Analysis
-
max time kernel
159s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
Zif.Interface.Device.2.5.2.exe
Resource
win10v2004-20240508-en
General
-
Target
Zif.Interface.Device.2.5.2.exe
-
Size
40.0MB
-
MD5
4886f02015ce3eb5ef3972137bb02dd1
-
SHA1
5bc031daa34bff39cca85508492b6c53c11ddc7b
-
SHA256
50da4212ab6d5f389d3b3411bbde4adffb1e345c18ab9479131215e21bee12f0
-
SHA512
983523f26777b3b8789fc9ae8db380d4d658dd0b865a1851e285285bd745a337ba911649e325cf54314e3f034ff282d27a1d05476a7f10637e133e76d400d04f
-
SSDEEP
786432:QfzIOABqU3MMcU/W0ibX+BpFHLWaFR1dEeLS3yJOAYRyM:4kTxNoS1L3F9EesyZYcM
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 3580 Zif.Interface.Device.2.5.2.tmp 632 Zif.Interface.Device.exe -
Loads dropped DLL 64 IoCs
pid Process 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\7526D2C82601DFC48068CC75D8576B553C13A257 Zif.Interface.Device.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\7526D2C82601DFC48068CC75D8576B553C13A257 Zif.Interface.Device.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\System.Collections.NonGeneric.dll Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-NQA1I.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-S0B00.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-BQRGU.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-ATOVC.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-KM2L5.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-TK487.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-FM08V.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-QQ7GC.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-89P1F.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-9178D.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-86SOM.tmp Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Serilog.Enrichers.Environment.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Zyfra.AspNet.Configuration.Auth.dll Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-R23OD.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-OCOQQ.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-45LVS.tmp Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\System.IO.FileSystem.DriveInfo.dll Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-LS3VE.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-CE8IB.tmp Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\System.Linq.Parallel.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Dip.Buffer.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Microsoft.Extensions.FileProviders.Composite.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\System.Threading.Tasks.Parallel.dll Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-AF02A.tmp Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Microsoft.Extensions.Configuration.Ini.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Serilog.Formatting.Compact.dll Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-0HV7T.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-3UTGU.tmp Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\System.Reflection.Extensions.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Zif.Interface.Core.Common.dll Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-5B0QL.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-PE77G.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-69MN0.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-83KSM.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-NROEN.tmp Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\System.Globalization.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\mscordaccore_amd64_amd64_7.0.1824.16914.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\System.Threading.Channels.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\System.Runtime.Handles.dll Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-VI7PL.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-7MJUL.tmp Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\netstandard.dll Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-VGKG9.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-09PDL.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-MMKGN.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-7ACN8.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-SD7VA.tmp Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Newtonsoft.Json.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Microsoft.Extensions.Logging.TraceSource.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Microsoft.VisualBasic.Core.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\System.Reflection.DispatchProxy.dll Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\unins000.dat Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Microsoft.AspNetCore.Server.Kestrel.Core.dll Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-OGV1F.tmp Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Microsoft.AspNetCore.Server.Kestrel.Transport.Quic.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\mscordbi.dll Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-VF5SK.tmp Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-POT7I.tmp Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Microsoft.AspNetCore.Mvc.ViewFeatures.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\System.Net.WebHeaderCollection.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\System.Linq.Queryable.dll Zif.Interface.Device.2.5.2.tmp File opened for modification C:\Program Files (x86)\Zyfra\Zif.Interface.Device\System.Private.CoreLib.dll Zif.Interface.Device.2.5.2.tmp File created C:\Program Files (x86)\Zyfra\Zif.Interface.Device\is-NTGRB.tmp Zif.Interface.Device.2.5.2.tmp -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3152 sc.exe 1756 sc.exe 5084 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My Zif.Interface.Device.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Zif.Interface.Device.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Keys Zif.Interface.Device.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Keys\444CF33124D5BC4233FC38E870E059152D8CBCA1 Zif.Interface.Device.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Keys\444CF33124D5BC4233FC38E870E059152D8CBCA1\Blob = 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 Zif.Interface.Device.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3580 Zif.Interface.Device.2.5.2.tmp 3580 Zif.Interface.Device.2.5.2.tmp 632 Zif.Interface.Device.exe 632 Zif.Interface.Device.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 632 Zif.Interface.Device.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3580 Zif.Interface.Device.2.5.2.tmp -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 636 wrote to memory of 3580 636 Zif.Interface.Device.2.5.2.exe 82 PID 636 wrote to memory of 3580 636 Zif.Interface.Device.2.5.2.exe 82 PID 636 wrote to memory of 3580 636 Zif.Interface.Device.2.5.2.exe 82 PID 3580 wrote to memory of 3876 3580 Zif.Interface.Device.2.5.2.tmp 93 PID 3580 wrote to memory of 3876 3580 Zif.Interface.Device.2.5.2.tmp 93 PID 3580 wrote to memory of 3876 3580 Zif.Interface.Device.2.5.2.tmp 93 PID 3876 wrote to memory of 3152 3876 cmd.exe 95 PID 3876 wrote to memory of 3152 3876 cmd.exe 95 PID 3876 wrote to memory of 3152 3876 cmd.exe 95 PID 3876 wrote to memory of 1756 3876 cmd.exe 96 PID 3876 wrote to memory of 1756 3876 cmd.exe 96 PID 3876 wrote to memory of 1756 3876 cmd.exe 96 PID 3876 wrote to memory of 4220 3876 cmd.exe 97 PID 3876 wrote to memory of 4220 3876 cmd.exe 97 PID 3876 wrote to memory of 4220 3876 cmd.exe 97 PID 4220 wrote to memory of 5000 4220 net.exe 98 PID 4220 wrote to memory of 5000 4220 net.exe 98 PID 4220 wrote to memory of 5000 4220 net.exe 98 PID 3876 wrote to memory of 2472 3876 cmd.exe 101 PID 3876 wrote to memory of 2472 3876 cmd.exe 101 PID 3876 wrote to memory of 2472 3876 cmd.exe 101 PID 2472 wrote to memory of 5084 2472 cmd.exe 102 PID 2472 wrote to memory of 5084 2472 cmd.exe 102 PID 2472 wrote to memory of 5084 2472 cmd.exe 102 PID 2472 wrote to memory of 3808 2472 cmd.exe 103 PID 2472 wrote to memory of 3808 2472 cmd.exe 103 PID 2472 wrote to memory of 3808 2472 cmd.exe 103 PID 3876 wrote to memory of 3648 3876 cmd.exe 104 PID 3876 wrote to memory of 3648 3876 cmd.exe 104 PID 3876 wrote to memory of 3648 3876 cmd.exe 104 PID 3648 wrote to memory of 4160 3648 net.exe 105 PID 3648 wrote to memory of 4160 3648 net.exe 105 PID 3648 wrote to memory of 4160 3648 net.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zif.Interface.Device.2.5.2.exe"C:\Users\Admin\AppData\Local\Temp\Zif.Interface.Device.2.5.2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\is-6V8E7.tmp\Zif.Interface.Device.2.5.2.tmp"C:\Users\Admin\AppData\Local\Temp\is-6V8E7.tmp\Zif.Interface.Device.2.5.2.tmp" /SL5="$70062,41623777,58368,C:\Users\Admin\AppData\Local\Temp\Zif.Interface.Device.2.5.2.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\Zyfra\Zif.Interface.Device\install.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\sc.exesc create Zif.Interface.Device BinPath= "C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Zif.Interface.Device.exe"4⤵
- Launches sc.exe
PID:3152
-
-
C:\Windows\SysWOW64\sc.exesc config Zif.Interface.Device start= demand4⤵
- Launches sc.exe
PID:1756
-
-
C:\Windows\SysWOW64\net.exenet start "Zif.Interface.Device"4⤵
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Zif.Interface.Device"5⤵PID:5000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query "Zif.Interface.Device" | findstr " STATE"4⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\sc.exesc query "Zif.Interface.Device"5⤵
- Launches sc.exe
PID:5084
-
-
C:\Windows\SysWOW64\findstr.exefindstr " STATE"5⤵PID:3808
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Zif.Interface.Device"4⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Zif.Interface.Device"5⤵PID:4160
-
-
-
-
-
C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Zif.Interface.Device.exe"C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Zif.Interface.Device.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD59fe1a31fdc7b67f5480e936d359ef6c3
SHA1576269a42c0991e90f5e83c8205eb808d7b4d3ba
SHA256f42b8609854d80d7f81f276340504aa5e82bbe4d73d05080fef1fcca2444b4d5
SHA5127b7cae9fc0afccee7533971f97af11e5dedb54775bbfe45ad94b82bfda6122e65fb378bd27b2390bfe45af89438dbb550171f6939febcf742034a405b49339a7
-
C:\Program Files (x86)\Zyfra\Zif.Interface.Device\Microsoft.Extensions.DependencyInjection.Abstractions.dll
Filesize90KB
MD570973372c32f135dd06dbad1c456cf42
SHA154dfc66b09d5464b9af37324dee525174d3d6f37
SHA256318ccb1c3c8803e1ca39ccbc9ad6f5c12748c67e49c62132b64e8efff651f9e5
SHA512522bc5bd472b98fdc1a5bc4f8a2456231ad34f65a83ef8ef5fe8f5c9079028be1b173632cc255e6279220a0ae7c29299e7843e99383ed2f221cfdb51c3341968
-
Filesize
62KB
MD5f5b4461c37dbce128c58eedcd46ebb20
SHA1a730307c0232d310eef78d6fef27286669e2b0f2
SHA256551a2f9a47d498d3b55b683eaf0ed6d479d1fa24e21e71376ed588e4d07d96ed
SHA5128858a9a1939d1c0c59d756771d858d652c4aae76885feb49d204efbd4e9616e7eb30987ce4b7c687445415a2797c69c790bbf322e11abed0c56b9b35d0a9dbe4
-
Filesize
142KB
MD56d75e328f4f6356d9d96ffcc9bdcd1f9
SHA1f42ae45ea7bb01c7bdeee49eae90e06136e02590
SHA25629932ccf8b0b3147e6900614fb5a0f382a7884d19570698bf1d3530680b07c5e
SHA5126d28c7f0b7dd51d66736fd0e1fdd8abd84d715f0e1f4b172e150b97b0dee00c650177b7eb4dc377dc1fdd7f5973d88846d6f4f9700fec3ca49e688519c254ddf
-
Filesize
3KB
MD5ca537bd35772839bced21de4926055b9
SHA14e11e108600f2be035c9889c9f50305375b53f47
SHA256da64639071ad00e1084548a6c9c5fc95a86c5e4447de8d2bcd83d44bd2379e1d
SHA51225abebcc4feb321bdf6d7c9979496a590e44f3fd4c4b8d95bd7c1d1f9fa5b368a2009cdfb63fb683501c1045d8d5a7a692cdf5ce15da48352a56e49c5adc416a
-
Filesize
258KB
MD5f9b19dc07c7e54acf3f643fac49fe45f
SHA128a8b2604a7e86917cee60d761e27750cfb42d51
SHA2565c85f14c06baf35d9995bde6c3f4e93697ce54af7f5f5fb843ae57a2673f7211
SHA512ad1880e7c1e36ea6c1b62e8653b3bf292d2572e166eda16f50660bbbdf6dd2a6a7a184f2058b93a64375378dc1c7b41c15ee347ac59797d61e257ba343142b8b
-
Filesize
106KB
MD51347c411c26af53414209c0030b249d4
SHA191022237cecc1cd52df71b33719ebb8b69e33cd1
SHA256e6590ff9d9df83592dc17f99ac5271d1839560aed383079abb573d0fc6e07ee2
SHA51209d947ae8f327d061919769c3d2982400595e2527ada8ffa9780ded4edecfef6af6f3ae4b7a72fbf6e9e5b6517b281edaf0c8873552b690b20fb8b669df0fcd1
-
Filesize
262KB
MD555f4b05fc59e3395c76003b70bdb0620
SHA11d12555fd89a42bbdda41fd2ddfeb79b43fe7332
SHA2565ccc69b9308118bbd3ece42b2c377264388cbb5358d909c3fcb87307b1f330d4
SHA5120e2a9354abd86ba599b258378d461f2ca6ef9f0d2c974deae0251ea36607ddaf68516888a31eb319e9beb9bf1e7da332585ebb8d7d0d8495291cf91888252a7d
-
Filesize
82KB
MD52811cc8be4ba4a591d417a49d1c59d9a
SHA13665761cbcf71aca7623049802751c26928af4b9
SHA256b01f90bdbe91c1624d4ae28e19a207e4d9d450dd067355ec2c92c5d4b002b0e1
SHA512930c47b9b5cac332753d0142a555ccc94c3dad87974594e8eb96a753884fef56776afeb1c54b696f263a2441ed2168a220bf0b6c59d554ec1faf392a12a63cdb
-
Filesize
429KB
MD50039eb9a2f99369d5461cfa6aaf8f4f6
SHA1be1a157148554f4b6c0e62df6a8ce6b46227a70a
SHA2566fedb98c27c81ed9a1a75bd6260554009b8e44cdb4d1a370b7393daa9553c180
SHA5125614e6fd9c18da001e4c867229804c0870eb48a7664d4f19a314f339c1cf5314304cad2497bdc9a0a0a83fd4d3d4bf99a9de7d846d17f75850344c8ac1fbb9ac
-
Filesize
19KB
MD5ac3f4dbb1cf2a827f6371d1ce74f66d8
SHA102c6c58ee640687cf7807326626fcf5799273e4b
SHA256710963c046162d0f96778415483ee76c5ac7d5d536eccf7ca20da573fb05769f
SHA51234e84ee97aef930b5a77b703eb66c3d170fd83cdfd80476acf888b422518b1031a80d26bd736c0626f720c60972e92a3515a60f989b79fe38721584f10c6143d
-
Filesize
338KB
MD57c3751b2177f8e972fac2e246ea76a34
SHA18408f0329975bec41a61821629647d2addbca721
SHA2568d9dbbde9f8a57bb02c162136231c1366c9ca6bfcaad17472496e4d0fdd1e134
SHA512b25d5c87fe18eddac93b5c08e6c168a32edf3a961c9ae1f9565e68f63b1a29aee94530755881e609f77fd107f8e24c55b0e215e0426460d9c79c2da201bdbfdf
-
Filesize
86KB
MD549d2471f744d3849f8a9e5b924ab76bf
SHA1adfdbef83529b05df5dcbdb947a83b6be90d8ca0
SHA25699a70f69162be372eac78d0017a327ec3a140c2c33df930370047cb854cea113
SHA512118fccf081b281c4038bacdaedfd17f45c180835d78ee3bbd815c3a9152d46aa13951e30a7f5a4b63d09250a13f26d4c02f371df907d60817b220d5c7d14150c
-
Filesize
158KB
MD5207723730488a5cb63560a9e807f86e0
SHA175c41d013021544c5bb5320540fc214fe3bddb65
SHA2561a5627b43f3179420f141432e7c14eead42a4c11c8204950de0bd631a63454aa
SHA51241c700b3e8d700e8dc341646eea316e54a5773de9e7325dd4eaa517822aec63440bcc7fb3c561bb66c5d7863f9b018eab8df9c9d9c5f74c478645acbfe478961
-
Filesize
222KB
MD5047d1c1462df143c097642344f216330
SHA14c8dba308f37613799409f03a98ef9f9c274008e
SHA256cdcf1ec16748aa1da678f36fd7ad749af9ae1e3e8dd527a5765a8ff2f8183250
SHA512dfb7765e6d0fb9eb2295b7fa150bb90affcc1a0732510a2e68d9e7910ab4a7dcd2ef17fa98e5389fbc34f5b42076d1fa273b82e51e80980856854468169e2af7
-
Filesize
610KB
MD5268165cf5fd2f34fab1f4ba3c2f410dd
SHA15b4a1f36a02cca5c3a134e78c3a21645e49e1d87
SHA256bea81b74d2244094220855e3d52449cf65bec3d2f9e503b11121925360234420
SHA5129c74f6f186f40ade42d7cb696853cffddc5ea2a92204bb1e7dd5a615822f9c65371e8e48aedd93c3e732d1c9e3cb35a1dd135295decf4b233f3d46bbb55371ad
-
Filesize
46KB
MD5c4144a7d86db6a956cf325047bfd37a2
SHA10d064789a99bb7231f197d7f21267e624908d81e
SHA256022ccc3e4a19cec1fb75dc95430a39b7f307578345d357352d594a2032220726
SHA512f1512d572d49a49645075b5ff366b07f452197571db16190125f0355030d53eba6d7d21c91b91bb447739dfc5e4d2ff9e03fe8183625337ce79a33666d8d89c1
-
Filesize
11.1MB
MD561e1f25fd0014bfb70c214cc6bf38c67
SHA116af7857b6b6f6d6f5e7b94706b995e0ba9f7e66
SHA25662f58e60e609590503d3a7cc47553e3f1af5eedae46a8eba2012391dae13ca93
SHA512c2dc256a9cad33c185dafc8d854d431fa870330d1d64597d2f55a9d500654ca7563b6fa0b29058da1a309969b66a16a79f1aab28f253f67f20be7022ef1c8e6f
-
Filesize
62KB
MD5f28170e62a22affb8679d3e9251325ff
SHA1944cfb312747c6b87e7d8f527e478c00b7e64d4f
SHA256ad46af548804168644442a20244f1acf491a0e52bd4b165e26330360525d1801
SHA512f0d8bacb3f95f268fdf76c3398f8280580c83d7c73a4cf3ffb9ef00a908a59f5748275257b08a7312b12b9aa01455ef451e0753ee868868c4c583702eba56694
-
Filesize
42KB
MD58b6962b69f9689b2cf4d1eadd58d7820
SHA1cda68bd18cff384e9c1fbf83949985cbf1746c2c
SHA256f989755e017703f233f129e7af4f37fae77f06b2a878eda79ea0968c6075231b
SHA5122e4305fd02f2f215a34291b1573800d07671d16ea7fe5e01dc88d768a938f90773d046c3de06354c49ee4610f71f67ce1531a9dad5c990cd6fcad5913904771a
-
Filesize
1.9MB
MD5387c3738e16b2b1f52bef413e8a9b12c
SHA14e095f2c76e2e3a628b964cf05b94686c0cbc2cb
SHA25664a288bd4565574d117c4e23122e0d650a2dec92d9da0895ca8c6793abdce1bc
SHA5128d48bac8f5bcc25f691a107c15911d8432207f54840163181a8e84544dee555a0a226df567ea3f3c223248795c9f04f80eb90974f9857cc36692d233a0fd06c9
-
Filesize
86KB
MD5e03338fcad2e53e2e370ed1cfbf5bbd3
SHA1e8e427d91b32d1dc4d4dc841145d8151a4f21836
SHA2568683959c291a31988dbc004dc309f12bc70c16181dd4fc45e858bb7ba1ebaa05
SHA5123a577172858db05485526337cbdf55a3169b3fd61cb24360111bdf1884d095ece2e7763fe6c28c977b94b8533683343163e2ef7eb35c01d3e9e9d24a2d158697
-
Filesize
49KB
MD5390e94d3241a064a7eafc0433dca3061
SHA16c00e8b56d86dd9766dca4b5a500c151f889431b
SHA256a48c2fe547d93b6cfaea5a68413d4cbf943841add58aa0ad9e93ae601aec5485
SHA51234efe7b5b267d935ea54fc54cf79058976a3e8ce21866d92da1d3e82dee687398cf90c6db92d1985bc5f9c9c712756c0e7e749633fb57cd371d881d6a789171c
-
Filesize
14KB
MD5ec0c0d74aa4ac4d4c3ca95a250e6d27a
SHA112e0399a615238ebfdad81b00cf35a265fd64000
SHA256ea98b42528db33d0e1e338466d8be69afc661a2ee62062484549489273d68eea
SHA5128624a40ae93648bdb9acc5f1ff98966eae74fbb0e7016938e643a988472a5fd58947060e3206fe261f3be39c2b5dabb21d87bb923d69ea125ac195fea4044a89
-
Filesize
39KB
MD53f8461029ece65e4a6f791a63eda056d
SHA10775c3e2f50080e20f5ba194b1ea0bc1a2a93171
SHA25698a81b395dc30b45a2886ff8e3ebdcd46930b8d1b7c02f8d5023da4ee428d8ab
SHA512604297df4835d715d94a0aa5371c04d9118b50ab6aa12c32bc09ba004420a6d2781c1347c077e3a35ad975c6430ccb446f2b6d2a2c8081b06545a92a737618dc
-
Filesize
237KB
MD5e5b5cbda3e64e9de6af56756d6eca6d8
SHA1d7e944a7b6cc7da159b53eda4e712c02067c5f24
SHA25694517bf14f91c60c543ec01f1985091a0862abb2e231d1aba7227ff52c67aadd
SHA512dc1988efa964748236b2c998bf2fe499dfad3244e629d1bc594b95b0d9158be4b55d1a67f59b336f216adc277afd823afd1751d2c46954866b858597c465f8a3
-
Filesize
11KB
MD5c93ebfd960fea393d82fbe0b7e0377e3
SHA1a5c6d65c090f14c4919a53cd5429a7546f71b71b
SHA256e1be8ab07a2949e6f2d6c1dcc1a24ab24659a556cffc16dacc61924c7f15d24e
SHA512eb15ff19b069c80ebe6f8c514bd9c49da99899727dd3c372ffa918becb25eebfd5077dc2da827f8d40d024f7f173e344712cf2a8594958a9322f5024b4443847
-
Filesize
30KB
MD5f132fbe1f191b102153a729fe78b9cde
SHA1a2438faf43fbcfc78df65c5af76b14a1effedad4
SHA2563192e6059d3e9efd4a009e562ca421819eb22104908cbccec99c14c99da7d59c
SHA5123909656dc9cc7091bb196b1bf6b53d4d5285695c6aa88644d25b2b978f5856eb603efdf2bcea6b51a6f3de9e5395d0b44c610fa864d35f791d87217c5ca6cf74
-
Filesize
207KB
MD540dab8936d0bf942d445d2efef4a0d43
SHA1c6d1f93d46f57a16955575d32df27fd768126d7a
SHA256dc38d786dcbfd67f405b35a80111861b43bec880e465ed522fa688ac47203f52
SHA512ca277958d3056fc5e23db24621307b60be8b8bf430adca1977fb719587c17e8c34002ae77de9aa0f11b46d82e7624e0dd6f4264da7741a4a90eaedb9e2c19e68
-
Filesize
6KB
MD5ac612ec05d9009f29d2380b7fa62df0a
SHA1c170e85405f9070fe3bda5b5120b8791bb5c938d
SHA256ae5278a86f495ec0849adafa0beb896100033c38e15e873d1ad9b66159cce55f
SHA5122718db7faa8444fd9b77c096778068bdaa7091b98c97eefb2f9b8671277f1c303982c533985f3120e1d8792ffa46cccb235c0cd44b3fbff33f5c2c0ccb1538f5
-
Filesize
154KB
MD5b36e7b43c5ea2575f8b068c34ec67498
SHA138112accc304be59934fec6ca15a59e7a6688df3
SHA2562fec50dc14bd8629a453a56f03a8d6a1d57fc0f66de28bd835ec57e532c23c63
SHA5122a94071b6a83e561e12acecb3c768bdda0f4aac148ff9fc35d5aab441f775451b9cd83cc76c1484ee281ec9acbdbfee2d703e4c9f862c4400a6c0b1d0f7fff1b
-
Filesize
447B
MD5f7e0902fe64c8db8c0b3022b69747692
SHA1a06a6aae113ff4625970e5bad965f101e836a096
SHA25621b7a53b01f7c8b8908abf728560f55640a8a6ab9f1c899e03faecf12928c2f4
SHA512611dd23fe09185a0187d4bcca4c16867f4636b39fa2896524cd008837bc0cb27c44fddc682f82a3d3e9dd179c1245476e141f024c3e8e21bec9b49488c3a12c2
-
Filesize
1.5MB
MD56a93c31c1c4963e3620bf6b76d059caa
SHA192966e18c2f4e71c1b5751e1d325f6d8a91ec444
SHA2565a2f3e3a250f6907902786fea7e4679cd6d8fa97dbb5b7321b1a863bbce15cba
SHA5126ec240233f6f628d04287afddf994f82a2ebf7c35d295e88b4f02b7e735232f76ef7817dcd0967368632ecce4733a9b4bc21baed5270765e1dd513b9a16b7d95
-
Filesize
4.9MB
MD56731fb2976d0a3672a9b715a2d3addfe
SHA18d49e015624bef7034d64e27c90de7cff76e9db0
SHA256c9311ac15507b2652b7b4711a8cef3fe2aeb6860b11eeb340fe48245c4495d3c
SHA5122e4a3896221c50d5f01e8665e543d017792204bb58d3b3f5eecdd8ff7f96ff3f3fd854896fabb0c67c07d849bca3d3276bfc5fb3b1df59ae57fdc8704e6a5463
-
Filesize
377KB
MD593f56b7cb6ebdb6cef4e21664ecbad70
SHA1441807a309c103e63da3a1c885622544713b1ac9
SHA256fe898ff519cf7132dcfd7f4e15f6c16e70534a9bb7b12c67fcda396c2ed88303
SHA512850bab6b8eb3e6e3bee726ed518ca8b5130b93a09ec18cc308172575140d7f54b662940f1acdd4fd0a15f3d570bf719b689614650ecd41fd56082612038a0d32
-
Filesize
387KB
MD57ed0105df67343f2da53d07aae6bcb5f
SHA17af223bcf9658810a9fd04f014d00837e06cd7a0
SHA2564c155471f1d9101474e06a1a20af01c2247252f1848e37b20ab9af65699872bd
SHA51204f888e27b256221c277a1f2e1c58b060d1b003eab45ce4060a2d75272d27ab4de2eabcd474f632e76e96b48d174e44d2d3e403c4a91cc066127fae1311315dd
-
Filesize
481B
MD537ed6c8050f2564706f8fed00a778c05
SHA104f3eab56838867370db460a0c536d072b763804
SHA256c636c78b7541414fc2aca56b3d7fbb222d1a42fa9c487b6a1e1d29b77a5c08dd
SHA512b6c74a2fc0893f03a063343eba757828c87e9038e33a789111b34da385f5b08623b5d25a688902256fe50128a345192eb4e8da9d8a06f9630db4f2a397488212
-
Filesize
14KB
MD53e86147a6ee03f8e7482f5d2cf4fac6c
SHA17f8a020bb76c92dae99ecaa38663301a2ab105a0
SHA256f55ba15840129c2c5a1d97532d74b5b9cd49f1990ee2c43ad107fed7bb2da3d5
SHA512c9cce56db123552c77de1b9e23232e908fc07707f28ae10bb18ebcffa7903883ff0be8ce619177b76230e1f0cdd06f8d2f4753ba53cfd5a6bf5c6144eb789a8c
-
Filesize
60KB
MD599da0ed90b34fee725b0a481dc2eb1b0
SHA1c42526644f1d70c8eaf9068b0a0e532e5b7e246c
SHA2565779c49ef355b974818d3bd51949f596892a937aea0446529e0f0393e6450695
SHA5124de777b0e597e271edd8d1d3caeff100cfcc203941c7aa165bd81ddd6cfe4bcbe989e327caa646a8a5c459c4cddec506b7b72871d1e2e43044fd1241fe342f46
-
Filesize
98KB
MD5a21e409e54246e11d96f58b4d07bc628
SHA1d8d0e096df94a3fadc1c1c285faa0a93e82deb2f
SHA256dff9430a84c3a86affb3edbdb0f7995fb8b2718d25394ea4de655020572a32f2
SHA512512a618bca22f45fbd5f015c3c3782ef0284a2147cc8e289f4a749277ced1fc865784b0f825734dc791f33971d345b4835d3e3be900a5f64929162e048fe09a5
-
Filesize
702KB
MD51afbd25db5c9a90fe05309f7c4fbcf09
SHA1baf330b5c249ca925b4ea19a52fe8b2c27e547fa
SHA2563bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c
SHA5123a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419