Analysis
-
max time kernel
94s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen21.26995.15475.25038.exe
Resource
win7-20241023-en
General
-
Target
SecuriteInfo.com.Trojan.Siggen21.26995.15475.25038.exe
-
Size
8.5MB
-
MD5
82edfa1b3ecde491c27dd45a4e1eaf2a
-
SHA1
efdb3e54f2713b11c75e614354db267750b60c31
-
SHA256
e2b875684ea73c67806091b51f2fb27b7f784f93435074f570a3eb463efc573a
-
SHA512
d4ae7de28c28d17211a7806ba62ff8869bbbdecff4fca7cd7cd0c44f757345cf2cdb637fa8561892865a5d35c61f979a013c67af60431967048ea72394de1c33
-
SSDEEP
196608:GrXsUMEtp66sGT9GZXv9WaQl+12YctXZ4m4dx0dZlt:GrTMEtPs+uFWNJnXZ4Vdx0
Malware Config
Extracted
xworm
127.0.0.1:14182
figure-cement.gl.at.ply.gg:14182
-
Install_directory
%AppData%
-
install_file
Loader.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000b000000023bbf-6.dat family_xworm behavioral2/memory/3604-13-0x0000000000720000-0x000000000073C000-memory.dmp family_xworm -
Xworm family
-
pid Process 3372 powershell.exe 5276 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Trojan.Siggen21.26995.15475.25038.exe -
Executes dropped EXE 3 IoCs
pid Process 3604 Loader.exe 2628 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe -
Loads dropped DLL 18 IoCs
pid Process 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe 864 AkOmnJfH02FH@912EDM#.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 5308 tasklist.exe -
resource yara_rule behavioral2/files/0x0007000000023c75-93.dat upx behavioral2/memory/864-96-0x00007FFF412B0000-0x00007FFF41914000-memory.dmp upx behavioral2/files/0x0007000000023c73-101.dat upx behavioral2/memory/864-152-0x00007FFF58BB0000-0x00007FFF58BBF000-memory.dmp upx behavioral2/memory/864-151-0x00007FFF41280000-0x00007FFF412A7000-memory.dmp upx behavioral2/files/0x0008000000023c0d-150.dat upx behavioral2/files/0x0007000000023c7b-149.dat upx behavioral2/files/0x0007000000023c79-148.dat upx behavioral2/files/0x0007000000023c78-147.dat upx behavioral2/memory/864-154-0x00007FFF40E50000-0x00007FFF40E7B000-memory.dmp upx behavioral2/memory/864-153-0x00007FFF54DA0000-0x00007FFF54DB9000-memory.dmp upx behavioral2/files/0x0007000000023c74-144.dat upx behavioral2/files/0x0007000000023c72-143.dat upx behavioral2/files/0x0008000000023c13-100.dat upx behavioral2/memory/864-159-0x00007FFF54690000-0x00007FFF546B5000-memory.dmp upx behavioral2/memory/864-160-0x00007FFF40F40000-0x00007FFF410BF000-memory.dmp upx behavioral2/memory/864-165-0x00007FFF3FFF0000-0x00007FFF40523000-memory.dmp upx behavioral2/memory/864-164-0x00007FFF412B0000-0x00007FFF41914000-memory.dmp upx behavioral2/memory/864-167-0x00007FFF54640000-0x00007FFF54673000-memory.dmp upx behavioral2/memory/864-170-0x00007FFF54610000-0x00007FFF5461D000-memory.dmp upx behavioral2/memory/864-169-0x00007FFF54620000-0x00007FFF54634000-memory.dmp upx behavioral2/memory/864-168-0x00007FFF3FF20000-0x00007FFF3FFEE000-memory.dmp upx behavioral2/memory/864-171-0x00007FFF40E80000-0x00007FFF40F33000-memory.dmp upx behavioral2/memory/864-162-0x00007FFF54680000-0x00007FFF5468D000-memory.dmp upx behavioral2/memory/864-161-0x00007FFF599A0000-0x00007FFF599B9000-memory.dmp upx behavioral2/memory/864-218-0x00007FFF3FFF0000-0x00007FFF40523000-memory.dmp upx behavioral2/memory/864-217-0x00007FFF54680000-0x00007FFF5468D000-memory.dmp upx behavioral2/memory/864-216-0x00007FFF599A0000-0x00007FFF599B9000-memory.dmp upx behavioral2/memory/864-215-0x00007FFF54610000-0x00007FFF5461D000-memory.dmp upx behavioral2/memory/864-214-0x00007FFF54690000-0x00007FFF546B5000-memory.dmp upx behavioral2/memory/864-213-0x00007FFF54620000-0x00007FFF54634000-memory.dmp upx behavioral2/memory/864-212-0x00007FFF54DA0000-0x00007FFF54DB9000-memory.dmp upx behavioral2/memory/864-211-0x00007FFF40E50000-0x00007FFF40E7B000-memory.dmp upx behavioral2/memory/864-210-0x00007FFF41280000-0x00007FFF412A7000-memory.dmp upx behavioral2/memory/864-209-0x00007FFF58BB0000-0x00007FFF58BBF000-memory.dmp upx behavioral2/memory/864-208-0x00007FFF54640000-0x00007FFF54673000-memory.dmp upx behavioral2/memory/864-207-0x00007FFF40E80000-0x00007FFF40F33000-memory.dmp upx behavioral2/memory/864-203-0x00007FFF3FF20000-0x00007FFF3FFEE000-memory.dmp upx behavioral2/memory/864-199-0x00007FFF40F40000-0x00007FFF410BF000-memory.dmp upx behavioral2/memory/864-193-0x00007FFF412B0000-0x00007FFF41914000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3372 powershell.exe 3372 powershell.exe 5276 powershell.exe 5276 powershell.exe 5276 powershell.exe 3372 powershell.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 3604 Loader.exe Token: SeDebugPrivilege 5308 tasklist.exe Token: SeIncreaseQuotaPrivilege 2508 WMIC.exe Token: SeSecurityPrivilege 2508 WMIC.exe Token: SeTakeOwnershipPrivilege 2508 WMIC.exe Token: SeLoadDriverPrivilege 2508 WMIC.exe Token: SeSystemProfilePrivilege 2508 WMIC.exe Token: SeSystemtimePrivilege 2508 WMIC.exe Token: SeProfSingleProcessPrivilege 2508 WMIC.exe Token: SeIncBasePriorityPrivilege 2508 WMIC.exe Token: SeCreatePagefilePrivilege 2508 WMIC.exe Token: SeBackupPrivilege 2508 WMIC.exe Token: SeRestorePrivilege 2508 WMIC.exe Token: SeShutdownPrivilege 2508 WMIC.exe Token: SeDebugPrivilege 2508 WMIC.exe Token: SeSystemEnvironmentPrivilege 2508 WMIC.exe Token: SeRemoteShutdownPrivilege 2508 WMIC.exe Token: SeUndockPrivilege 2508 WMIC.exe Token: SeManageVolumePrivilege 2508 WMIC.exe Token: 33 2508 WMIC.exe Token: 34 2508 WMIC.exe Token: 35 2508 WMIC.exe Token: 36 2508 WMIC.exe Token: SeDebugPrivilege 3372 powershell.exe Token: SeDebugPrivilege 5276 powershell.exe Token: SeIncreaseQuotaPrivilege 2508 WMIC.exe Token: SeSecurityPrivilege 2508 WMIC.exe Token: SeTakeOwnershipPrivilege 2508 WMIC.exe Token: SeLoadDriverPrivilege 2508 WMIC.exe Token: SeSystemProfilePrivilege 2508 WMIC.exe Token: SeSystemtimePrivilege 2508 WMIC.exe Token: SeProfSingleProcessPrivilege 2508 WMIC.exe Token: SeIncBasePriorityPrivilege 2508 WMIC.exe Token: SeCreatePagefilePrivilege 2508 WMIC.exe Token: SeBackupPrivilege 2508 WMIC.exe Token: SeRestorePrivilege 2508 WMIC.exe Token: SeShutdownPrivilege 2508 WMIC.exe Token: SeDebugPrivilege 2508 WMIC.exe Token: SeSystemEnvironmentPrivilege 2508 WMIC.exe Token: SeRemoteShutdownPrivilege 2508 WMIC.exe Token: SeUndockPrivilege 2508 WMIC.exe Token: SeManageVolumePrivilege 2508 WMIC.exe Token: 33 2508 WMIC.exe Token: 34 2508 WMIC.exe Token: 35 2508 WMIC.exe Token: 36 2508 WMIC.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4336 wrote to memory of 3604 4336 SecuriteInfo.com.Trojan.Siggen21.26995.15475.25038.exe 85 PID 4336 wrote to memory of 3604 4336 SecuriteInfo.com.Trojan.Siggen21.26995.15475.25038.exe 85 PID 4336 wrote to memory of 2628 4336 SecuriteInfo.com.Trojan.Siggen21.26995.15475.25038.exe 88 PID 4336 wrote to memory of 2628 4336 SecuriteInfo.com.Trojan.Siggen21.26995.15475.25038.exe 88 PID 2628 wrote to memory of 864 2628 AkOmnJfH02FH@912EDM#.exe 90 PID 2628 wrote to memory of 864 2628 AkOmnJfH02FH@912EDM#.exe 90 PID 864 wrote to memory of 5160 864 AkOmnJfH02FH@912EDM#.exe 91 PID 864 wrote to memory of 5160 864 AkOmnJfH02FH@912EDM#.exe 91 PID 864 wrote to memory of 2132 864 AkOmnJfH02FH@912EDM#.exe 92 PID 864 wrote to memory of 2132 864 AkOmnJfH02FH@912EDM#.exe 92 PID 864 wrote to memory of 3748 864 AkOmnJfH02FH@912EDM#.exe 93 PID 864 wrote to memory of 3748 864 AkOmnJfH02FH@912EDM#.exe 93 PID 864 wrote to memory of 4788 864 AkOmnJfH02FH@912EDM#.exe 97 PID 864 wrote to memory of 4788 864 AkOmnJfH02FH@912EDM#.exe 97 PID 864 wrote to memory of 2668 864 AkOmnJfH02FH@912EDM#.exe 99 PID 864 wrote to memory of 2668 864 AkOmnJfH02FH@912EDM#.exe 99 PID 2132 wrote to memory of 3372 2132 cmd.exe 101 PID 2132 wrote to memory of 3372 2132 cmd.exe 101 PID 2668 wrote to memory of 2508 2668 cmd.exe 103 PID 2668 wrote to memory of 2508 2668 cmd.exe 103 PID 4788 wrote to memory of 5308 4788 cmd.exe 104 PID 4788 wrote to memory of 5308 4788 cmd.exe 104 PID 5160 wrote to memory of 5276 5160 cmd.exe 105 PID 5160 wrote to memory of 5276 5160 cmd.exe 105 PID 3748 wrote to memory of 2420 3748 cmd.exe 106 PID 3748 wrote to memory of 2420 3748 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen21.26995.15475.25038.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen21.26995.15475.25038.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Roaming\Loader.exe"C:\Users\Admin\AppData\Roaming\Loader.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Users\Admin\AppData\Roaming\AkOmnJfH02FH@912EDM#.exe"C:\Users\Admin\AppData\Roaming\AkOmnJfH02FH@912EDM#.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Roaming\AkOmnJfH02FH@912EDM#.exe"C:\Users\Admin\AppData\Roaming\AkOmnJfH02FH@912EDM#.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\AkOmnJfH02FH@912EDM#.exe'"4⤵
- Suspicious use of WriteProcessMemory
PID:5160 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\AkOmnJfH02FH@912EDM#.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5276
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"4⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('ERROR: 0x0000008', 0, 'Please contact the developer', 32+16);close()""4⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('ERROR: 0x0000008', 0, 'Please contact the developer', 32+16);close()"5⤵PID:2420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5308
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5862f820c3251e4ca6fc0ac00e4092239
SHA1ef96d84b253041b090c243594f90938e9a487a9a
SHA25636585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153
SHA5122f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e
-
Filesize
50KB
MD594309558eb827e8315d0f201bbe7f2b1
SHA1b0a511995528860239b595774a1912e8f1220c42
SHA256fe14d1af436b07370607c6798c3eb15fc439837cc9cbe7cbc3271b07c9ed55b6
SHA5121163da89470b4f4f11786961d2b24a0c01939a174415fac8321f402d85c067572f18d7a8f43ec8abdcc6f14dc76f780ec36004ac34593988240f6a7642e60365
-
Filesize
64KB
MD5fc40d41aff12417142c0256e536b4a1a
SHA1237157d6af4ec643c4d8480cf3d332951a791cc1
SHA2560712d9412ea0d276c9a726765c072e00146f5aea853818d177b1a5b425839641
SHA512b7625a5325a5b184b1733931dc3857ea5c118d85a506875dcb6b195c2372723b9c6cf80e4688c0fc1383ea063c9d831dd4c0e10ec429dd0f363aa678b1c99f6b
-
Filesize
21KB
MD5a59cdb8c2e18e5f9c78a153a5f7d1081
SHA187e982d7f326c54eca5f807a6abdee37b1bfb693
SHA256c890c11170b631a674f340557339c90c2f2116c2d78c8ecfa91427ff121a5ec2
SHA512237d49de19e0ee6306390ca6ed3daa419c3e2536483ec5139b681c5a10af47cd00bb5ebe343c410960666d5967598a2157ce382661a7ab8815c3d066bf217317
-
Filesize
21KB
MD509d1019df17765997fc44e9cbd8f3a17
SHA1baf12379094586b5f5836a4029f46bc3f0ffacba
SHA25630d3f727c1b397a6b59f3f3e58e812b4ab8aea4088e5d2c59dd832c17965229c
SHA512cd1e6758852c04f4999e9037017ecd0ed6d7d61b1b1f156879168e43c0fc2c650cd9f06eaaf79f558a3a4a97dc2ebdfbc2f91493170202f87485177c75d2397b
-
Filesize
21KB
MD5ea331a567f2681f12e2667ebf165bcc9
SHA108ad1eec998908077c231e540951482acc26d666
SHA2567db2d8e3c7b9fd6da8093dd175426ed9f5e5134718592660ee15a48bbda321d7
SHA512aec7d1475b76acfc61efa0198328379b7e0aec12015e126e7133c7661e5dfff1eb5ad4c25758867ca879f2614b65a82cfefcb402af33d21319febd26abe5a142
-
Filesize
21KB
MD5b270f9d1756e10c6b715d5a857aeae24
SHA14ee30e5efee805c30b11003d04584556438aba45
SHA256b935aebf33146212ed71f85b7b25e2db98fdc2d94e94fb6306169ddf5e76c5d6
SHA512c322c829cdbe9a5974133965daa21c10ad104190275bf5da730c81492cad0daded18bb72a8630e037f93ec0883d401665d46c436d7c15735aad9c56d2176ea6f
-
Filesize
21KB
MD555c70289466fb22f744015137b535270
SHA10e96732dfa79ef8b836f08d30277659ce93391ce
SHA256fa7ce3865afec1cc640488a6c63d6245586326937f3551ffb63c08a9af27ee9e
SHA512cc4db4d66d2a51fbcf1668b52ae861d8694f9be3e808fd6de32b6392e85b0655872c6f07e038d868473c8e643d44770f30425ee8aec38b6bd42693b3a7b2aa8c
-
Filesize
25KB
MD5301b5e8fd36ea1e0b1820439121cb02d
SHA17f1b2470a7d7eba5bcec2196c15ea1970f01074c
SHA2563d55993fbaeda346059c41b27750ca79508ddf0e52ab880b9610f062c86ced9a
SHA512597b3f52d19cb92375241c56ea8a5ed9d0b9d75f5a3e3f6bf09ab064a82355292c9c1b6ae61ee854fe7bdae0ff32f5d1f17be784ab5e1772d9287c579217606b
-
Filesize
21KB
MD533f2eeb40f245d3114df277f00d3160c
SHA154ebdde675d1f921988a404deef6c52bcfd5ac9d
SHA25612bce3364b96571e89a8bec10ecaa3131959b40d2f6a8bec13086919020ee054
SHA5124ef5653c3f781f0d7b999c89a48172cd8c4321cb54f3cf4aa9f0c116821f328e408f8bc91fb051723a813f6c3c8c16f2944fef5bf4a7e016898ae8bd994ab9ce
-
Filesize
20KB
MD550abf0a7ee67f00f247bada185a7661c
SHA10cddac9ac4db3bf10a11d4b79085ef9cb3fb84a1
SHA256f957a4c261506484b53534a9be8931c02ec1a349b3f431a858f8215cecfec3f7
SHA512c2694bb5d103baff1264926a04d2f0fe156b8815a23c3748412a81cc307b71a9236a0e974b5549321014065e393d10228a0f0004df9ba677f03b5d244a64b528
-
Filesize
21KB
MD580f6510845d42f30d749735a13bdb403
SHA1bb791b8cc208d4cea1a689cbd7c8dfacede31a4b
SHA256da99f3f67fa9cba5b709583ca00a52fa3fa7d3e381007cdab7e3efab72002711
SHA512f08f0bf4d80b6024719bc90bdad72ad54ec8c2783426113cb644d8168cc34eda4cc1908ba314cbf785219674adabc67a87e105ccbcc51b72a4a4e897d3cbc2a3
-
Filesize
21KB
MD5bff05ac451a36f424bd3128e0ebf3761
SHA1441948279fcdd11f1a89b7697edc85a9237feb11
SHA256950e038433add25bfc1078202286545cb71b085094099cd0ee55e1d8ae618370
SHA512951253be619b0ad74252679b8ae2b08a5545af7b3cd83a0b5a5b4a8a32037f24ca9fb09c2e2c97db7070f541b54ce277fc2936ebd780769c12a89b52dd5c1708
-
Filesize
21KB
MD51827ede42ec548f117d0e5b0b8ebb62c
SHA104e9b71096e661920716318691378fa118521bb2
SHA25636f62388de7b5853d61f8e675eabee6a2b573af562d9510e60ff534b67c96e42
SHA51296b39c49c81a6f7503e9bc29a47337f52382629f39d5eb3310dbf6dc9a845cb64544ab243d4a17d0ebc11e5dfb235a85887792c5167ecdfcc029dab4004ac903
-
Filesize
21KB
MD59954502efe7958129c994c82222b30e5
SHA138a4965988384018b0f17a9c8c703fbabbf4b877
SHA2567ef40dc1fea2e48689eb32d16604d202eba0a9fd71666550c316588c7723ee11
SHA5125bf829df780ca4e8ccba41f598d88cf29e85fc92ad3c40f161fcd4ccd201c695bd102b4977de6027dfae015824b8a21d499b6bdd8f0bee69775eb23e7ae2dad4
-
Filesize
21KB
MD5f5716e905c45e27ab2bcde0f962c22be
SHA172a196c93f43d00da7791c9bc6334a93dc8c6e16
SHA256f0384cdc9015ccf808b27d89aab47ff62d77701f9d8ef96096a1b213204ef41d
SHA512fe43857608600f8a3450f52f5b4f6a69ee0edcafe26440257d064bc434aaf3f2d3be581a3b3985e45dc1919adfa438369f64b8f91d962d210cc2ab0b51f74c4c
-
Filesize
21KB
MD5a0773d7c8f56917a4362e110b75c9373
SHA1949c0860bdb1e2abc8e6d8d0ff66749bf0dd3f3a
SHA25658dcd77041d0485323b7d8f53f5e36bc25475ec33ce91a7888400a87e8e91d43
SHA51257b45e54163576db86044c9e33008dc904b20e03fdab7dc77e7a131837fe5dea6a880a60dd07f2f10d9d18bfe44e0a1dde518217b6c43370cbf8cf2e02a52640
-
Filesize
21KB
MD550ba37af65e4d00ac6780dbfd085d768
SHA138c05da765f9761180dc6cca17fc672733290b21
SHA25657b40bf135fe4e436c7abd5cefd6270eeec2cc1d349e708a61cfd03fec189f81
SHA512f99631e652fe42fd53b1e1e6fbdd25de2e0e200e400d4a8391ab03d52d64b0e693db8c016faeb36d15742a3474f643e0bfec7a7140d3ba99fcb81d4af4372fd9
-
Filesize
21KB
MD50b08b84cb09772d04d41e1a715dd093c
SHA100e675da42fd2a93ef8b93eef0c3533ccd70b4aa
SHA2566bd7d7c2b67d10240e214e381a5f9b6a017de372d7ef71e60157e8daf1d0c9de
SHA5121b47c5b5a64dfeb9136515cf63c49f0c9e1c84fc4ba3fc9036cd98dc2cbbfc011a319afe202c13d8f49f788cdbc2982496b9c6eb7b8e10f626e700e480b2fd2c
-
Filesize
21KB
MD54f948b56cbdd7977ec77e3b4f47c3fd4
SHA1182446bc0b0268ffe4cd0161e29c1dbfc8b3b405
SHA256336e1a29182d1d3235f99e5921515fb30bac5002d3ff42ad62e94929cc5775c9
SHA51257907103d6a98c09d1ab89e0ee278ab0935afb56ff52522bd1a4633a03fd6d520b20fbbfa42ae56d22d61d9cbeb3dd520d7a1dba57eb35d07a7cee801d10b152
-
Filesize
21KB
MD5ab3986b27d4f6eb2b304c20a424e5ea5
SHA15f7f012acb02fb1606d0c0dffd0f1cc88276b340
SHA256840d6953082758031ed604853447bdd3509b1e21bf80a30355db45f52a367c43
SHA5129f5918baf2f8f0997728c8d3242f2ffffaf06eb34e34e9f100aca396ab80611e42f77a163db2dbf27aa7755647d260f6a2529efed66d1c5b4278b7a4aa0692e6
-
Filesize
21KB
MD5bf645fafd6eb1bc32aa1a85ed96b4594
SHA1f161aee35fd4ba53ebed986c24a1ba7b3730fa5d
SHA256433aa6ac7f0a3c9b4af7e12d2b1d40bd0ec5dab0a58ef33940e03181a026ff5e
SHA512feaf6915fd298a16a9896fc960df2162b41c1ceb6c60748492bb20b89032ae47f03deba9853b2ee7a123d4e1872c9ae111b97ab960262d3946900aab57bc44e9
-
Filesize
21KB
MD5059b1d79231c6db4743c30a75f687bfe
SHA161946abf4707f46b0857c7ffadc196ff07627ef2
SHA2563c64042bee4c2561065fa324fbd49731db96b98efbcdeb550943be5429aab1da
SHA512abfda9f424a14c34a19eab2fe4c78aafe8f641207c40f79e47b17cb371d8d531809cf4718902ab56e3b05f4afc552e69e7f3c29b3ea0eca8614000f6b1936a26
-
Filesize
21KB
MD5b96b337576a9ee1d9f94d948947f87de
SHA1ebf032896e0c62579c2c17509e83f4e14c4fdc6d
SHA256129aaa574e775c8397595c435dce87303d03916af2a1df3365f218a41631fb79
SHA5121a4f965be375b152f2ef7f2a3e0998d4eabb6f10745c4bcd5f0c3b5e3539e9f80f845527bda2d63d2a7c10465cb5a28d736f018ab83295c36ac9c33f48b9dc2e
-
Filesize
21KB
MD573ba09f42200dd252a7a4230df1080ff
SHA1f5e11e12941af45cb8eea740f6706711a73a25de
SHA256da0027f68c0b6959de94bb4703c397ed646b57d52274b192845d2856446f2693
SHA512ab4c9abd75c5b39ac60647bc732fdd869b9830dffddb1a17885eb318398b16d72051da22b4923bf153c30d62b28820976603227d7a3e309485fb39d791b5d7ab
-
Filesize
21KB
MD575eb28ac8b5774c4deeaaf423af83a8b
SHA1109b1f115873f8f8a31e514470df1d7b86dc02bc
SHA256b356061a7dee95cc1adbb2a21668b5c1c6a16e1c9cea918904b895216032c08b
SHA512e4f03062ac6e2cd11dfcd56542ea981fd2a8b7d2095087b4830e0391f2bac7df5585548b2b2dd5101a4cc38328396eb776f6c1e96ad3355f2a2d838a35e05a02
-
Filesize
21KB
MD584020d4f64a88520f6987bd0c7fefb9f
SHA1f19271eff7665cadac4480482fb877a2a65d6d69
SHA256d90b0d12da527f92e2729ea15e19d7d2336bac4e7001e0afca3a03f1a9d3fb83
SHA5120df93f2d42a9f33105f23bd943ec7b9d95d1906fe353cf902c042c6b385110696d0c5f605b4aa4341e61386185187196027e5008b5ab7a42df3f4531b16a13ec
-
Filesize
21KB
MD5a776cc5105fd23c1fc68a122c8607def
SHA15b7b7defe72d9a2c3209a96430d62fe09e007689
SHA256b34171187edcdb6c3700919ac791b0ac9762058e7b5268d1b44e7428d06585cf
SHA5124b1f6b376428903751f046ade693808423306e8fb5925119751439320ba1afb6a50b097864cb436a7f704468af0d68458bcd354ebb8852e01bafde0cf9b9d264
-
Filesize
21KB
MD5799212a77a5b261e86a2c5f97da1044b
SHA1a8e027728295147758e6020c3a704f159b444cb5
SHA256493b4dcb9884ec9484b0d86a45bd16ade847e0f09e078875f820057a2da05b8c
SHA5129b25a24058029d41045229494ac4655ae39d111e572022e8ee17bdd6ffc3c2e63b3e9f7271500f41f10816423d5f83a4f906c8f99a28e29758266c356c290dc1
-
Filesize
21KB
MD5170c2d43735fa3ec9a5284f7d9e2716e
SHA18839fe6997626ef35e5b309f6503d8d9a64dc4b0
SHA256a1b4c73a3f9f1813ce70fc1862c3473a80a6119581e1e06f9ecd9faa70dd1443
SHA5125a5d5efc6737a01ab5d1cd8b754314e8118aca6b0153f96d09071420364f38a310f257b194d08561a45b087cf073f7c4cca57850bd98f05451930cbf7d64da98
-
Filesize
25KB
MD50aac3d5c1d97c790179bf950ca75a5d0
SHA1f99529201390154116b45ad97b845d59fbc3aabd
SHA256950276bf1c7408dd30ec8a4f43f5a65420d345ffd2601e6d149d30039e79d976
SHA512d646d0c2668b68b443238e50d35ea3c738fceb1d55bcb786b8bd78ddbc15c8ada9546cde259db75c3bf34a7b50915248bec52d50e6ad98be5dfe2f59bdd69c85
-
Filesize
21KB
MD53c3259b990e2296aa6e484c7f6cacc29
SHA1cbdf84f5c0fe3fee3e449f5746c052f45015c6a6
SHA25607050ef042264a3c015b4b24a3609975ea70ea6b0a1ff96248b71674b67bda08
SHA5126d1bbd5fdc254240dbfdc39fcf91573c1c9dd851eac5a52214e5903d8375a9a2134d9df5df5297f1c73a99dd24306578d778cc5c3a28c87d08dcc8c819b28c2c
-
Filesize
21KB
MD5a5beeefb5489e73baaeb188e12fd0c35
SHA178283750e376da79a8e1733f4c3dec542b6b199b
SHA2565db171401ceb22573bed41ed6165ca52b9fa85cb3fda5c56c7ecd9fc58e69a80
SHA51282f0d3ca9085fa24f66926c668b12922f9aa307bd2e05c95c8d6c04e3e6312ae8281a7a2f6acd71f6ff904ed9a86fd0ae6532eec8bff053331fea6276c4d291f
-
Filesize
21KB
MD5541eda624ffdad82f13a9d27b879d4d2
SHA1d457c5a9cfd7061a771428b9f81ed6951f74f3e8
SHA2563ac1f5532746a357f53cf0f990471cc7ce20773f9b980a410def43be923591c6
SHA51227246cf09933f24be03971e718fa0649476338aa7c7f1c57a8ecd57545896a05ff5e665f907c4ddb54a7fac8070a5adbe61c15537afd6c9024bafaf75e62a110
-
Filesize
21KB
MD5506bfcd82cf5974ec3a84141b0d39faf
SHA15d7af25f8ab532e619fd718df53c2c809a04f87c
SHA25666da920d3714c8edb95040b0d7b10820d4b2cbd2ae069b3bcc5cbbba0dd921c3
SHA5123a9632935584de7d5528f7b70d74aa1ae7390075762020e9d7b50ae0ba0cb5b8c4eb39b548f063f195e68252736c01412b1d36b9c76205f3855ce6bfecb127fa
-
Filesize
29KB
MD5c2b0fe23853cbf21c418dd4665f11fb2
SHA156180da97997da8ec2a3ace346b59b2591f4a691
SHA256f36c45c6e97435c37bf520ac394a230dbafbd2b97f2d7c05548f39c16668cf8d
SHA5121508d4ca495431e74b506daaf7669d0ea48da9216b13beadbe8285c0cf227ab8165f2b3f32d421bc082135aebf508f7a9dd66e11770edbcbaf7b5455c985d1cb
-
Filesize
21KB
MD58ded0c3c86104bad38ae4719f73c19d6
SHA149426b52db7a3a958ed1dace2e125b83bc52de04
SHA2564bd8d67e3ebb6266950cd7f362c5cee54cefd811ee3082529f7082c0aa174aeb
SHA51283a29ee40e3b00dae2e00f08828951973aec795e2963ed0152b3043685c6cfad10100ffc08e30a6765882ee6580adb7c44f2cbae7c4773c13c529a52dc8c87de
-
Filesize
25KB
MD5ab37f2c59a99e4737e414b2b51e354d5
SHA12569d71445c9f74f34eb2bc01a3018e396970af5
SHA256ef524aee201048dcaca499e5b69dc93432972136f77002889fcfc1f6573f83d0
SHA512b10c42eb3eb56052b8d4fb9549958db1560a9dd7ebb8c32eef4e238337d881fc6a9117c53046b247adc986ee17250338dac056bb2d98eb060acff011c18422f4
-
Filesize
25KB
MD59c62ba6e76a0b8c01a9e998b37fd55fc
SHA1c2f266210342756af205285f96802e4b29a0416d
SHA25663bd54f9e4231ea9b7ae5991a328a3581433abb02128f12652bb21592c9e4838
SHA5129f238892c8be3281f9095333b0645278700d951b9756618c46e38cd36849ba37ab5ba9462d1c0f250d72bb193bf09a7b062da2308e83e8b7d6d8200d9de5b1d1
-
Filesize
25KB
MD556594b1d7cffbcdaa52add243efd9d9f
SHA10879b27583c81a970b0fb9007e8c3262c7de6879
SHA2569eba5f87d8bc12edb0931f9db799891afaf8326ae9a3a2926725b6456e1aa0ae
SHA512a326205f6f7e4073c0cc098b80670f3e977559de0f47c6d0b8d3451bfc855fc10eb518ba4365ebefd5cf2d008780427ed43cb7a98fbf9f1750e17bb6a74773d3
-
Filesize
21KB
MD5da31c2eb8ff52a0419c1885f2d2c87cb
SHA11a3746a81b76c0a9e0a09ff5d12ae4650e094c69
SHA2562da6176fc5272c941e39b86b892a73109a763697930de97431903892521f359d
SHA512550efdd5d1dc390bba8b0a922692fae6086523275e76b77ee130b4838e8310aca00aa3cc502f0fe99d5a5532b15781a7391419ebb59ae6ab5f4603435307fbef
-
Filesize
21KB
MD58301548a4eae2c8fbcbc69cb76944709
SHA1e3303d54f45df85002c25eec547e8297aba2acc7
SHA256cef434a44b9ed6833e3730d00e7c3b2094628964840390891d402e8c60716bd9
SHA5125099c6f0a5ef0306009cd60bd0a4780a0bb1fdf74d48a85287e9c40463414a90e2b3f8ef21be14e2345dd5b3a820bb375f554c32eddc8594b8b5eda5641ea9af
-
Filesize
1.3MB
MD54713d24239cc8d1d559a81d5ceec8078
SHA1c13e933efb64c4edfe6dcc5e9ae18efa340a5ed5
SHA256ce253684a67e1a46a31a08d006e413ddfe6e8953bc758ca3abe771d0771631b2
SHA5122dbd9ea146cfcf3cf0df476080195ab5f98bd455c6912d649da356408c139058ec88c610b9bc3ead907a2d93d51c21a709908e6da5f4c3576021ea07b6115ea9
-
Filesize
114KB
MD5caf3c0fd452a6cb4f73617e41310610c
SHA1467cebe9b71cee5075961269cc97b43e2d5f82ec
SHA25673143d9a21bf1cd26e30993136eee41b54f5f0f65d9f3f4039d3d1097fe284de
SHA512059d254dd926ebf0474e69c7e8a15a173080ab5c8806e8cebbe8a8d99cf92b5404211c4081f17adb71b0a44b7a62d14c5d725b30b49757c793d5b71402c4c40a
-
Filesize
1.6MB
MD58377fe5949527dd7be7b827cb1ffd324
SHA1aa483a875cb06a86a371829372980d772fda2bf9
SHA25688e8aa1c816e9f03a3b589c7028319ef456f72adb86c9ddca346258b6b30402d
SHA512c59d0cbe8a1c64f2c18b5e2b1f49705d079a2259378a1f95f7a368415a2dc3116e0c3c731e9abfa626d12c02b9e0d72c98c1f91a359f5486133478144fa7f5f7
-
Filesize
29KB
MD508b000c3d990bc018fcb91a1e175e06e
SHA1bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA5128820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf
-
Filesize
221KB
MD5b2e766f5cf6f9d4dcbe8537bc5bded2f
SHA1331269521ce1ab76799e69e9ae1c3b565a838574
SHA2563cc6828e7047c6a7eff517aa434403ea42128c8595bf44126765b38200b87ce4
SHA5125233c8230497aadb9393c3ee5049e4ab99766a68f82091fe32393ee980887ebd4503bf88847c462c40c3fc786f8d179dac5cb343b980944ade43bc6646f5ad5a
-
Filesize
1.8MB
MD52a4aad7818d527bbea76e9e81077cc21
SHA14db3b39874c01bf3ba1ab8659957bbc28aab1ab2
SHA2564712a6bb81b862fc292fcd857cef931ca8e4c142e70eaa4fd7a8d0a96aff5e7e
SHA512d10631b7fc25a8b9cc038514e9db1597cec0580ee34a56ce5cfc5a33e7010b5e1df7f15ec30ebb351356e2b815528fb4161956f26b5bfaf3dce7bc6701b79c68
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
26KB
MD5fbb31cb3990b267f9c5fb02d1aa21229
SHA1cdae1c90d80c81927edb533fb5850c6efd541812
SHA2568e2c5b74031b80a20bd16c149a389e60b3845d9719d97e030c42e9718cc08937
SHA512af71f8be59d062cb4d095772e30ba63d0fef1e8285d549d7638c009cd67a2610f6d07e486e75f3eb1d94d8dc349d92b996f3ef83bd1d1c3617ac801d571be439
-
Filesize
645KB
MD5a7a7f5664333083d7270b6f6373c18b2
SHA1f8b7729e18c1dad2974514fc685aaa05ed3ff513
SHA25685b1d4d0b7db01ecb9b8c6b1b68ab122e0807eaa607551ba08849fdd957b889a
SHA512cd9a0d4a55a58f18ce565f1525339e84f22496b6264f1fa235310ff6fa3531a0b24fe6e90bdf21b8f9ef2556e726480fe3bd7e69d737f5a580d6bd3e0b8d799f
-
Filesize
1.1MB
MD53b337c2d41069b0a1e43e30f891c3813
SHA1ebee2827b5cb153cbbb51c9718da1549fa80fc5c
SHA256c04daeba7e7c4b711d33993ab4c51a2e087f98f4211aea0dcb3a216656ba0ab7
SHA512fdb3012a71221447b35757ed2bdca6ed1f8833b2f81d03aabebd2cd7780a33a9c3d816535d03c5c3edd5aaf11d91156842b380e2a63135e3c7f87193ad211499
-
Filesize
261KB
MD548a942c3930a1fee7d4404989171f5fb
SHA1b6ea31aedbc3d17136b7c7015f687020dd8723d4
SHA256bc52593f047cba026641ebd758133551289dcca17817c836cbb006d4529d7aa7
SHA512dcea8380f7c7a38cc827bd685cd76ac4d3dc2635f42675f5afaa8ab9e07fb72fc5f6e6fc246bb82f88bf8459caa09f4a0dd6c0d145e245986cfd15d0a49d1c59
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
8.4MB
MD5854c20ac6ea6e2b964a5ca8205f9ebbc
SHA176e9da35d8b0f3acf66a5d4b174242c251957a01
SHA256953f7b4a94c68264f7da2d473b26e37c08cc68de3fa8fc8b6c88416e8cc7954f
SHA5120caa40a8888538840d831adda020f7a21800c01da611c46f8c53515f82377d638e972645eb61a0c8ef56244d9df73b1c3a5367175d9ebd78db10825db9d0e38e
-
Filesize
85KB
MD53ec7b8b05f5e7c605b78d59a41779ec9
SHA123b43d015f1ccc0d6e9b0209654d2688512eda8a
SHA2566c2b376872b8b966ff746a1d7a4092c9d70f7d070bd0e27d8956dbf9999d76c1
SHA512317812006c4e4d4cda69138d91c76fee330301c0f15523ed2e51746b55729b071ef501e85f150e54b3b573c5f044129b87bde126f1d254de59ac710aa7a21069