f423329a6b9c55f9b70f188
SHA512ba4db3780ebd90a02c43211306e6f913d7cf65dd0a190111f136d0f3d5867e5b4a0a0c22b1e6279ade39e1baf4b4a582aa40e9046493a2d61963812a155faf36
-
Filesize
277KB
MD58887fd1d5a1837466543172fc8b1152f
SHA1f84eef53d94ea4dbc62d3bc363688ddcb6d5b322
SHA256809e678c4b40e4cace818932c7489eba6e2c0492cb54bdcb3f7a7c4faa7f94be
SHA512e53df92a9a46fdf4ec707653320f9f0ec6b9c82d3f6581599672e1363f9da354dc1d8b216d20c386cdc089e8aa4fb85b95915e995dc9bee1f3b8fe211fbb48fa
-
Filesize
256KB
MD5edc2dbeb11ea1d493b32e2f233b72b0d
SHA1e526e88969ad6f53ee357a705ca8a1ce2dad036d
SHA256e6af51f2d15ac580aeef09d35057d5fd1a47531f5ed70ff92877b8d9cdd60b9d
SHA5128e3f613ca5f9db049192c1f1b91686c943247be42726c67367303d754659487e0c6cf4d327c5688dacbdc31544f69d1f64874bc5c930b18fb17925c5793f9353
-
Filesize
998KB
MD5a77e2e1098aa8a4cfb228100e20e6561
SHA1d7cd36a77f09f021200e2bd27ea08ed9d93dbd5e
SHA2569e40250121908fc57f3b210a9ca8d00a2c2c763a3887a5c1f0366e28f7330d28
SHA512072db620ae40935664a21d60f0a1688a4eb66dbab4aef6158e7f84c5287e2647bb19e06b3db46ace177df3d438c92ceb2cf2b8269623dc2523ac9ed2a5b6d1cd
-
Filesize
752KB
MD58fd67860ff1db77379fa1ed3234a9090
SHA1ac310159d093fdd0699218297ee32ee0dc9397a8
SHA25636f0bffdb0080c576e77bf367c651b806040a6f2b9ab7f1b4fc2cad2e9dac136
SHA5124322db7a5f7680f83243a0075110e1035f1af5f51798f72788d8069084312b9922ca18f4487ca65909e40780e0701e7469d5d9af9d050cd95ab5d7a5da160cfc
-
Filesize
124KB
MD5bcb7ac97ffa91ea6c3a919512811c7fc
SHA14d7e6cc4022c4ac655cc99df1337857301622a20
SHA25625c5639f2bb417a4177f8251c79d7986b27f924bc41df0ffb6e64bff90af0503
SHA512a0f571b445718892f340be15a837f641057195d29570264401bfcd71292ad4789e4f31b391175f3df33eabaab05564a3632df150ad36c278e309e5d86ec31651
-
Filesize
77KB
MD589308b71894b3963c0044d94a0e39398
SHA1a9843d85798c046ceb6cd44d42d63c86c3894e97
SHA2569fdf12ea6ae07f37915ce5b7b8b2e2c0aba6ab06bc7f598de5780ce6d8c000a4
SHA51219f85cf235bf89c70685ed97be92a0b3de9e43a17b6442a79f2a84d43580de43d4fbc4ccdebf95ceee4113f763bab81c622733173d67216774034bc95ded433c
-
Filesize
75KB
MD5899530fabf61efa1e2aa27d6e0d55eec
SHA18a808a6cde14d38cd9ae6740be3088d1bebacfc8
SHA256420db0835532b91e4412ce2e7218e03b6b9f696fe05d1fd17b0f4c419b80a66a
SHA5127ea9b08b6403d9a9271b6e27206a25c18ace22028c09109322a9831c136e4668ec39e1d1460276f57317c89d3a3efc39f68e6ed14d1228dc03c1681050131dff
-
Filesize
68KB
MD5c3e7a59161def4187d187161f5b86911
SHA1faea62c6b19a1921d50f613fd5a79db53bc30c60
SHA2564459dad8f5b951be1cf057e5a53c7012e32c945271479ac62ea9064553ab2a1c
SHA51290495864198452b6f62e6de72abf2a0ea979f26dba91d8eb001090b80070f6112004532e06ff3aee5f146958048ddc1d1142209fbb8392bd5c7317e47fce828a
-
Filesize
80KB
MD5420181d5e480a877689e0b48c128bc58
SHA17a58f814b8aeed522a32ca714d67eced79577402
SHA256ef0a0546393e231b5d0b96045677788d641fc7a13b9d0e5a73fd3033f6a2419f
SHA512d6021c2a6140f659f1af9ec0a7c3aaf8becedff2bf075a6817ac0fbf5a2baf4e34f1248de805eeee1174b05271e29719ed6aead3297f37d0cd36acd9671a1d87
-
Filesize
78KB
MD5da3479535ef95f92d138fa4d14c36a84
SHA1306eaf77522defe6079a768abb5b59048088494d
SHA25660b5e21ae638657bc9c01377e0b1b5a3a8de43f73f0b41aadb39ee311f0590c4
SHA512b3ed5e087bd2cc4477173d358db3a4d5b149adf97df53703cc12f2297aac2a3eac3d4e1dbf9ad1807ca3a455a0641b4ce4ce4211b6658ef13a4ccaad42840102
-
Filesize
76KB
MD5c6531013441892da09845bda33e1861e
SHA17f9a09c0622c5bf66fcab220f504386b17537dae
SHA256064ee1e7e6143bb792157bcc8d6a46f506f1b7da83e985d29e3c543e6008ee30
SHA512b3adc187ccd3d2331eeb2b345d4a093ca56948ff37fd714f47aca2764ab3af84d31992fde7fe5c37101813f20e0a922b7232243db240d77aa997351acc18fd82
-
Filesize
77KB
MD515a6ab9b6030787ed62e6f78bb4378a7
SHA1dbafe67c9a27df8430ce973e5015e04f4b265f9d
SHA256e0f17d0625df882947ea4fb3b1b88747f368fee7c0a3af24214d5f5844bc59f6
SHA5124000f0bc9152e474c800ce775f9807444b3bc3d9b7a03bf09b17244a0098f28fb5e4f93561e80b733043ccab6a5d86ffb51b768268c1569a792e5134e93355a2
-
Filesize
65KB
MD541f2d0a527db9be016e8c5e1e8cd1892
SHA138ee9df7bd1324c32331d4395ede3fb535d4429b
SHA25691b0f7d2eeb278fb3f71c3d30ad9d10aa0fc23bd7a25c8df2430857a2eeec40f
SHA512583b2d09c6ab747c570df3cc44733d47f1875a48e8d4da6115faae9eee90cde7f36dfc75eef95c115d10d4b12a16b596f441e83f4e06e3afe3c60470bba14afd
-
Filesize
75KB
MD537a41892e0709858dc2699a8b9a46f93
SHA13cf3aa8f3284a15bc1e939094a3040c477386698
SHA25677f5598997c7c711744ea91a08fcafd2896817ef7348ca4c63e8c64e1304c8fa
SHA512bfe9cb32fa6764d70e037b6383298a5d0e61df3ac7cf93807517b73e8bd052989add3bcd01c425119b3e9c59d4d486cd9902f25e2116bf52f51eb2cceb4193c8
-
Filesize
74KB
MD5ca34a779df72590903cb8051f960f636
SHA159f8fa83bd713e70cffbaba5ed92e488ac8c7d05
SHA256ff493e09d633f55a8cba044178719b3d273ce852cb32a66b2daedae8152131a9
SHA512a8e681344edf4cb725db1ed9b5328d2126a907c69c041495e8837539f2814b4716f4d2a82bb4ffa881c86abe12ecffd7a8a8e639f7dbddbf66e224eb178e0dfd
-
Filesize
76KB
MD59f86ae7041d989fea3a656b761cea951
SHA1100a05275770f2edd6cfa5b1c1b9fdf5d1e58844
SHA256885f8ffa1680bdf3d55d368bb3f94395f5b9e6223d4fcc3a17072d22326b7079
SHA512c45ce5059b327b8fba4c623add96acc1c67a975783a7a1a15d3d783109a52568dccc4aea72912ebb5f3d06a598d33b0ff768a8195c5cae506b54c007223f529c
-
Filesize
75KB
MD58e6e9df2dd6168ff696ce6dab280d7e7
SHA1d7e08613edce9077164ce7bc75c2bdb99f499c59
SHA2560804710b1a9e54719c8978251865f266a1dd8c388873e9928987e43b9be68bce
SHA512a499ecff888382f90e81c092ed8dd5b0f602ce7d09f1fd587cb79a4f6ed2c63905c94f892c71c0a4d3f1a0d513572a996527dc7f3152806a582f1228857535dc
-
Filesize
74KB
MD580ce8de6df45e2f4706f4f5475137ccd
SHA1f931bf379e15ce29218f7d09c3ec8f75bf7eda98
SHA2567f1637639717b48a6d4df7ecd11775635afa8eb0997aa2a20847c73f961cfd62
SHA512a17814cbd005e047374612d349ba7f9a57f687c4408a56fbed7ad94fbf27bd3ea20fc24d971e9e460c3a95c961cefd851aacaf5d0792a89d50984f896676795f
-
Filesize
75KB
MD5192c816087d6263f5309c5d0bfaa692c
SHA14a1924976d1fc3afbf30d06efead069f3bcc994b
SHA2561fa85460b2e1732891ceb10f1d2e05a0e83298e3935dff77697ab4f8d988733b
SHA512b5d7e3f23d2989decc92e1194f2474e9f6e8643295b921b394eef30e9d9058d0e69eeb9122b9475f0f58315a7aa8a527e2eda4c1f18ef3ab5e49def7743c28c1
-
Filesize
72KB
MD56a8ee3ea8a5c47621102318410c0a777
SHA12a941cdcdc6e92d3a6aa851d8ed93599acd1e6a0
SHA2562e3cf7bccd97f79821e59e9da40e5a1f0fe7ec01598a9b570255c289e86a651a
SHA512a280f1066ae958894335aa2c215bb8fc4c96e2fc4536b4f509ac7d768aec9f87959acad7417b02516cfb95e4a961013e8e4a890457c25bb2ad970a775d7e30e9
-
Filesize
71KB
MD5c842ffe971f1911c358fb25023954934
SHA1af2c5c63887859c6570612501bcc69505abcd408
SHA256316c5af60a707872864041db690e21bce7fe9a636641d3996b82eb86a20d7ace
SHA512336b7b2ec113d515279b6fc565f8f0ae96baf9c59a9919980a2124551ade64f8a735a385ed1129a2baf08b44cf5357e298ed53d53f714621b05655dfbc93a64a
-
Filesize
76KB
MD5ed448c76893686505790cd4e43348129
SHA1b59bb14e7afb95fa490d64cf22d79076c0d3fd04
SHA256e2f44ecbb473f405841d39f49f7e3d619546cb11b3ae3eff479f0cd24d2628f8
SHA51286627f2be2bcf98bb7965744792d6d948edbf7cb527e708b2e548b8de23afacffbdff493e3a3bbcf58a62e35bcdd795c114ea32951d9278c4b945ffc2844dd9e
-
Filesize
74KB
MD5c88341c009edf577c90034290f0efd20
SHA1d7b98940acdbde0cd754c2b9ca52300db01d280e
SHA2566210c996fc0622da798e40efc2616e3d079535ebc13966e6760464d8f4efef52
SHA512e32306b4a16706b757483183260f3a89a6ef4add18dafaa1028d229ddc13ab0f960e86fcfcfbad5129ec272aeacd13328e2ca1c1a389650bafe09e007f0ea82c
-
Filesize
76KB
MD597f359f82e9e25bad11a319d2d77b787
SHA17a0b99d25fb1031d80387d420bbe4f850130b1a1
SHA256597e521f1242f6e0da291277b087bc49410d340ec3bcc80ee0dc0e281da46a61
SHA51260e3d67fcb4496f0dc0e976b2fa284b70f13f2a4f687a0cfc791781ce6ca4679f4f8f058b94c1423ea7b397583f2eb7f6fbb18538dbc06e1db46bc9223254264
-
Filesize
68KB
MD5758277db7e1bedaad18fb5e2449ca781
SHA1902566869b7ff3e069adac3a73e0ad613aa3adc5
SHA2563d7dfa481259f359ed6c45fa1c2dd5b8c20ffd6afe929d375be2ed2cccae8fc4
SHA51292bb22ba5dcb11812eae946e050d1752d6662eee4eee07a60b9e40deb489c4301f75c84e1d145e836094eca91eb5c2f2ee9abae8e54b7c65b9a05719a9b490c2
-
Filesize
76KB
MD55ba584dff90b22f5526e7317e7239787
SHA189c45542cda095e326b7fb1046e3e551747b631a
SHA2562f330ef2b6daa981474c57ea330fc93472d1a1ed0ae947938df31a4f5c4251d5
SHA5129dd34439e24d6cefd40be266d436da588d58d285fe3b446e400c83689fc7159e3c5b6ed51df69b80e21805e78e6f1ab5591ad36c9f0700d55381ff7ac3f1ee5e
-
Filesize
77KB
MD58ab77966dfb710c320f5857081038553
SHA10e43d0297ac65472a4b3c845d198dfcdf33fbf7e
SHA2567b5465d42eef4a553db66cffeb4ceaf04a6dda515562f6df2beb3791b23db3ff
SHA5123963aaab347dcae1894f0ad0a3b4ef2d57101bacdba5db9b3ef046dd83195bc1985519d11fd6c6d35514c4730cd92fe0a0e286ff1e196ac8a50287ad18f36bed
-
Filesize
81KB
MD56b10d9fbd82a540040237fbad8b21755
SHA1aafaf1776cc54f76d374e82a3d1c9c084b84b3e5
SHA2561a3a265e83357c958493f5b4b837d3d688f71bf7667715ca1e5b1b0d00bc0626
SHA512a905c4404dde38afd225a5911ab5f6391811274932191b557c47f18a8672483786f372d2eeb084058f3b22eabcf90bd634d49c6af37389650493f288f61364a7
-
Filesize
76KB
MD53a79b5da575d48ff41a6a0b562604c44
SHA1397d5973cdb25e1eae1a483491f9f5e4011bb7b1
SHA25649b85125adf74bb85e408c348f13ebabe197b51f3be4131fa8e1e70dc7fd5a9f
SHA5122a9d6b2fd4918718581fc8c565e60e15b12801cc5d0c8c62993c3d28f1334fef86c3a961f19e275aab299ab6f2c1b5de186f9dd990804e1aca4a78eee459d879
-
Filesize
75KB
MD5207dc2e676926b9350644532f67ddf08
SHA10e89ffa8bf83c2257769c2841d612aa87af6912c
SHA256d10519f75e1e43fd29f04fa89c256c3bd096324cc6beea3bf4d2befb4a60abf3
SHA512bd67dd45b7119a08471bad1a25a13952a5107c023f77d0c06297761ef90544d4f29e72f6807e44b0fb14bb8770e4789155106ce9dabfc592d9a6136b4334c4fd
-
Filesize
77KB
MD5727b974a063afe7e4b0f7d4c66e5eb5f
SHA176f02e9112d7e6da141ed1f8789ca555ab5ab7af
SHA256d9f0ce9e9a2489371ce3959a7d05655ced9d39678f1da62f9e18eaea6b781003
SHA512fa0d288a8627e6fecdc0f29e1ba8f38ab9a1a9dbdbdb550ac8b8fa11c298fd76d419fb995a23d2d868972c8b9ca1fd375c403ace247f7657661570f8cb5dda22
-
Filesize
75KB
MD549f02c9b610c8548df6462e2ab583cd7
SHA135ce303a45dd305984f1c55d07cc87bad7d85c4a
SHA256feffacc989a3be3c3ef8ec4c64211a2d363547b0850c2d4eba5393d03645f186
SHA51224ac8d75f9aa4387b296c1e37a9e16c2f899e8e15bfe2e7bc7531da2e36c685303de6368a12842895ffff2437d6f3ac5cdc0b8412d207b1aedd7ce98f2b267c8
-
Filesize
68KB
MD5b30b08a77a835483704ba11178cb3937
SHA1ef62a5107a1a2787be75e52736ff7b212c7163ed
SHA2565233973e54b261ddd92e50d5bad86bf0799304c78dfc413978a290e2d21e9edd
SHA512c8fab722b2ace4a9a0901382e067861dbbe9a61864bce16eb9e7aa49290ab7c6dcb3933ed174361b25bffce9110df362221236ddda3c513313b8f871b5f5d54b
-
Filesize
80KB
MD5b872b5204a1a491d1c025eef2e37c122
SHA1daace1fadd79575262dea26b5e3d19d7a48da39b
SHA2563c713af8f6095ecd88c8a711bf1ea945305019a604135e3dad9e5503d3fc1708
SHA51281d4579d77f6d358be9ecdc733d7d083301bc9b1c9f199f0384208084ef368844ae221eb18133bba3a226272b839eb122f1f693a1def863c7bd496a57411db37
-
Filesize
71KB
MD52067a8cd1f23c8c8e325ca44d4a6471a
SHA1662088cb8d01db45d73a122a9a2c3613b8b8adec
SHA256b414d40703ff150e0022394fe003145eac485c3187330949e4e0ca31d2a5e409
SHA51298f1740862389d7279c36aa8c4610a7cbd122535191efe19949cdaca486dbc44b029bd7beaa44afeb65883789ca79284623f727200bc4efd7327eef8e96ca756
-
Filesize
80KB
MD559fabaaa20f529ba902b68b9f70ec0dc
SHA18cdf0febc0799ed0c187a27a61e2a5c662fd0767
SHA256b0c6a0a80dfb3ae1a5b681edca755eadf3c8e98e078161aa21879c94b69d164f
SHA512c83474e682cb173f6fc5d49daff46110e7ac78ccf7dc7336831f86347b68d2356735e8f2aec7ce386afbc488cefb019950466ff6a4b41f8c9718246c4fd94550
-
Filesize
76KB
MD5b820f1a07182f28557df503da82cdc0a
SHA13aae7f09b9d30a20a7368c9bd8fc8e89301f683c
SHA256bfdb5d8a0624f58af0e9cf13ba3f086cc9de5bb44b9816f5314904e27b5b79b1
SHA5125da37e529532997632a73a40e9d11b0355ac2b2db338f04d03bda1be94b3fa0208578c56bd746cd4041265717bce25a1ec9d79e4f7f6f453d39eed6feac2a41f
-
Filesize
76KB
MD5b2d036512c717afed884e9d16950e899
SHA16229ae56b338d89234ae6959e56bd3395e7809f9
SHA2565dcbf6d0cceaa53fef11378698fa54a1228ec6b2770ead9f45df90ad6a85e8b1
SHA51292d593eda700b2c917f048d206ec6bcb702e8ee14f52ccac6def001055d3e221fd78e4ddc7931f97d1720e57431f799210eb99595f28957504b6d089928bb788
-
Filesize
87KB
MD53a6c8f2176014685631dfef298c20558
SHA1eef86dc1d8c835fc0bd609c90f1b57c4fd7f9f4d
SHA25635c12732f90aad59c0cb462e0990c644048adfe9a0575ac0ec7b9ce698726eae
SHA51260c5d9f50acde8b23cc36f838cbf236b134c7b2d27f24bbbaa4f3dae6364ac6dd9b2c03981f7943daa1cee65615c809e54b4e531c0f35d3d90f348eb56502036
-
Filesize
76KB
MD54af0cb906baccd4a4cd613255dd64066
SHA1b5307243f17b2eab45716c0ae2f7967af2c7bd96
SHA2565c2cc9acc0794b0811c414e55354e584d9cfa11e4bf446f082990c73a131e271
SHA5127e9707bcea71eba2b065ad33acc01bfd524779f3b6b681da15627f5c0a311af032b7bf82a149b5d8dec8e37988ebeb42fff6715d2578d2e02f495e1578fc0c91
-
Filesize
73KB
MD577110b5ed42c18f617acacec5fcccbed
SHA1a98f585e87b8935e34c37ce90db758d54998439c
SHA2563cab5d6097a8a8419f99d363aed987c7551b7041663a6d85ccaec507cd08f9e1
SHA5120a6e8a37036ccfe2d45cf9ccf60dc0c30993dc65e03846063346747ef3d93fb313a9a86f02fd0a0812a3e77e5672ada7126159f5cf49c13deca8b60e576de1ed
-
Filesize
68KB
MD52f142c5e6e9a09d2729c5568e9a7f1a3
SHA14af6d95769e47ae0db65526e9c876a1321246619
SHA256ebb366b173854bc9d22d9ef8ff9ef676e99872baf25896ff5808192f539d8f4a
SHA512dfe81414b37d707d6b8f0cd61a2f444c0be09b1fbb5d67efd40d3f732652afd26cdd058360380a2612b8a6357fceb77bc8b7c086903665e5abc9e2c2c9df515c
-
Filesize
77KB
MD51dd485036b3bf9931a622a223376e8da
SHA1aafb7ab2bedb7085eb48d05bf59410bb176cfb48
SHA2568d10966ad28bc815d95ca63260ec3dc2eb2040950da5a904aa3c4fc36fcbbce3
SHA51218249417fd8545964fea8acffedad4f531edbae9f2216e64454b7d5584f0b6f5167e6541f182040cec042cfd62ef693f67a81d6db31d1bbdf421916d49bfc04f
-
Filesize
82KB
MD5310b26a5c73ce122cf6682372806e2a5
SHA147da021c0582a3bf7aaed2ca0ae6ee7b2bf1ec67
SHA25631149023f01baa6d157c97af93a85b59d9c2d64bac7047448c4d52ce44d0c228
SHA51214295df050989bf489d694cb48cede23f55f17b6fda8140331a0087ae3153179efa8e80d92e88859a813a55d5e56fd055a435af0db741ab812c8f051fd094705
-
Filesize
75KB
MD503aaf3a62bf8fc5b4193af56076412d5
SHA19bc841b720a5110f258055be49dcc0eee0193f3e
SHA2564e99f41742c180127ffc2f544d67b16188017e97b2ef69e6b447e943f29a3d1b
SHA5129f2cfba028a500f5cdcc95564b10705e56f226f2b4360ab5064968654fabc77e7b14201b39baa8f15aeb4e9a8d25f40add231ff3e1581f7b4425f1351cb9f8ae
-
Filesize
77KB
MD5fe2ab86be059d48a80989071f633eac8
SHA1c1f32ee124a45428954ba2f952b6287ba9e92bdd
SHA256cc836c3343c1065351f93e9d1e248242259ec43e8abf500fc4f0ba0dce22b844
SHA5125f5210b3aeaa9c087ca6425e50c43dcd6735cc982e92699c8ac7ad9ad0fab6af8cbd5d0b2b557dbadf1f5aa94f7132bb380542ceacd7c2178fcdc545d9fc9e9d
-
Filesize
72KB
MD5ecd04c1547c33f63690282598d5503e3
SHA1240aab0eed5205b4001e7fe0e2dd7588050019ab
SHA256f56e2baba09eda924f9a2e7189b3ecea0c3a011b9b2d2c7cc8a02b283a398776
SHA51273ecd0dc0d030b6a15ac1a769f5f796c1102b7be620ea4be76750a9fd84791e92c9ee60f177cc60abdb7751a6c59ef61a8619d7954c7e1cf725d1004e2375214
-
Filesize
86KB
MD59aec9083fc1c721c90cdf64b3abe385b
SHA1f3ee62500155387501c69cd7d6d92ab92745f0fb
SHA2569b5256bfd4bf1d77e140310b0d774f4a0f95be7147dbf83f8fed1357336be67f
SHA51216c2703ff039fefbd22d201ac6c69c2b99ec0390720747f7941cf665ad55284d7a21d92dde8221ff7ffe076be59f3bb8653555422a7ee598a4cb5c2dd7ab839f
-
Filesize
86KB
MD55bb4b3703c3697fb47218834e9cc254f
SHA195cb03a8d10c8876c918f8e854359614dadd26f1
SHA256847f0a40c52f1fdfdcbe035816b555832d26619c26bbc49bcf9e495699a73e83
SHA512902b6c02a29c6672da49e94e36739dc6c86107875a13e6817629c51429ffabc49ca176101df00e6e03ad7df00b4d834426831de999c3b99046249c544599aa66
-
Filesize
75KB
MD554f15b400b05a1ff6c7bc994c6b00943
SHA1951d0b8c0f7da8524e3c284757ae61b7a51983ad
SHA25626003b063217acb8a572b4c24086abb79cb64c66c7131508d8d3f4d8c862e48f
SHA51252fc7e6f1646a6ab0840403a314873b919ab43b226b6cf976ee1ed6d1fb9c77e3ebed15ed03b4d671f1cc0d54c6ac1cffc927aaa6c099ac67f1e65cad51c8649
-
Filesize
67KB
MD565fac22f6888940c4e0ceb79afa8a0f0
SHA1b4ceb2637c615f7a69537495eaf3370234618e51
SHA25660a1760f3d9f7c8b0bef893b3450932ce6096d38410f3e042bd3cfc0f8b7185a
SHA5123132cf5892d8163f7f08fcf29aaf0d5172d464f339f84af1fdc535be84a1ffede70476699739bbda37b30d651da902d6da7f03313a6ca9edc227ff74f764b197
-
Filesize
65KB
MD570b574287a668e0937aef9f68af0f548
SHA197c40dd9b987fc6317f5a03e8a92d6fd00c17478
SHA2562c20e27cc98ef24db654e3f26491bf90fd263ede681a7c821e4bb5309855f775
SHA5122be39fab9e637aaf42f8fb32362592ab430a249992141db6582bc037d5bf63d1d1c3df33c215ad6e88ecb56f97cdb1b67bf0e8ee455d830b7feb592edc91d4b6