Analysis
-
max time kernel
120s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 04:27
Behavioral task
behavioral1
Sample
544997200873012aeb8c5fa64f231820N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
544997200873012aeb8c5fa64f231820N.exe
Resource
win10v2004-20240730-en
General
-
Target
544997200873012aeb8c5fa64f231820N.exe
-
Size
259KB
-
MD5
544997200873012aeb8c5fa64f231820
-
SHA1
c090ba583f5dc4e0d3fcf2964ef90aa3d13c06fd
-
SHA256
39d0b54cbb14ece83711388c739a3e88b7ad58ddecb7c35dcc73b0dfabf283fe
-
SHA512
db3792ee1745ff0d5c0f0486ed098f68cafa834326988ac0f876d261ea5fb4766bab04b1b958946fdb49b655c39575111b754edd0d3b2716cc56bb09f4ae0e0f
-
SSDEEP
6144:JmCAIuZAIuDMVtM/LmCAIuZAIuDMVtM/U:7AIuZAIuOAAIuZAIuO/
Malware Config
Signatures
-
Renames multiple (4354) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 1036 _cup.exe.ignore.exe 2604 Zombie.exe -
resource yara_rule behavioral2/memory/4848-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000800000002341a-6.dat upx behavioral2/files/0x00090000000233ba-10.dat upx behavioral2/memory/1036-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000700000002341b-12.dat upx behavioral2/files/0x000600000001e535-18.dat upx behavioral2/files/0x00030000000229de-23.dat upx behavioral2/files/0x00030000000229df-27.dat upx behavioral2/files/0x00030000000229e0-31.dat upx behavioral2/files/0x00030000000229e1-38.dat upx behavioral2/files/0x00030000000229e2-39.dat upx behavioral2/files/0x00030000000229e3-43.dat upx behavioral2/files/0x00030000000229e4-49.dat upx behavioral2/files/0x0003000000022957-50.dat upx behavioral2/files/0x0003000000022958-54.dat upx behavioral2/files/0x0017000000022961-58.dat upx behavioral2/files/0x0003000000022976-63.dat upx behavioral2/files/0x0004000000022958-66.dat upx behavioral2/files/0x0004000000022976-74.dat upx behavioral2/files/0x0006000000022958-78.dat upx behavioral2/files/0x0013000000022977-82.dat upx behavioral2/files/0x0005000000022976-89.dat upx behavioral2/files/0x0003000000022978-98.dat upx behavioral2/files/0x0006000000022976-94.dat upx behavioral2/files/0x0003000000022979-102.dat upx behavioral2/files/0x0004000000022978-108.dat upx behavioral2/files/0x000300000002297b-115.dat upx behavioral2/files/0x0005000000022978-119.dat upx behavioral2/files/0x000400000002297b-123.dat upx behavioral2/files/0x0006000000022978-127.dat upx behavioral2/files/0x000500000002297b-134.dat upx behavioral2/files/0x000300000002297c-135.dat upx behavioral2/files/0x000300000002297d-139.dat upx behavioral2/files/0x000400000002297d-148.dat upx behavioral2/files/0x0003000000022980-154.dat upx behavioral2/files/0x000500000002297d-158.dat upx behavioral2/files/0x0003000000022981-162.dat upx behavioral2/files/0x0004000000022980-166.dat upx behavioral2/files/0x000600000002297d-173.dat upx behavioral2/files/0x0005000000022980-174.dat upx behavioral2/files/0x0003000000022982-182.dat upx behavioral2/files/0x0006000000022980-185.dat upx behavioral2/files/0x0003000000022985-191.dat upx behavioral2/files/0x0007000000022980-195.dat upx behavioral2/files/0x0003000000022986-199.dat upx behavioral2/files/0x0008000000022980-208.dat upx behavioral2/files/0x000300000002298d-214.dat upx behavioral2/files/0x0005000000022986-217.dat upx behavioral2/files/0x000400000002298d-221.dat upx behavioral2/files/0x000300000002298e-225.dat upx behavioral2/files/0x0006000000022986-231.dat upx behavioral2/files/0x000500000002298d-235.dat upx behavioral2/files/0x0007000000022986-239.dat upx behavioral2/files/0x0003000000022990-245.dat upx behavioral2/files/0x0008000000022986-251.dat upx behavioral2/files/0x0004000000022990-252.dat upx behavioral2/files/0x000500000002004c-6380.dat upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 544997200873012aeb8c5fa64f231820N.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 544997200873012aeb8c5fa64f231820N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_KMS_Automation-ppd.xrm-ms.tmp _cup.exe.ignore.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\VISUALIZATIONCHARTCOMMON.DLL.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\MEIPreload\manifest.json.tmp _cup.exe.ignore.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_Subscription-ppd.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ja-jp.dll.tmp _cup.exe.ignore.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\hijrah-config-umalqura.properties.tmp _cup.exe.ignore.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00E1-0409-1000-0000000FF1CE.xml.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp3-pl.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsita.xml.tmp _cup.exe.ignore.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Text.Json.dll.tmp _cup.exe.ignore.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\ReachFramework.resources.dll.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\UIAutomationTypes.resources.dll.tmp _cup.exe.ignore.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\amd64\jvm.cfg.tmp _cup.exe.ignore.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\LucidaBrightDemiItalic.ttf.tmp _cup.exe.ignore.exe File created C:\Program Files\Java\jdk-1.8\include\jdwpTransport.h.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019VL_KMS_Client_AE-ul.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\msdaosp.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp3-ul-oob.xrm-ms.tmp _cup.exe.ignore.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_PrepidBypass-ppd.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\GostTitle.XSL.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\System.Windows.Forms.resources.dll.tmp _cup.exe.ignore.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\System.Windows.Controls.Ribbon.resources.dll.tmp _cup.exe.ignore.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\PresentationCore.resources.dll.tmp _cup.exe.ignore.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\ReachFramework.resources.dll.tmp Zombie.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\lcms.dll.tmp Zombie.exe File created C:\Program Files\dotnet\host\fxr\7.0.16\hostfxr.dll.tmp _cup.exe.ignore.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-string-l1-1-0.dll.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_Subscription-ul-oob.xrm-ms.tmp _cup.exe.ignore.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt.tmp _cup.exe.ignore.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.ObjectModel.dll.tmp _cup.exe.ignore.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.ServiceModel.Web.dll.tmp _cup.exe.ignore.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Windows.Forms.Design.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_OEM_Perp-ppd.xrm-ms.tmp _cup.exe.ignore.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_Subscription-ppd.xrm-ms.tmp _cup.exe.ignore.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Runtime.Serialization.Formatters.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\System.Xaml.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\ext\zipfs.jar.tmp _cup.exe.ignore.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Integral.thmx.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_OEM_Perp-ppd.xrm-ms.tmp _cup.exe.ignore.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\ucrtbase.dll.tmp _cup.exe.ignore.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_Trial-ppd.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019DemoR_BypassTrial180-ul-oob.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_OEM_Perp-ul-phn.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessEntry2019R_PrepidBypass-ul-oob.xrm-ms.tmp _cup.exe.ignore.exe File created C:\Program Files\7-Zip\Lang\nl.txt.tmp Zombie.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\Locales\hu.pak.tmp _cup.exe.ignore.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe.tmp _cup.exe.ignore.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Green.xml.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Numerics.dll.tmp _cup.exe.ignore.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.Claims.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\ReachFramework.resources.dll.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\UIAutomationProvider.resources.dll.tmp _cup.exe.ignore.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_O17EnterpriseVL_Bypass30-ul-oob.xrm-ms.tmp _cup.exe.ignore.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordR_Retail-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\AUDIOSEARCHMAIN.DLL.tmp _cup.exe.ignore.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.osmmui.msi.16.en-us.xml.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\ku-ckb.txt.tmp _cup.exe.ignore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-private-l1-1-0.dll.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-math-l1-1-0.dll.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.VisualBasic.Core.dll.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Reflection.dll.tmp _cup.exe.ignore.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 544997200873012aeb8c5fa64f231820N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _cup.exe.ignore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4848 wrote to memory of 1036 4848 544997200873012aeb8c5fa64f231820N.exe 84 PID 4848 wrote to memory of 1036 4848 544997200873012aeb8c5fa64f231820N.exe 84 PID 4848 wrote to memory of 1036 4848 544997200873012aeb8c5fa64f231820N.exe 84 PID 4848 wrote to memory of 2604 4848 544997200873012aeb8c5fa64f231820N.exe 83 PID 4848 wrote to memory of 2604 4848 544997200873012aeb8c5fa64f231820N.exe 83 PID 4848 wrote to memory of 2604 4848 544997200873012aeb8c5fa64f231820N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\544997200873012aeb8c5fa64f231820N.exe"C:\Users\Admin\AppData\Local\Temp\544997200873012aeb8c5fa64f231820N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\_cup.exe.ignore.exe"_cup.exe.ignore.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5a30bb86de4739decae6f56e4c384d0c2
SHA13b58bf1cc41bb563e5387b6a5862189f38b548d1
SHA256337e0adcb5fe85ea2c45d5de94bda875a9754567bf13efcddbd9e3cfdfd1b5e5
SHA5127c514253915c64e8d941df31bb24eb7102d0ce5dd594206b15a8602db97595952d2484bab7e63c1b53644caaebf8e15708b47f132a8b8a0c6b7fe538463dba9c
-
Filesize
242KB
MD5580c7555d9edfd830d72289db3cb419c
SHA1b96341af850989ad3d0d427a45ba18e89be63712
SHA2564b65897d2a48695c4b4df40426a404d1aa37b3e6b5bcb2870147194d670014ad
SHA512aa35f2f0791f1067ed02fd6fdab5649a41ca95d99ceba6e7ae8496420b8a237fcd6b98484917a3dbaa7983ea6e3e4fe2b8adbc56baabfe9cf4e863ea136e08e4
-
Filesize
1.9MB
MD5860fdb3edaeb1e69c9e71fc817f1614c
SHA18363dab586e171f60299091aaf5e2ae1a712d2a5
SHA2564b7cb09c96b0fae649b5a365b612cd324ab7d7bf6ca91f0e8777c459357be001
SHA512d205273b892ef681e3dfa973bd36c6e84e8a9ec0a5ea09fb531aa722e1efc586c0ef715b659c3fc32642fd0524fa2a58639ae91a63b2588c1671887ad648ff16
-
Filesize
673KB
MD58edd4114ef0cc8c2249137e1ae5b2bfc
SHA12b2ce8202c42d6706a151e27a9ef80635e0343c8
SHA256a7e90d2e436b0a183bb4a9076535bdedcefadca1d370929922559f42b12af232
SHA512ffa847dff9848f65dfd4c73b24e584d48eb40793420928c507eaf82cbe27b7e5d44f0cef50aea3ba4c6399af0e359bf02f615f46ff2a163e38b215b16b1cd6c4
-
Filesize
339KB
MD5e7fbfe1d8ec6ad023fb45cd8fd6d06d4
SHA13e21f84bca0593d59343960fa59108f6c70bbd60
SHA256a390ad125ea3d804954a97841d7d5e0042e697d88337d28c964b43c1c2ceda42
SHA5122ce303448d8e41a0e547b7ecd438901f8e4a545f838305901b4cb13603915fa0bedc9aa65c352dee5b4ca6edfa63f52b8a4574f8a453a18d4106ee903508a7ed
-
Filesize
318KB
MD526ca2846f2567064376f469725b9873d
SHA1a28202290c587d8aa75bde810bc12d9042a9dc2c
SHA256c37b9e6b4914c13845f16e522d0ed8d9050a8aac3fc6638d9779ede3f92d2498
SHA512ba5c54b96873eaac2e28efa4c6adef05c299be1d7873e9fa1480e737a08c3fb34829b0b33859e55bf8e8258fafbf79948c59eac09ac56c1bcc39cc901fca312a
-
Filesize
1.0MB
MD5acae49cb3232d4ac7fa9e3afeee25bbd
SHA1f76313d006eb3d317455b5de9120b400ec63c39d
SHA25661469baa6712fefe8be210d2184ad939e694a6f2f8ab6a9c8ff903311d0cec52
SHA512eb5dd2157376d7a970c6e06499d7e04bf66725ca08622cbca1dc39a7edfbf0ce7421d6bdb9c943cd3323477a369b847977d9878c31d4d2ca5621788d5390b6ff
-
Filesize
813KB
MD51e8beac14fc633df7cbe3449fe738152
SHA11a4bde52c0f0a45a240f6d63a68ac6f02cdd237a
SHA25653457afddb1f0ce48fe8f82e92becdfae662cb0b1523d2577b147a047b262ab2
SHA5127551bacc348282af09daa3d9fddfa1d651a9dd9f83dc078e296e04d86f5bc0b37088f8d464a07402df1c6e3b739fe6d52c8403cca72ad77890dba877154abf0e
-
Filesize
186KB
MD5f9339845dbd2a88ad8544032e644d658
SHA107be01972aadec8d1c583902b58f9e15438e2a58
SHA256d1bb5b98bfca4ce087058d1e85e8b756bfff9247b4f9bb6f6b14b28b98d615a1
SHA51248b0bb94721f19b6d10018e30ced3ea02f52f911662db8004f2d322697abfe81926df63ef86767d0f45b0575c81437e115a00d7d72394c9a85320cd22489380d
-
Filesize
139KB
MD50a2d7baffae65b072b9831c13c154a75
SHA13ac51a3fb47ba33e81dbd334495e160b87f78588
SHA25642f21630970ca6a5a44598984bf99dba14a05d96d07913a61473a5d8728c6107
SHA512d7ba4b0c2e41aa563ce9b75af80f96ba6746d16ed89ec21d4dd97ae4b6399ca03a1d796fad26df61dc6a599fbb7d7ede8bf9841ba1a3c8a340c52280944b6bf2
-
Filesize
137KB
MD55c654579fa089562d189d217303502b6
SHA174aca57068bfdba895155d79ac2d5abdafe4f419
SHA2565c2f0852984643c6081cf690c20a3e8bb8af2d63bc1d0b1cbb5b031848e7bb76
SHA51255c3055bc32efdd33e094f9c997df7c184199aabe65f037cb62c8e4107e00df47d0d93f91061f2ed812de5cd4cfcd127f25c3581e829bed060a982985829c587
-
Filesize
142KB
MD569d8d130a2c899cd21f5d146b22d0abd
SHA165d284c8216a8a63414bc6b83233d87ced11baa0
SHA25624b514effdb6a95296108774201c6928649aaeae1c8d92cca6593a4d490ee90c
SHA51294640887ccb4885c7ec1d90eb91af48b2a69c4fd2c67631de1d54d1493a10b0166a066d3b4bfc5d7c2f0809036f0149eb8aff5c77465f9451c2e51931277583d
-
Filesize
135KB
MD5b673f3a16fa00b1123457ac7fd072643
SHA1b9c7b10bc1d300380013d511c801bd1788382ac6
SHA256e4cf1b83b4ccefc890f823346e3813d37815367ea91c7fc23b2ce7a6bfdcfac8
SHA512c018bb6c5095b30299da2ffa1f8700b12a35ae87e09fb1a14862c5c03f1bc8fb4ede51d5f542b8d935f337b274ebf4342142ae254dcf96bdf214563aabbb0e47
-
Filesize
140KB
MD56cd122d86b4ec1e39858e48965a519cf
SHA184eeb1cad98881102b9e656ecb0e31eac6e184e9
SHA256ff6352e9f2d530d83012d59327687af00c39df30d1a3190005c1e0672ce0e8be
SHA512339ffc368640df625f7273f35ae0ed19b6fece14b377a53b97076b462d8f5d845d9d58bdb901be3d9b62853c53d9a48004a9f88ed8bd8761d20d9752b288fcf6
-
Filesize
141KB
MD5aefd82670e7f15364f380fbdb1ab9fec
SHA1201cc04e301b243183cd722b6b708e2f302f58b3
SHA256ef82a1a7329d81a2e3ad80efb40296d1d720fd07d06c84afb4480cc2a5cfa872
SHA5127b3a62547cfdb452b4aaecf7189b1eb9554c72ce0576c535de9fc3966ba421c0512a4bcc07920d8a5d51aa61c46e6dffb5817ced747e9a7435c207fc719aee9f
-
Filesize
142KB
MD565574370ce85659832e399ac10d15b47
SHA1b906100bc8fc822c810cd6b4627e6480f9382715
SHA2567769835cb652177a7d9f23ac47ce4da0319c438eed71beb667043703db2ac593
SHA512c77952016ab06ad3d2ee77362785a8b0aa8b3a01c13949c85b3f69356399e17891014e029641a1b666cd7d3cafefd1afaa1277de8b5316a608362d06246c28b6
-
Filesize
129KB
MD5c23d1d1732e8562d90e34532c2c7a256
SHA14e9bdd0115daeb281aedc7f825075a95a0bc2e5d
SHA25642df14cf76ea6c34598bd5ed195bfd57698188c2cef86d15aa6568611c736678
SHA5123ca767cd7b95b3edee95284517e0ff52c4661ccdc0c35e175d9de755357a76b75f2ea71388856ed43cb832f5ab4e429ba98ba036bb4ec3e3d1c2a1eff5577154
-
Filesize
140KB
MD565b88125854daa5f933757d6614f739f
SHA1e98e621dc72d3f636f389b63411426a94215a30f
SHA25616a974ff50956950ce608adeb438d4f17ffeafbfefd75d1177d36e3b371f87b5
SHA5123163adc2af4d6e847c64fc3a4edac6a9e9ed72127b317717247aaba14b7a692a0c287f417f6f6658d23dc6a58cbc2dc4d43c635143f5a75d0c9898ec177ebf29
-
Filesize
138KB
MD5229924eb59b055a19d817b0e4ffb4844
SHA17ba70497eddf0603666478416592bba8779d29de
SHA25686ae2abb214b9d76c44a434d1c70a6889b20ca0f0955ab607f0c65469997bbc1
SHA51216de526a24f83895d669736f292055b45d2a2577110ad8da17fba6669d80644dcd99c19636f1d53739f1dfff19c066f2009a5cf7dba7abffb3aede64251cf56d
-
Filesize
134KB
MD5cfbe947d618abfd1dd09d3e0d05490e0
SHA1dea3fb2b6125bfe535139ae20375ec7949e36a82
SHA256057168a5700840061f3a061feb3c73e7aae922d681a71f2d410fad24e42807e1
SHA5121c4506c40dc3ce45f322292232eaf519ad32b643691f718b0b73f301b6aeca20d61b3c36d9b0c2d7ddb279e8950cb91520df97fc256043da690becd10c8e6978
-
Filesize
139KB
MD5fc80a060d936537bce7d6c13d44fe131
SHA10c0bddfda9be97c20aa82f236dd0950764ea7926
SHA256aaf535ef17fb5aa3c6d92b985aaa5ded34edc71437a682f9d14e1dbe8a8eaf4d
SHA512dbcec236f73109c913a0d90b67274eb4b6e362a41263c587a0e45cc589c80cd579e48ef68f0bd5c3e672ff693de5cc5fdd193cefafb53a9fd2b7602b2572a8a8
-
Filesize
137KB
MD58a06c0511e321f0f677a5a84eb079c34
SHA124cc7630c3699aeb3468484cddcec9ae0927d28f
SHA25664dfd1a0061a9dd8f839de37223f2fea48eb572cae39b0ee702fa5a180a18339
SHA51241843e71253da4c9d254a82afec2269e3ba802fb77d7f23e0700939172db193ed486492fa4e249b6460f2707b3ef0481b9df7f024f08085ff5211af87e31d7a0
-
Filesize
134KB
MD53b052da42622342c66599961843b4b88
SHA1cf88c1ea6f69eb2cc663b0128fb4439eb249613d
SHA256337f97f7b90249664887cc59f72945fb57d468b0bf688f2d0f98a396c21674d8
SHA512e2bcdef250e005d4f799d9a9c4db9c2a881afe34eb91318f010556cc446236147a45b32a31e446a80fd8c434417281e6057395fcbbcb80bd2b546b68a0cf9401
-
Filesize
139KB
MD51a8bb013e4eb12cbcdc528bf7f180f6b
SHA1b93cf63bb2b9db18782396e5424faaec909b31c5
SHA256a6b6edeb8f5b95a47477891ab8b9e6f047c2b8b03112c4948bdebbffc38cfa21
SHA512e0c4dc941c31ccccf81b49a0d4d39cf4e03d543ef0734c24e4cd8d1bab7817c37382c72ab074a8819854b3fad0eda0cd246392610679ab1f754e6ca19388a052
-
Filesize
136KB
MD52d77e4c92dd0f106043010bdf36ca523
SHA17416110dc51191529e4687797a0dcc565750e8ab
SHA256c2aab38210d7555e1279507671d75187b3a95ec902c586ceb8eeb5b24fc486f4
SHA512275a25c780236b913ba67ae8c8e8b2a2afbf057d9e4bd6142987a81f36806f81315d2a86deb1b445d4d8c2329b8cf7002dbd7595000e0844de0f05e7f517c3bf
-
Filesize
138KB
MD53ab6bf3c7f772d099bb6b9cb8330b0f1
SHA1ec9d2ba6a3e1a2e9b0f65149e0ec59d6b21b48d5
SHA256a48581121beef3ce3dd80931a97c6d3d182b4db64992d64479ae55626343ea2e
SHA5123a008bfbbce3514d8d4e0e5a6d0cd38a78fb9d94a0c408f5932a180d8280fc5b6c90baf91ec2c00b9b3b773abe14bf7f9b535f185202a3672191d15f730b0b97
-
Filesize
137KB
MD539dafb81a63a88ebfcd15c0dd89b5ca7
SHA103c91fceab6448b0eec2b23cfcbd7d1d0257a465
SHA256c72756f83dd7de72937b3d715b114e171e5b926a448adc6168ab93b0ca2a15e4
SHA5121076fd47064af9ed3bf3a5ac34aa54ee4f7a7a718a489dc9213eb2b2db54ff545d7b5dd639143e00d98a5472383bed26efc661d4dd3dab3f8a1aa6de3c7fa726
-
Filesize
143KB
MD53bb8cd2096eb6f340248e035ae8ec876
SHA1b167eb3babed4debbb65e58cdfe1b7a31ffbb85f
SHA25692cb893219b3d2838c0463748af29c4cf13048aff97fe4af2db3bd274d522563
SHA5124d35908a59695064c19528d72237f33868dd2789433b840fa0859f28eecea4ae3eca4146f01b4f7b15258ae2ba6682696100a521996d7317aed21ad2781ee9dc
-
Filesize
137KB
MD54884118ed324bfd72c56ac344c86ed7d
SHA1b74f0df7fbd2fab51862b86916d960660c55f086
SHA25656f8d23f1e7ba0cdb9c2514bcfca0f3a82c45cd883c3255a10e2ea2b8e8bb19e
SHA512508f185ef1668d23299e343dcd62d8278a0466765b354e07418094b787d5248f2deba6972a36296f7a9544d989a8919ce42d62173c957e3c0877480439cc9736
-
Filesize
138KB
MD5e4d3290715bbe01bdbdbf8a45d613169
SHA16c5adf3300a852a7b0df513345d11ceac9a6b39c
SHA256789785a4a63c04f2a1c70acc2dd13c81c34d4ffee32d5f629ca2c738c768b11d
SHA512abd9562f97999d4dd753123274330cd0f3b2ea0f045d8c2708e68a0db4992c7671c37bc0a914cf897b89bfd70770769031910277e34a3f2e4271e1407a4f54bb
-
Filesize
139KB
MD505a0078f11d4fcad615cde706a61f34f
SHA16629636d6779c158d7a14e98695bac4973d3565e
SHA25613acf2e8a2a8537ecb257313d232002b5742b1a5282371d53597f9c2b70d20a8
SHA5121ed6fe3cbf6a85545e88edf60d88f8ef45498fb38b6865afa75e5cbbce8a570e2ea8f7fe1db5a3866c93abb35ad650ed483e4f0c579336d8a89de9fa098c9686
-
Filesize
147KB
MD5a1f853505886a84f908b6227937a8704
SHA14d027e68e9e5df8e441b1370f0a9d5d9e88161c3
SHA2564c9c29d2f7e792950827aecdeeaf7b82083236121a547df7f9409256aaf61cce
SHA5126c4a783034824a11bf9bd6048e65275abcf1bbcb7ec926d662a3d3680e329eb517b70490784ee6a6b764ec8a5d52be4b1cd1c1c48267c61fe7c6e5eff7bd64e2
-
Filesize
129KB
MD5b041c93a977b5e4e03205313ab0a7657
SHA1376ee51c97594fa424ed8bacb8ac3db9c15a3417
SHA2569fdaae43191ca33da5c22593bcf57df6e7a8c950181b3a166b07f4db1ba14aea
SHA51245e432bd8e5b1c3a82645b180f68a4b2d50fefcc772749eb7000fd1b7bed301870f4e7bf41debde927b0f1854a19cc51d7f0de01d9c33f8e2c1cc994279d3161
-
Filesize
147KB
MD5aea59aea3ea71c0aeb1dc3a0ba83306d
SHA137e587a3202517bbd410590733f4b5660d46c0cd
SHA256006511aaa98a24ab0189b9aa5f85354dd06f2ffe63dd9723f96444122e84b4c9
SHA512752078b43ded2210f703a167e87769d86a800f1dfd9a1341d28bfd2f8a42ef0f7839eede129821e7654675709c1db356209431814bcac6a33b708d70f81a2a5b
-
Filesize
138KB
MD550015e93dd38b7a7e8723b7004f1e934
SHA1e6c8520666ca1430c538cd61c8d8a3842156d380
SHA256ffa671237695fe47ff31dc24253b03ccc066b12f5c926509d4973f294d5db434
SHA51276a102c4a18bb0674e771a8787c9e8a70fa771c12f6b9bf2d09f25f678b000d5533693dcb77022dd5043ad0efdc1aa62ae6409e2db54f306abc75792d882f854
-
Filesize
143KB
MD51799d9a92c0dc3c3869f662ed4ba307d
SHA14edd9c3d756cb4610dd36e758da74a88445f960e
SHA256deaf7ced380a240ca37c60ceaf3518f04e21c85623a966383444a389263bf78b
SHA5121c6ee6d75855d020b26b95ef669ee771736c15c7325192afc767aafeb9b0a01d17a5cdf7f0f6b5e8556ea80308cfa03c6b521ea60c712fe385cdf66ebc7a7af8
-
Filesize
139KB
MD57dc100d486c11dbb094a3d0484d22bb2
SHA1ccb0aaf5f0cb5ca4005b252ef67bfd96c5f35da3
SHA256eddbd4f29159cafcdc7bb3f4404236feaac238f948f188691e9dd8cc5e2a599a
SHA51275681cd4f190f0b54468b11f16d7ef4d9cbca51aa866c35b28bcb701c55505e2092dc39d18d42e9d099ed969b47818329cfb330aa50796c4c0edc43f7064402e
-
Filesize
139KB
MD5274343b4ba688ab4ed4eced908a62bde
SHA1bfbc678e7e1dbd974946630cf0e6d7bc8c9a96e1
SHA256e6c5555d0b0e1d9be0f540a29a882e85772fab45a00111d045c8ae29bfd6627e
SHA51228e8496fcc327a53d1fa05cb329a0cb7052a2719fcc71d2be4460b2132cef47ba429d30b2bcb4b717fd17845bf54c09a27469999765d6617af21d5ba2e0ebc69
-
Filesize
141KB
MD57efcb0943f4be6e275d62937281fbda9
SHA14565ce23295cf839b0995403483906e653efb374
SHA256c2a0671c21a839dec4ee2763d19c56742bbb2a3dc31e811a59bede4ab1f3d007
SHA512dd963ce35b673a43a597fc105ec7ff16796dbd564ef67db9c07262d11a662c01ec4102aa75c9b7cbf26f83591994306ff38a25bdab2823edfa1e79256ffa35b0
-
Filesize
147KB
MD569616a130c7fcecc8d4ebab5dc5e91b2
SHA153f2264619b09a395309857e1193ea9a412e6bf7
SHA25675de88acdff5ef9d802caca49755d7e7b5725f94dbf125167f069f614f027ca1
SHA512d4749bc286e3442c192c4f80149b67f80e28cca326b3e59559f9b41ad6be4645dfde1d2eb7ad2ed751e946c3193fcfcceda6c667d9e8fcebbcd47a277cde0495
-
Filesize
138KB
MD5cbf8d82ac15098b5a4c86870776a2d75
SHA1277c9e72ec907c9862686e46f3695f123ce98145
SHA2560bc3623063217ed1c0d056b658ae90a4f78878fe369a8862d31e7bdf9f8c3ae9
SHA5126aa4d661d8fde780df8f0b8b9666937d1d75ff32d785913a1cbd7bff12d60e2259c497bfe44c46f0eca22f2a85200e6ede20e4a2ecfc760e25d4c32e934ab9c6
-
Filesize
129KB
MD54ba0713d69d4f805fe84147b713f1e42
SHA1b6cfd087e64e2f02c95abab9048f85319dd0f899
SHA25655c0ea3863b06b30c9c4019ed23ddc295b0ef6ac1c4900abf90b2af8d19374bc
SHA5124be37f0686165d2f5ebc17701f25033114e1dd95cf7ba3e648ff84a6501b70164c10bcab296b2cf54dcc2aab42c2559ca07dc1e778d05b69057578380ec918d1
-
Filesize
141KB
MD5c68e5c3da25c05a4f1a8869dd040896b
SHA15ec225d7f0817116a73c5fadeb77175273f88c75
SHA25665327572808d2eabe3a223fc3ba82782c3d53905aafe725fce888ee39b0eee23
SHA512d2043b4067b6d37d723ca735d35dea10cf4c32c5410e567b343f34abf96085562bb608e42c6a0cfcb4c0c767418625c46fda2e2438233a01edf0e36952b7f197
-
Filesize
135KB
MD536c241d05775f3be825f61254f8f2255
SHA102eff7321fa8d5403c091183dddd016e0cb855bd
SHA2565e1bb9e2050693ac2496aead6afb506ba9cf25e15ec23baf530511d2b45c3472
SHA5127cd1d13b3123ba656130bd0797a05d269f833d21f9d5a0b53941d3fd888502e70a13dedbd32b502a07130a25f702954bb9bbbaee96ca3758dc59797a530a246e
-
Filesize
142KB
MD530e652a2dfa47d664c47d6ce72f5e205
SHA1a0d29ba08ddbdde48a2d418b7b9eea84ef8f5cd1
SHA256cc2c7c48813004fbb49bed6e4d064a9c01436e3d5773f193be095f85fc4cda01
SHA5127c2a8ad6ecdabab6dd84643231e1211bec1889df9e8333a3abf192737a6992a2d3c635b5d068c3d9ad22f514130e1b19445b0fc6c556ae680c1ab02b63bbb6d6
-
Filesize
139KB
MD521b0652874d99dba99536537d25edec0
SHA1cc3be021d5700d1d0aad4417a8272910fc31d515
SHA256b6f25e1506ead06684a9a52977097a40f91cf818e6e2414d5373b7dc17283499
SHA51297d904dc01d19ac82ddd298a23635730b2ba1bbe8815147ef8128d0aea4f1d2b2ecd2e45d283adf36a803aa5cb5dcbb631b6eec98463c2e16a4665c8bf9c7b58
-
Filesize
135KB
MD56ddc8b91f40edd6afc80dad3b687eecc
SHA1fcb4bfa248b1713f33e31c8320a64ed1557d46f2
SHA256e1b24c465734025063724709af071467f679ff2904831b7a758a4a61aee8487b
SHA5121bb8fbda1dfb6ff4eb9242911b92c1c20ad967b2a5272c028a04c2482af9e752e8c303972fd098cadbc8669bcb9753ee67298ab998c31f934ad1a6886d77d0ac
-
Filesize
138KB
MD522e37dfac7647df19277e490b56f5111
SHA16d3b05cb7385d5fd9010b7cd2a4318a95acd2654
SHA2563895a95bde2edb3c14ef9daa7434231d1d0f67ce57d4ace3e31ff858494b05b1
SHA51291a041782154a56c03798697a3508bafb7aca67d5f4f8d7dafa83262a51af880ecc98b2249baf5489768e02c5da849a5906dee50ce7e814ab8e4ab8996e41537
-
Filesize
149KB
MD5c28b75bc7a3a2652739b296e0225260b
SHA17c5a12dde53e640048f4cd6c49192d5377e04ea9
SHA256b029e17ab9290df7154b3556b98433fcc4216381db2f182138726a663155189f
SHA5127f21fa9ee6cfbf695cde815176b48732a8c832db36b4efefc7698274c9fbdc1619b3bd11e8ac98ce9e3e10eae6da9d89aa6759c7bc4a1b141962c7c411a8437c
-
Filesize
150KB
MD509400a3c9503ce68fea1a3ef79783bb2
SHA1ba7e0ed3a456a038e0209466fd4cb4621bbf965a
SHA2567b0acd26920e1cc4a2a20bfbf2e8b5d26011cfd1cef527af5ea8824f6b8e3d29
SHA5126d0aa757f4559149133a8ed082acd67461aaa2a2282614053852c1d003c807a18bfa93695f64eb0338e7eca22ba1ae967bfbe3539df281bab0011d9f93361a92
-
Filesize
140KB
MD58b1c2dc5a1bffa3c616937948c637e50
SHA18bda1d7a324fb29458d83cac188d970af3f6f75d
SHA256b62e3bbd8edcfec77a386c6165cb78242c375a85f21809a1eb75b0eb4a42cb17
SHA512f2599efa433c44301ec00c4dd6d176ca0e11a22a75b139cbedbea2953a99d6abd796c4ae889c285de3a9073ce6fa433a0e76d4bd23b2688708ae6bf5bd006406
-
Filesize
130KB
MD5653313856ed0f742401d124e7b1dfc50
SHA1dfd8a949672dca8ec48bdbcef1cd74a114fbcd15
SHA256e8dbe8daecd3f72dfd50bba995facf3494e247d5a9b59edc4024e5251d1e2325
SHA5125eb472cac29b62e5883cefd9fa3eaf2151aef4f68a7cba80591adc6b523372b63add546eec078a1a9931d32f11c8c9f39a95b703f5a2e4874df1a96907bc6e4c
-
Filesize
132KB
MD5edaf6a326b85ea6afd404e147dd3d815
SHA1e5c00157e32b2b682eacd915f32a05b605e75943
SHA256f8131a7843a0f17b53ee3dcbebc65db9f28f3bc4e900653eb323a664b5fbfe88
SHA51211430a489db5980219f6f344f5c878f86f737f4acfb0e343f209db10c5bf4de6f740162b2db4a789a63a1a93568d1180a8d9a51f5efc1b496b26e262b0281637
-
Filesize
129KB
MD57e9690def2a206d781f904a9d9b2c129
SHA1cba56b4e2332d9a41f4edf7811cbb9eaceded145
SHA2567851061dfdc81fb0be014681c40aff9133750cf4e7dae6eb2858c656ee646b8c
SHA5123b11e4a7b42f43a8cc306b8993c37485fdc4497fe519e5472ff39520a9e502ef1044fa10dba84bf0fdcf29f8c95a6c59adfe9596ff5f5bf9b848ac4e6da2b52c
-
Filesize
129KB
MD56d4cbe2fc07e3d22bf5a5be092f7c1aa
SHA100965e03d4e8bd279e5d73a10b4a9e8e18bef1ea
SHA256c6545071a29688cc2266b93faf1eaf808f3bb25a804c708926b279ba6c084e1e
SHA512630f4ee9e8606d9f513e2906fe3397ae7647e6c8ff0aa35370be4e7838bf46fb346866bbc8ccd5a58b1e66e100613b4689af21d3734bc2c7194909df5159596a