Analysis
-
max time kernel
117s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2023 18:31
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe
Resource
win10v2004-20230703-en
General
-
Target
SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe
-
Size
2.3MB
-
MD5
3c55617e6b69330386a0350e9f6aa0b4
-
SHA1
99bff391433cfc610b27f3b2b7ebc3239314f831
-
SHA256
1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94
-
SHA512
46eac86da241ab7b98d449e31111c9da154109b493bf62e807cffcdb43767167c994a165d78ec9a4ce24ea4f64ec76edee39daf9408bad3d6e65b64b1b6b1c28
-
SSDEEP
49152:X4MR20Q9Xz2p2pizrXPHaBXtHqNQ6cBUX0biao10PzFyPawde5Gir:X41MEpyHaZUNFcBUEfoIgPFTir
Malware Config
Extracted
redline
120723_rc_11
rcam.tuktuk.ug:11290
-
auth_value
3a7b4b38a7116be1f337083fb37de790
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 3784 created 3156 3784 TaskMnr.exe 78 PID 3784 created 3156 3784 TaskMnr.exe 78 PID 3784 created 3156 3784 TaskMnr.exe 78 PID 3784 created 3156 3784 TaskMnr.exe 78 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Octium.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TaskMnr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts TaskMnr.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Octium.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Octium.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TaskMnr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TaskMnr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe -
Executes dropped EXE 3 IoCs
pid Process 536 Octium.exe 3784 TaskMnr.exe 2012 ntlhost.exe -
resource yara_rule behavioral2/memory/4808-137-0x0000000000AA0000-0x0000000001008000-memory.dmp themida behavioral2/memory/4808-168-0x0000000000AA0000-0x0000000001008000-memory.dmp themida behavioral2/files/0x000600000002321c-204.dat themida behavioral2/files/0x000600000002321c-206.dat themida behavioral2/files/0x000600000002321c-207.dat themida behavioral2/memory/3784-208-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp themida behavioral2/memory/3784-210-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp themida behavioral2/memory/3784-211-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp themida behavioral2/memory/3784-212-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp themida behavioral2/memory/3784-213-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp themida behavioral2/memory/3784-214-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp themida behavioral2/memory/3784-215-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp themida behavioral2/memory/3784-217-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp themida behavioral2/memory/3784-228-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp themida behavioral2/memory/3784-259-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp themida behavioral2/memory/3784-277-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp themida behavioral2/memory/3784-280-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp themida behavioral2/memory/3784-283-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp themida behavioral2/files/0x0007000000023226-285.dat themida behavioral2/files/0x0007000000023226-284.dat themida behavioral2/memory/3448-288-0x00007FF6E1F40000-0x00007FF6E2EE0000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" Octium.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Octium.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TaskMnr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 536 Octium.exe 3784 TaskMnr.exe 2012 ntlhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4808 set thread context of 2672 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 94 -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2296 sc.exe 5020 sc.exe 4756 sc.exe 2980 sc.exe 4696 sc.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 50 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 3784 TaskMnr.exe 3784 TaskMnr.exe 3364 powershell.exe 3364 powershell.exe 3784 TaskMnr.exe 3784 TaskMnr.exe 3784 TaskMnr.exe 3784 TaskMnr.exe 3784 TaskMnr.exe 3784 TaskMnr.exe 4808 powershell.exe 4808 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe Token: SeDebugPrivilege 2672 AppLaunch.exe Token: SeDebugPrivilege 3364 powershell.exe Token: SeShutdownPrivilege 4072 powercfg.exe Token: SeCreatePagefilePrivilege 4072 powercfg.exe Token: SeDebugPrivilege 4808 powershell.exe Token: SeShutdownPrivilege 1936 powercfg.exe Token: SeCreatePagefilePrivilege 1936 powercfg.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 4808 wrote to memory of 3940 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 92 PID 4808 wrote to memory of 3940 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 92 PID 4808 wrote to memory of 3940 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 92 PID 4808 wrote to memory of 4004 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 93 PID 4808 wrote to memory of 4004 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 93 PID 4808 wrote to memory of 4004 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 93 PID 4808 wrote to memory of 2672 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 94 PID 4808 wrote to memory of 2672 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 94 PID 4808 wrote to memory of 2672 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 94 PID 4808 wrote to memory of 2672 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 94 PID 4808 wrote to memory of 2672 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 94 PID 4808 wrote to memory of 2672 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 94 PID 4808 wrote to memory of 2672 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 94 PID 4808 wrote to memory of 2672 4808 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 94 PID 2672 wrote to memory of 536 2672 AppLaunch.exe 97 PID 2672 wrote to memory of 536 2672 AppLaunch.exe 97 PID 2672 wrote to memory of 3784 2672 AppLaunch.exe 99 PID 2672 wrote to memory of 3784 2672 AppLaunch.exe 99 PID 536 wrote to memory of 2012 536 Octium.exe 100 PID 536 wrote to memory of 2012 536 Octium.exe 100 PID 1036 wrote to memory of 2296 1036 cmd.exe 106 PID 1036 wrote to memory of 2296 1036 cmd.exe 106 PID 1036 wrote to memory of 5020 1036 cmd.exe 107 PID 1036 wrote to memory of 5020 1036 cmd.exe 107 PID 1036 wrote to memory of 4756 1036 cmd.exe 108 PID 1036 wrote to memory of 4756 1036 cmd.exe 108 PID 1036 wrote to memory of 2980 1036 cmd.exe 109 PID 1036 wrote to memory of 2980 1036 cmd.exe 109 PID 1036 wrote to memory of 4696 1036 cmd.exe 111 PID 1036 wrote to memory of 4696 1036 cmd.exe 111 PID 2752 wrote to memory of 4072 2752 cmd.exe 118 PID 2752 wrote to memory of 4072 2752 cmd.exe 118 PID 2752 wrote to memory of 1936 2752 cmd.exe 119 PID 2752 wrote to memory of 1936 2752 cmd.exe 119
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:3940
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\Octium.exe"C:\Users\Admin\AppData\Local\Temp\Octium.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2012
-
-
-
C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe"C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2296
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5020
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4756
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2980
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4696
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:2328
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:2376
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:2608
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵PID:3448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
4.2MB
MD5f206c33258de47d5e05e9f035efc265c
SHA1c744ea5b001dc4a9b1e16dd736f44d0d3e9be002
SHA256298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a
SHA512ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a
-
Filesize
4.2MB
MD5f206c33258de47d5e05e9f035efc265c
SHA1c744ea5b001dc4a9b1e16dd736f44d0d3e9be002
SHA256298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a
SHA512ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a
-
Filesize
4.2MB
MD5f206c33258de47d5e05e9f035efc265c
SHA1c744ea5b001dc4a9b1e16dd736f44d0d3e9be002
SHA256298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a
SHA512ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
572.8MB
MD570ef0514a71ef33df618a0fafb821801
SHA1043768212bba9285695215d77be6247f5ef2ef73
SHA256447ade9217eb81c561474aac91dccec9bbdf06e73cb2aebc04e0669bc7cc595c
SHA51200a22ff90b38922a6f36e42b8bd8a67e108c03b1d9107522901e2f6664abbf7dab5d3881090a1268a90aed29ad97ad004a6d3ac196efbfa0bc6a8a22d676b57b
-
Filesize
562.1MB
MD5c78dfbeae085b9ed74230389978f43bf
SHA1ef10a293bfd19be73b949a8ee409ff551f49f4a2
SHA256a2565bf6d75050179e07c97ca031d9976ac6ee87488b256a3eacb0a00864a5af
SHA512e26c7b3e22d85548066aff11cebc2ab228c69889b657a9a7371933a83c3d3347f44b511c396b493ea279df88f529c726e58a8cd3012611c6923c76e8e5c7679d