Analysis
-
max time kernel
148s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-12-2022 09:37
Static task
static1
Behavioral task
behavioral1
Sample
7434b42e11380272961c92e061072e78.exe
Resource
win7-20220812-en
General
-
Target
7434b42e11380272961c92e061072e78.exe
-
Size
7.0MB
-
MD5
7434b42e11380272961c92e061072e78
-
SHA1
a2dea715e33a860dc09d09b219db18831e6bb1a5
-
SHA256
9922432bfa7768bdfb6e8b079c90744c9f3d33a5a258a97abc8519f81a680e40
-
SHA512
b426ec3a12c39bfdbf6a52a2971a44e471a76ca270c0aa2ed9b9bb8f1ad5f48f80e7a86659375a05782964762bc3a56f0aa3de87ac509b01c0cad421f8f46a49
-
SSDEEP
196608:xhWCcb/OtOBzdC0yo7R5aZPPrf4e0dNL4IkPZFsSM:xhWtb/OtOm0yo3alDfzUNPGZFM
Malware Config
Extracted
vidar
56.1
1760
https://t.me/vmt001
-
profile_id
1760
Extracted
amadey
3.50
85.209.135.109/jg94cVd30f/index.php
Extracted
systembc
89.22.236.225:4193
176.124.205.5:4193
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
00255305450048060084.exegntuud.exeEmit64.exepid process 1308 00255305450048060084.exe 1784 gntuud.exe 1688 Emit64.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1908 cmd.exe -
Loads dropped DLL 8 IoCs
Processes:
7434b42e11380272961c92e061072e78.exe00255305450048060084.exegntuud.exepid process 1904 7434b42e11380272961c92e061072e78.exe 1904 7434b42e11380272961c92e061072e78.exe 1904 7434b42e11380272961c92e061072e78.exe 1904 7434b42e11380272961c92e061072e78.exe 1904 7434b42e11380272961c92e061072e78.exe 1904 7434b42e11380272961c92e061072e78.exe 1308 00255305450048060084.exe 1784 gntuud.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
gntuud.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Emit64.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000017001\\Emit64.exe" gntuud.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
7434b42e11380272961c92e061072e78.exe00255305450048060084.exegntuud.exeEmit64.exepid process 1904 7434b42e11380272961c92e061072e78.exe 1904 7434b42e11380272961c92e061072e78.exe 1308 00255305450048060084.exe 1308 00255305450048060084.exe 1784 gntuud.exe 1784 gntuud.exe 1688 Emit64.exe 1688 Emit64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
7434b42e11380272961c92e061072e78.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7434b42e11380272961c92e061072e78.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7434b42e11380272961c92e061072e78.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 676 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
7434b42e11380272961c92e061072e78.exe00255305450048060084.exegntuud.exeEmit64.exepid process 1904 7434b42e11380272961c92e061072e78.exe 1904 7434b42e11380272961c92e061072e78.exe 1308 00255305450048060084.exe 1784 gntuud.exe 1688 Emit64.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
7434b42e11380272961c92e061072e78.execmd.exe00255305450048060084.exegntuud.execmd.exedescription pid process target process PID 1904 wrote to memory of 1308 1904 7434b42e11380272961c92e061072e78.exe 00255305450048060084.exe PID 1904 wrote to memory of 1308 1904 7434b42e11380272961c92e061072e78.exe 00255305450048060084.exe PID 1904 wrote to memory of 1308 1904 7434b42e11380272961c92e061072e78.exe 00255305450048060084.exe PID 1904 wrote to memory of 1308 1904 7434b42e11380272961c92e061072e78.exe 00255305450048060084.exe PID 1904 wrote to memory of 1908 1904 7434b42e11380272961c92e061072e78.exe cmd.exe PID 1904 wrote to memory of 1908 1904 7434b42e11380272961c92e061072e78.exe cmd.exe PID 1904 wrote to memory of 1908 1904 7434b42e11380272961c92e061072e78.exe cmd.exe PID 1904 wrote to memory of 1908 1904 7434b42e11380272961c92e061072e78.exe cmd.exe PID 1908 wrote to memory of 676 1908 cmd.exe timeout.exe PID 1908 wrote to memory of 676 1908 cmd.exe timeout.exe PID 1908 wrote to memory of 676 1908 cmd.exe timeout.exe PID 1908 wrote to memory of 676 1908 cmd.exe timeout.exe PID 1308 wrote to memory of 1784 1308 00255305450048060084.exe gntuud.exe PID 1308 wrote to memory of 1784 1308 00255305450048060084.exe gntuud.exe PID 1308 wrote to memory of 1784 1308 00255305450048060084.exe gntuud.exe PID 1308 wrote to memory of 1784 1308 00255305450048060084.exe gntuud.exe PID 1784 wrote to memory of 916 1784 gntuud.exe schtasks.exe PID 1784 wrote to memory of 916 1784 gntuud.exe schtasks.exe PID 1784 wrote to memory of 916 1784 gntuud.exe schtasks.exe PID 1784 wrote to memory of 916 1784 gntuud.exe schtasks.exe PID 1784 wrote to memory of 340 1784 gntuud.exe cmd.exe PID 1784 wrote to memory of 340 1784 gntuud.exe cmd.exe PID 1784 wrote to memory of 340 1784 gntuud.exe cmd.exe PID 1784 wrote to memory of 340 1784 gntuud.exe cmd.exe PID 340 wrote to memory of 296 340 cmd.exe cmd.exe PID 340 wrote to memory of 296 340 cmd.exe cmd.exe PID 340 wrote to memory of 296 340 cmd.exe cmd.exe PID 340 wrote to memory of 296 340 cmd.exe cmd.exe PID 340 wrote to memory of 1604 340 cmd.exe cacls.exe PID 340 wrote to memory of 1604 340 cmd.exe cacls.exe PID 340 wrote to memory of 1604 340 cmd.exe cacls.exe PID 340 wrote to memory of 1604 340 cmd.exe cacls.exe PID 340 wrote to memory of 1016 340 cmd.exe cacls.exe PID 340 wrote to memory of 1016 340 cmd.exe cacls.exe PID 340 wrote to memory of 1016 340 cmd.exe cacls.exe PID 340 wrote to memory of 1016 340 cmd.exe cacls.exe PID 340 wrote to memory of 680 340 cmd.exe cmd.exe PID 340 wrote to memory of 680 340 cmd.exe cmd.exe PID 340 wrote to memory of 680 340 cmd.exe cmd.exe PID 340 wrote to memory of 680 340 cmd.exe cmd.exe PID 340 wrote to memory of 928 340 cmd.exe cacls.exe PID 340 wrote to memory of 928 340 cmd.exe cacls.exe PID 340 wrote to memory of 928 340 cmd.exe cacls.exe PID 340 wrote to memory of 928 340 cmd.exe cacls.exe PID 340 wrote to memory of 1064 340 cmd.exe cacls.exe PID 340 wrote to memory of 1064 340 cmd.exe cacls.exe PID 340 wrote to memory of 1064 340 cmd.exe cacls.exe PID 340 wrote to memory of 1064 340 cmd.exe cacls.exe PID 1784 wrote to memory of 1688 1784 gntuud.exe Emit64.exe PID 1784 wrote to memory of 1688 1784 gntuud.exe Emit64.exe PID 1784 wrote to memory of 1688 1784 gntuud.exe Emit64.exe PID 1784 wrote to memory of 1688 1784 gntuud.exe Emit64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7434b42e11380272961c92e061072e78.exe"C:\Users\Admin\AppData\Local\Temp\7434b42e11380272961c92e061072e78.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\ProgramData\00255305450048060084.exe"C:\ProgramData\00255305450048060084.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe" /F4⤵
- Creates scheduled task(s)
PID:916 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\03bd543fce" /P "Admin:N"&&CACLS "..\03bd543fce" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:296
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:N"5⤵PID:1604
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:R" /E5⤵PID:1016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:680
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\03bd543fce" /P "Admin:N"5⤵PID:928
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\03bd543fce" /P "Admin:R" /E5⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\1000017001\Emit64.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\Emit64.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1688 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main4⤵PID:1888
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\1000019012\syncfiles.dll, rundll4⤵PID:1900
-
C:\Users\Admin\1000018002\avicapn32.exe"C:\Users\Admin\1000018002\avicapn32.exe"4⤵PID:1868
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7434b42e11380272961c92e061072e78.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
3.2MB
MD5c6768c9a04719ac06d51c6975320b7b3
SHA1a32e46858a86e1093b64d224f01d8cb7d0db04a6
SHA256ed73f922fc824afd9e4ece71d5828161d5118958b47c12ec0cac53a8294c1100
SHA5122726589f6ff6d968e85f38d3fffe2ad35d17751ede794db9b17ccb095af5021748d9b38a9648b7bdf68df6aac74c775368e477520bca3af54834e8e840a86e31
-
Filesize
3.5MB
MD5f0f429f663da5f0fe83f126fce4a351e
SHA146b1ba2f227b44b10b18205ac59f160c74bf6edb
SHA256a0d6242b1f5f4f47310be1335eb324a63bd21782c2d44d21f40e10eb45ec4420
SHA512255442fc411983367eb85f60c1c81f72502f707136a84cba8274916cb86280ec7733b2acead78c84097b009522eea534daa59488a0a4d980ec988cab3a056f97
-
Filesize
7.0MB
MD5e9ca4dd1d8c237e8abd86327f12cf345
SHA1e6d435ab6b160237ad313e34f84ca13eb6ecaf26
SHA256b3a8d64fbf7c5a75d60500c8abdec83822eb69cdbac8bb5f92533eab8f646d2c
SHA512e30d7ee98b4c21495ca1971f68da3711074c178d231a2e2c1113d002ed07bb2c8c3b26bf6bbc9ab29b10f759af2869b91e70832de9f7b976da145833511792d9
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
9.9MB
MD57a5155b804e592d83f8319cbdb27e164
SHA1da63718377b9086ef7f6db6b8b88e45062f31749
SHA2565eb7b2fd13264f066b10946539eff6be750647de246cf791e57ca4c17b0b9c31
SHA5123dbd6745d7b64ef2260e14df08c6aa36ee7e34b218dc11c83f5fbcaa934cf1385e79d208e061b9055c389cd5259ae2081b8dea47fac38844a2043b9a361d0346
-
Filesize
9.9MB
MD57a5155b804e592d83f8319cbdb27e164
SHA1da63718377b9086ef7f6db6b8b88e45062f31749
SHA2565eb7b2fd13264f066b10946539eff6be750647de246cf791e57ca4c17b0b9c31
SHA5123dbd6745d7b64ef2260e14df08c6aa36ee7e34b218dc11c83f5fbcaa934cf1385e79d208e061b9055c389cd5259ae2081b8dea47fac38844a2043b9a361d0346
-
Filesize
7.0MB
MD53a857d164b4ebf9e318864b9c5bb331b
SHA1cb4c74425fef5615dd6d13395de66f065a74a86d
SHA2566b8ca9260bc51de58225a754557934bbf25c6c6fba748bf448a6d61763c5a96e
SHA5129866ce9cbb829ece490b47d6778b3c51c34ada4ee3d3a1bdf11f89c96b6889794a4d888deddecf62ceb02b5e6bfb82d3365886aeaa9c2a5ef2460659c76c7d1c
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2.4MB
MD52b7eeb03c5a82e68d593e22ff5583491
SHA1fa8084baa6b4de85626cc9d2390f1019dc9d7ab0
SHA25622c9a710393dd47d4d062c388d5a324e706b7bb3e61ce4d50c58ac76e82be3c8
SHA5127c91885d522704a8280c2cf77b9a304213d541fa22fb6d4c90c0f41a6ae4a45ee395376ff1a6d5f34994cb20289764de0a09df1331d46bcc901520bfbceac5c4
-
Filesize
2.6MB
MD56382d5c8f97ae7a492701db0124affa8
SHA140a41560495cf45172674d4d300ac107c1313ccb
SHA256d12474b99cd24f368d2befe0d5416421311bbdede9b2cbcb9da52912861ce860
SHA5129945195291380c73db1dffe13e1b27975d5624ea0aae7ebb4d420a43286c166d2175884a508f37a170db9766111cc9a8ff49f2a66e88de1086aa8106f6a3f38b
-
Filesize
2.6MB
MD5a619222cd503958b492ba315927c61fd
SHA14743bd2fb29dc3ab52551277ea57435ae435868a
SHA256f8067ecd000f5e00a938dd56abe971bb5cf13c70065e0b9a6a0f6ea5e83984b8
SHA512119cb4227c150c8a01bd797ab58f32d75099e5d6c0dd2fe7a6db4ab4ecf80783b9162d34451f4838bba6a80b646fd7e944dda175709183abbb6d454d78ea792e
-
Filesize
4.1MB
MD50cb94ea9129dc8a787d7bdffbd3b61ca
SHA128dcccca2a24afcb281bc1b10c1579b31e13bcc5
SHA256ba1d4847e51cec91bbd34717d4ae0dfd90c84c8b7806b86f3bfaf3fccf942448
SHA5123aa4b9c0603fce1384577598058f0e0ed6c1e3afbcae33b92fe7fe346b52434c5fa23a0d5f3d74ef389491007d1cd8e144d54b31a1bb5089c46c1bb8f57a250e
-
Filesize
3.3MB
MD54fa116cf74bdfc141d82f94456a7af63
SHA13343f5a5ac3711434ca75ce8a356a1021ee15fd4
SHA2563c4718259c63de547bd976997ff9e2649209e7410c46648e58d54aaa70a58a3f
SHA512d6ca5a7d76b009eb0d6785638a1c533ecb624ac10ac32543f00d00b729d3324b36b17397201e835392e990e88fdb6021e7ebeaeb22c2f393a710f113f61a0448
-
Filesize
3.5MB
MD5c49102c45513c942e8a25d228b385d22
SHA1d552c8f4828d9ea3ea69264f7e6e6f6df4fd11ef
SHA256849a770eb7d4fd9161ce11824cff94e3c8e8567c4b309397c9bbf666c222f2cb
SHA512c80f205bf618869f2f442799fd7996554b9d4796e741cb3a339cfb69a4f6b70634b9448d708b377633d45d8c58dfaede1a2b10fa5b21672406ab5fbefc8be0f4
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
9.9MB
MD57a5155b804e592d83f8319cbdb27e164
SHA1da63718377b9086ef7f6db6b8b88e45062f31749
SHA2565eb7b2fd13264f066b10946539eff6be750647de246cf791e57ca4c17b0b9c31
SHA5123dbd6745d7b64ef2260e14df08c6aa36ee7e34b218dc11c83f5fbcaa934cf1385e79d208e061b9055c389cd5259ae2081b8dea47fac38844a2043b9a361d0346
-
Filesize
1.3MB
MD5f93ebcfd76a86fb7cccfc68144765729
SHA1fe1f167aedccf6a5e72478aa46394c75375df6b6
SHA2564c0226f2d11d82aefd8d9f819e1e1b71c4cad01788c9714951f8b4764222279b
SHA5124ebb075350011d6b0834f82c0cdcd1f5d9dc367258e43594a94ff339a7d745e3eea01af8749384135501b4de7ee244d65a38fd732389d8295bdde9258ae39f0e
-
Filesize
1.6MB
MD5a1b0880cf3d8558e546b08f7757e6572
SHA1b16791f6633e6aac0b12478f88222bf5acdeaed0
SHA256ecc4199c21b30ac1e7eb4a436052801ae6777adc4dd9a507db49d514a36ec780
SHA5129a0babf730c48ce86bdd38eb2b4149b51c2d46bd67608bf78ad9a1943cc7ac9996a9e69c5c43fd754b04f40ae81f3b708fad265bc25843d9c278e76eb545e312
-
Filesize
2.6MB
MD568fa01f2c77187416a3191ef0f70c8d8
SHA17f68e9216884e2283e2dcfca2a1b43a21dec89df
SHA256ce8f1b5d3d246cc7d528fc16cedea5544cfdb79fd6ff08b234fa2da627eee503
SHA512429c2af7f52878971aaba7eabd56e1b0bdf771072fd924729e80fa48b2a438f853942ed493b66d5ec6f47ce5432f6c79047ff96be4bbccf97c6a2b654cb2facd
-
Filesize
3.1MB
MD542851236dcae45da8d22cc0f77b055b0
SHA149f34cb95e0a4454d452aaa2312adc5511b8d184
SHA2566dea558553ba6cb97d8bbbca212839cb1390cfa43c1078a0fb8d642ad6c1192d
SHA512923696e69b81782e9074796b138c6e142080f22154258e527491cf2a82b9e804c9247e9ba0caf99db72d06902ee81b0cc450fba3356e793a3aa5f170b7c2e415