Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
15-04-2022 12:48
Static task
static1
Behavioral task
behavioral1
Sample
292858e48a0ee113c82c84c33838f65b812b95590e9a0493d5a3a55d25f26d83.exe
Resource
win7-20220414-en
General
-
Target
292858e48a0ee113c82c84c33838f65b812b95590e9a0493d5a3a55d25f26d83.exe
-
Size
6.1MB
-
MD5
d6ee37f2d1136d86360f7565e2f7199b
-
SHA1
6da1269c295ab990155a25e83540113e39d52598
-
SHA256
292858e48a0ee113c82c84c33838f65b812b95590e9a0493d5a3a55d25f26d83
-
SHA512
abac01642860f802f98be889b4085bb28be11b7fc96d21034234072dea663eda9fc43caa8c613a8bbdc895cba23e8ac831409e7b86e2b2e4b0397e4dec43fb6a
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4348 created 4052 4348 svchost.exe 83 -
Executes dropped EXE 5 IoCs
pid Process 2628 rfusclient.exe 2340 rfusclient.exe 4052 rutserv.exe 4708 rutserv.exe 4680 rfusclient.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 292858e48a0ee113c82c84c33838f65b812b95590e9a0493d5a3a55d25f26d83.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation rfusclient.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation rfusclient.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation rutserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation rfusclient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4052 rutserv.exe 4052 rutserv.exe 4052 rutserv.exe 4052 rutserv.exe 4052 rutserv.exe 4052 rutserv.exe 4708 rutserv.exe 4708 rutserv.exe 4708 rutserv.exe 4708 rutserv.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4052 rutserv.exe Token: SeTcbPrivilege 4348 svchost.exe Token: SeTcbPrivilege 4348 svchost.exe Token: SeTakeOwnershipPrivilege 4708 rutserv.exe Token: SeTcbPrivilege 4708 rutserv.exe Token: SeTcbPrivilege 4708 rutserv.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4680 rfusclient.exe 4680 rfusclient.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4680 rfusclient.exe 4680 rfusclient.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4052 rutserv.exe 4052 rutserv.exe 4052 rutserv.exe 4052 rutserv.exe 4708 rutserv.exe 4708 rutserv.exe 4708 rutserv.exe 4708 rutserv.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 880 wrote to memory of 1532 880 292858e48a0ee113c82c84c33838f65b812b95590e9a0493d5a3a55d25f26d83.exe 79 PID 880 wrote to memory of 1532 880 292858e48a0ee113c82c84c33838f65b812b95590e9a0493d5a3a55d25f26d83.exe 79 PID 880 wrote to memory of 1532 880 292858e48a0ee113c82c84c33838f65b812b95590e9a0493d5a3a55d25f26d83.exe 79 PID 1532 wrote to memory of 2628 1532 cmd.exe 81 PID 1532 wrote to memory of 2628 1532 cmd.exe 81 PID 1532 wrote to memory of 2628 1532 cmd.exe 81 PID 2628 wrote to memory of 2340 2628 rfusclient.exe 82 PID 2628 wrote to memory of 2340 2628 rfusclient.exe 82 PID 2628 wrote to memory of 2340 2628 rfusclient.exe 82 PID 2340 wrote to memory of 4052 2340 rfusclient.exe 83 PID 2340 wrote to memory of 4052 2340 rfusclient.exe 83 PID 2340 wrote to memory of 4052 2340 rfusclient.exe 83 PID 4348 wrote to memory of 4708 4348 svchost.exe 86 PID 4348 wrote to memory of 4708 4348 svchost.exe 86 PID 4348 wrote to memory of 4708 4348 svchost.exe 86 PID 4708 wrote to memory of 4680 4708 rutserv.exe 87 PID 4708 wrote to memory of 4680 4708 rutserv.exe 87 PID 4708 wrote to memory of 4680 4708 rutserv.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\292858e48a0ee113c82c84c33838f65b812b95590e9a0493d5a3a55d25f26d83.exe"C:\Users\Admin\AppData\Local\Temp\292858e48a0ee113c82c84c33838f65b812b95590e9a0493d5a3a55d25f26d83.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\install.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rfusclient.exerfusclient.exe -deploy3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Roaming\RUT-Agent\68001\C15DF57D66\rfusclient.exe"C:\Users\Admin\AppData\Roaming\RUT-Agent\68001\C15DF57D66\rfusclient.exe" -run_agent4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Roaming\RUT-Agent\68001\C15DF57D66\rutserv.exe"C:\Users\Admin\AppData\Roaming\RUT-Agent\68001\C15DF57D66\rutserv.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4052 -
C:\Users\Admin\AppData\Roaming\RUT-Agent\68001\C15DF57D66\rutserv.exeC:\Users\Admin\AppData\Roaming\RUT-Agent\68001\C15DF57D66\rutserv.exe -second6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Roaming\RUT-Agent\68001\C15DF57D66\rfusclient.exeC:\Users\Admin\AppData\Roaming\RUT-Agent\68001\C15DF57D66\rfusclient.exe /tray /user7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4680
-
-
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4348
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5e51a34c8198ba9a59e53f0503777e75b
SHA183d93b4a520b08efa14b55c80c5db8f85d5ca9e4
SHA2565810c1f2453156015e43dc8844b8463eaa47be877c07834e67723815aa60c5d3
SHA512ed8c7684eeb24afae4f8cffccb870192e5ecb918843f2530439398d5cee783cafd375f851c0334ca6f1272196af984e72e3864a388f243cd6d82449151b722bd
-
Filesize
37KB
MD5844e2b8e4ad580ff845402a6b3b88846
SHA11e76d2008eee1a896d207dd9c3c1a504dc9d06de
SHA2564d646a6af146c05cdb4644f62605cb40196595e6ed3aabcaf92e7d081c4eebf1
SHA51201590c09f0cb43e1ccbc27b591a06ee16485a176439512f121a1b29d1fdc8ba9eb216a26c619abdd3ca8b441d80bd23ab165cf9f36e7ade0fb57f60645ff94ed
-
Filesize
37KB
MD5420f3450e1dbf4ecbe48125bef79155e
SHA1eedd628146fe8722aa8f5a9cc9a84ff86bc403ee
SHA256ac397a585dd2e48f8ee01d2e50d4d87e138d24d6f6f7c442507feab796c3a9ed
SHA5127b14bccb0daedf62186fafdb9224ce5c96b493950e4c7a9c6c9d330831c4e660efa77bf661a39bcb5b93014a9c3a7f28a633c4f6a1618b2a7ea551e811950857
-
Filesize
52KB
MD5d39727c9980021059a0f2073277e039e
SHA1a59b8f6d517741a8cf8c88cbb9bc7ddfa8879f75
SHA256f1900d97610996e7a71c354f3899c26324e5a5493374a4d697558e4c4f669257
SHA512f0fa8eed8f9b72775c8c574edb4299cced7e6ca71c3cc907d1914d3cd6a86987fc7b031960b8d496030ea9b2b4eaecddcf5d0f5ee6236514e0d21232680e9c15
-
Filesize
52KB
MD5ab723f51a48801456d39bb48396beada
SHA1a721d0afa24cbfb99c97431be42113426ab6638f
SHA2563db7b110d7df4402b0ac207d28debb735cfd476ef42c2f71bbba5108a0b96da5
SHA512b5fe82a2d00f277bf9fd75fae659a75e7f3aeb6629c6e034c7d9ee477abcba89dc4661035310ffdebd6aa3115c79c7621bf42af43b32568d5408d229b4d285bd
-
Filesize
55KB
MD500c905e8da73cf386c210d28e3797f6c
SHA1512b1c68ad520bbd77733cf71e376333c509c183
SHA25683813ca174f76a126e05f6cca58be24ce2a48a2632e9bf6bfa46a353d01111b6
SHA512b302035bd8379ddc18be49575b92cfd0219b6847cbd2d9acb9d6faf26fc0b0774bfae11a599e52266849663c5adf3de2c217ca5214339bb5400daae5ac35363f
-
Filesize
49KB
MD5722fe688f60b4649265f5177a8c0c0ca
SHA19532e0de2b2d1eeacc19f15602904ae14231df6b
SHA2562e551329bf8cb93e665c17bac916776d75091ff190b7ccff8a48fb0de0d582b5
SHA5121248a6e94c1f75e398096f2d773822b2faf4e18438628e4874e4fc143bcf8adfc59f145de5838e1d9127795ab2de443ba6ba149e9dac3958d534356f98aa791d
-
Filesize
52KB
MD56396e5ade56e4f45c4f59ca210385f58
SHA188f8778e8f960001ee558255e22418d8ea17446a
SHA256fe57254a0c2a3593d618bea7d43074c7b637ec3021f0b51073c0d95f65bae882
SHA51258d0b3a45249338b41affbdc81cf01fb68e1f710b1f378bcc4eae58d6e8e8402be0a06c9b4e74a4cfa1d2631ad9281921a081bf597b24f12f7ea2a4fbcd5d020
-
Filesize
56KB
MD57c2276331e1e744cf702858fbb041039
SHA1a5c7c0067a96b7e8cd11d8b3c205494147a2da4e
SHA2560b05f6ada359e0c3295d32087874bf2888e60400fe3a9ec4d54a849031bfe915
SHA512e3fe3aafeaa6f295c53b2317aec8581a61260cc76072d814b913084b740397c3d77df4a63acc677f95aa6d40ff70fb52041432f903a128d5b54184c085d7a16b
-
Filesize
54KB
MD542b83b0d09167cb42582b5f830b44ebb
SHA1a9d5d467643aca034a983ebbb595d2fedd19062a
SHA25656b73a451ecc9d3f99892b397ef1b5006b6f9296765d01fbdc7fc3d979400bbd
SHA5122ef138d4e45554d594abbce7a2987fb17eeac63c607815120d4a415b7c3e3280a84b4068429d7743523c4366da0b5aec73c8152ec30185b3b18f14e39a22a781
-
Filesize
46KB
MD5516352f3ff5dc96d8cfbd6abf069aabd
SHA1b52524bec89b956fba232d7a72205e63e029d5d0
SHA2566387f12ff599445016b7f5b191170f077fe50c8b986a7d9650abfb7ccb6377f5
SHA512c42e0901731774a15a65c047d8b05551d789e130ac17b53e899bb88f9d6a6448050eaa45b47a2a4cabc333cd36a863cfc5722cb76aebe04c73d9617117f0361c
-
Filesize
54KB
MD5dfcc06cd5e145a631806c1d011ad0fba
SHA1d53236889246db20ad22f4811d24c7257c9b635d
SHA2569848f250729fe0a81118aa027592ad0ef98d8428e808fa7bafa0903a93c4d94b
SHA51235767772186b91f502698ce0fb7a25db3d9718fa0faa58f3f67fe711f841f95e14e89cb6bbbc476a29e568a93d670b205b616e07508c12f800d0e20cd3831e00
-
Filesize
42KB
MD558319662af8f62390737c9df99f23dba
SHA119d0549605e76343555a3486aac9b072fe47e878
SHA2564df73b25972b4388f2ffe70b88d4cfc739aed58dc0a72163b96cd407eb8d4388
SHA51297fefa76088474a208e777026d6c4022d8490fe6773b8ca5fe07eaa3ac732a69bdc589c6d4f34cd6d4a41ba73f628fe8160205d4695559f81e6fa19a02a6cc16
-
Filesize
40KB
MD5dc4e41d98050548860bf92ca11345962
SHA1259fc2aa4622e202799bbb5d352e57da47a6988f
SHA25687ada3f861a2b04e39f633218b791cc9e08200dafe96b85538c2ce402fe1f0db
SHA5127f7d18668248c5a3b5b7aacb5616c6dc0e562b8467a9a27ddd021690456b685af3c8dfc0b1fec746ccd799b5a9f41b0968628864087d1b3dbce79b52c49382b4
-
Filesize
51KB
MD53cdf55746e6889e8fff300e54a287bcc
SHA157c38147c92b86f7bceeb4dbd9ad1d720410b07d
SHA256d3014f26e0b5bd84f694c8ad18f0de48ce3cbcbaa2f649070f161c64702cae3d
SHA512df2fe1b2f16238c1de4b3982ed31cca71490eba41fe9588864b3a58f0f5ee8bf6ef28a63528e7bf06524780d19812e8cd3991472a82ed5559a6a32146c04830a
-
Filesize
53KB
MD5da9d399b473ccff29e6e8f9a5723cbfb
SHA1d878b4206aaf64384162e96673845e913db34c69
SHA256b885b4e1e7bea7c202c71313a60774143dd7cc18d1a0ec8412b47d53016ea3f3
SHA512893122ce6550dddd793668ea7ff68764ca7676de34d8385df42f09eee50e0ce09670e6aca1245331fb18589207b3870b5564896e4d65eedc229648d985314dc7
-
Filesize
54KB
MD5119f5f60b0d87bd3a9e34eefe510cead
SHA107835dce1a48d571d1e8a5a4ff1f47f44bac3992
SHA256b9793f0ede71f259dc242c926cdc8f70fdb241a8a0f22c7206fb51b7e0a43002
SHA5125596ab114a4bc5edf98db65e95e2daa367a43034793b07877e3533e98822721ee3293a00760c2367fd3088df681fa0397e1a263efac1fd6850a1e26670cd0678
-
Filesize
54KB
MD518e6affb3bee46aeaf86efb1977f358b
SHA10df0b1fb0e3e59bc2f52d2a2bdadd29bf0adebc7
SHA256c6e7b98ea6fd6bd60d26c46ba6432000cf4c47c5ba137fb63e905cfc2b3d36ba
SHA512fb6428024e22b48c0a66f556973fb434a9a33593942541c1a42d175d0335a83152d8247f875138be014c5f9c98167003498717029eb36780cd7a374a3f59e6e4
-
Filesize
151KB
MD5435d9e1fd4b87308f0f91da25530d4ec
SHA1a9b0c513b930f4c2ef86cb75a8de1fe16eb6d996
SHA25605040b677d7697b4f97da173c6c07146d3bde327833fd2022bf2cb67f90389ca
SHA5129a84f8e75c855ca4d3892591e4d2ed4d37368d8ed8c28fd48093534a8283c21a483ab50d930adc10d8dda5fb25338dd247004fdf08dd9f60cf038a0b61fba33f
-
Filesize
967KB
MD5534d6f176f6cbc725f9e7db8028cd3f7
SHA135b53f2e344f4a908a551409d018a91dc58100d5
SHA256e713f288a46aad762f76c945467bb3ea7c84edfc56cec1c4c1b40d9f919bdcc0
SHA5121fc1bd8d094d458541596322588750ecc66a2b3f809b0361a5c104adf72972c4bf2f08e4b58f347e56afd4e8019942ba0ba3346a85169958de1cedfde5a15849
-
Filesize
54KB
MD5542fb52c74f0f92c5cbe734cf75145b5
SHA16bca28849913bf4f61b3d48791737a00f9718ee7
SHA256c157ce11631f26462c764bab24b0700f019a2213b36a92002d886d156afa7b03
SHA512ece3518e30d4ddc210afe82751f4b011d2d67fc8130f619656590c45710e3ac11674026445a33e880d13f60a6156c79923badff8d5f68d119d68ab2728dd7c9d
-
Filesize
52KB
MD56b46297240dfc309a99b133e94c916c3
SHA1ce4f36af4cbf6ebd15cf6e0e6dc8b72e61872027
SHA25688f45f3cc9999a1e35967cd7f33d2d15c0c31b13336fbf93e754e1af8903d9c1
SHA5126f808e7627d4d2ac06ec07f55ca72277c12a80e14fadd2822174349ebd0d5398dfcd73c301a4427a64db59b283f3d04a74be72f96e613db1540aeb9859af338e
-
Filesize
54KB
MD58a4b15f09ab2301fdbf99acd5274bf88
SHA188bee09f9690dce0f323909d53525f60e076e854
SHA25600d3aa64e2afe9b92f2d13255a86eee0f289d9d257229289de0e2020626f0508
SHA512f2066e60c588b698f3d2d79d19a25b76354c4857df1eda51d60d1371c5a32a87211a8927c0817ef1e2a8ca1d50230516a4521be6e0b40c7c301d93d894548e27
-
Filesize
386B
MD53cf8a6bf58258be3e07c6eeffb4a0cdf
SHA1a129812b6086d8d40bf5b3894139fd5a47d66a11
SHA256da6520721eecf137e4879df0318b50f2c3b305f2859473d9d7981b06a4f83634
SHA51293e5218b3f116c8e1b691780d5b08e04f87f5504a32607a4590cee4c76ac92467fed8bd5f25bd6f5ec8056cb890fc62410cc868b03bafdb38b9f1b41a57255a3
-
Filesize
86B
MD590b15937ff9ec75f7016e171bd1261ce
SHA13fa80c58e8bf6c3ab356047cfaa14187328c3732
SHA256eb35f14c5463a76bdeef12596c09894e137cd40d0998d2a717ae2d1f572bc37a
SHA512993aa4eb890a79c469849cf3b55e474def3b14beb72ca4785de38976b753a2aface4bb6b45515f9d7cfe2a99e11d530f694a2d95625c3bb16ae70740509ba95a
-
Filesize
25B
MD59b7ac054975f8f7b6fe9a41a18e2d6e7
SHA1d820008d3732f37a7e4030c4bd414e3764de1af7
SHA256815255a94853b2677f84ad15ff188f66a7e1ccd700bc7bf94afa05e2f4992255
SHA512806d3161399eef58c87e7a14b850641c025bd0bfd98b827a16c2323402fc67a11db0b6714887d4a3be029f383ba9bdb75993b86d406208bc295b63f15f969cc9
-
Filesize
1KB
MD5ae0aafa86d7a9428685afa338fceeec1
SHA1adc72a602c1fc177d475803206d194aee52d2ad9
SHA2560c3194e1584a03a94e74142fa4106ed059e597015c8ae5ced1572930c0c702a1
SHA51288a55ea2ed643cdd88588406ebd208140d7e5f04378a68e5860da9ea5eacb5c4a2df1144faf6082644b6e12b0b2dedfa3edb2faddfb87f7e2138c7925dd25b5d
-
Filesize
5.5MB
MD5848a53dc549be0386e5da0f49700c389
SHA1e918192d2b5c565a9b2756a1d01070c6608f361c
SHA256faf0c5e4ef7dbcfd863377c55a4d1d87a3f6a58c13a8a9882e11012066f31976
SHA512fa3ec7f48ec441c1e68ca74d3b8436838b5a4fd5f767fb655d5ba19e82d5a7cc5d9706ae5e3eb53334ff1dc03ce589fcebcf4bdcb7cc27f69bfa6e3eb24f9633
-
Filesize
5.5MB
MD5848a53dc549be0386e5da0f49700c389
SHA1e918192d2b5c565a9b2756a1d01070c6608f361c
SHA256faf0c5e4ef7dbcfd863377c55a4d1d87a3f6a58c13a8a9882e11012066f31976
SHA512fa3ec7f48ec441c1e68ca74d3b8436838b5a4fd5f767fb655d5ba19e82d5a7cc5d9706ae5e3eb53334ff1dc03ce589fcebcf4bdcb7cc27f69bfa6e3eb24f9633
-
Filesize
9.5MB
MD53c5850ef227bb206e507551c471ee8df
SHA18943aab98043f28918a0c8d31d7a0076b5bffb1c
SHA256a803bd4522ec8804adf5e548b2ffc9e3afa7eee179d96945de1a5980b5616445
SHA512aa94ace9f008eeff257505239a7a04eada728461e7d732e227815c880b6ec758b63b2dc576af425489b661d5de23d002ff14121c8e0165fae9fd127404eb2f1a
-
Filesize
7KB
MD50e471eeb713f87e3e43a953dc4bae06c
SHA193e3d54f6ebee4b133b40231f889dc4dae4bf5bd
SHA256e90a060583380e7d7298321e7ed3b09997457d95e7b1eeac408034936bd0c72e
SHA5124c3eca8cebf577a9a9f141f22d2454d39d0e54a200bd3dd63900600c372b115d0b0578d21e805e49c64fc0418f637ca711f1bd74e429d92f2fe78f845ca75cd6
-
Filesize
381KB
MD5381f1b7d8f7da904827980dae02f77a9
SHA181d4d5724533b26391301be2b462f580395d5485
SHA256f14dab0b9f18aced330729b4a772e6b139817be01783b97b92e9af5fc26615d2
SHA51244a5eee558c727c9c07301dc0190a00807d1749f83c57f76c4f8cdde4bbdf4b44bb1086cc2fcb7aff0a73949ae7aaa17d33d9cd3b0a70c4f51b724812e1bd6d3
-
Filesize
1.6MB
MD53e6c2703e1c8b6b2b3512aff48099462
SHA1b17a7f9cce16540b1f0e3dceae9dc7e8e855cb1b
SHA256616a0047b5f28a071fc26dd9b0fd90d5110c77a3635565cebc24b6362d8c9844
SHA51270d0c5cb8542ca0600d38aee9030ea3dd9b0951a7d96ac1b8f1af9e71c5357c33f433913ef9d2e3254a9ac95e5678764ab22184fbcec998a9bbb8d75731c9dc8
-
Filesize
261KB
MD5026d12b240e081794c730c1ed24a6f33
SHA1bb6c0544ecc2c8db68b23b8e4feab5b3261b4666
SHA256d639adb51c6e3ee8c249d11eb8db606ba2aa37d4f12f80f2b9685d8f560984bf
SHA5125b88ee5c7cee966867eec31ad468aa19353a2a2b1a84995ac1bedeaf5e60b1b015f73fcd35644c4365cf8f1981b3de057483838b7deaad5599f9c2a24f60d758
-
Filesize
366KB
MD52943b9910b1c7cc04024888502885256
SHA1e2ac697a558fa85ff4c9e2bb114138870a80f146
SHA25678115050f4e99372fc10b19a14af60e623ddfda224c8e96340cb5d8166507e2b
SHA5128d9d0d60622b958ab0f7c1f1d050fb53ba11cf19aa513fde9f7b7772fb6949b3e50907ed519fdc89e2bdf0ffb33ff084094af56abd3f9d1d2faef9d27990fe1b
-
Filesize
861KB
MD574a8ebf5d8e08e284d734fe5feebd67d
SHA187fb627c6e63eb41e26f389b38d525ccf0c11590
SHA2561a9632b9e061b56017d2eb8d15c20e60a9518b4de5faa0399eaba0a17c10045d
SHA512230f84f3fdb335a6044e6a83154de27e853b66ce6b8963b5f1991c462d69cc702a5cf7ee20717ec9f6e688398579fe18102a48f418b74333f476255b1cdbf8b9
-
Filesize
5.5MB
MD5848a53dc549be0386e5da0f49700c389
SHA1e918192d2b5c565a9b2756a1d01070c6608f361c
SHA256faf0c5e4ef7dbcfd863377c55a4d1d87a3f6a58c13a8a9882e11012066f31976
SHA512fa3ec7f48ec441c1e68ca74d3b8436838b5a4fd5f767fb655d5ba19e82d5a7cc5d9706ae5e3eb53334ff1dc03ce589fcebcf4bdcb7cc27f69bfa6e3eb24f9633
-
Filesize
5.5MB
MD5848a53dc549be0386e5da0f49700c389
SHA1e918192d2b5c565a9b2756a1d01070c6608f361c
SHA256faf0c5e4ef7dbcfd863377c55a4d1d87a3f6a58c13a8a9882e11012066f31976
SHA512fa3ec7f48ec441c1e68ca74d3b8436838b5a4fd5f767fb655d5ba19e82d5a7cc5d9706ae5e3eb53334ff1dc03ce589fcebcf4bdcb7cc27f69bfa6e3eb24f9633
-
Filesize
5.5MB
MD5848a53dc549be0386e5da0f49700c389
SHA1e918192d2b5c565a9b2756a1d01070c6608f361c
SHA256faf0c5e4ef7dbcfd863377c55a4d1d87a3f6a58c13a8a9882e11012066f31976
SHA512fa3ec7f48ec441c1e68ca74d3b8436838b5a4fd5f767fb655d5ba19e82d5a7cc5d9706ae5e3eb53334ff1dc03ce589fcebcf4bdcb7cc27f69bfa6e3eb24f9633
-
Filesize
9.5MB
MD53c5850ef227bb206e507551c471ee8df
SHA18943aab98043f28918a0c8d31d7a0076b5bffb1c
SHA256a803bd4522ec8804adf5e548b2ffc9e3afa7eee179d96945de1a5980b5616445
SHA512aa94ace9f008eeff257505239a7a04eada728461e7d732e227815c880b6ec758b63b2dc576af425489b661d5de23d002ff14121c8e0165fae9fd127404eb2f1a
-
Filesize
9.5MB
MD53c5850ef227bb206e507551c471ee8df
SHA18943aab98043f28918a0c8d31d7a0076b5bffb1c
SHA256a803bd4522ec8804adf5e548b2ffc9e3afa7eee179d96945de1a5980b5616445
SHA512aa94ace9f008eeff257505239a7a04eada728461e7d732e227815c880b6ec758b63b2dc576af425489b661d5de23d002ff14121c8e0165fae9fd127404eb2f1a