Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2023, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230703-en
General
-
Target
file.exe
-
Size
1.7MB
-
MD5
39f8521dd657ab5aaae4d2c76202614b
-
SHA1
155a43d23930b1b7ccb1e7f0ec560063d8b5bd0d
-
SHA256
2b559f1c510907c1a260b6482b36dce3ba603f08fd80d98ee793787a12104d29
-
SHA512
6d312b975fee87af2f9e2f7a5f47db421e8d1074c74e730bd834ce8605aba80fa2174e17658ba501747c2e4f1007f93b41428fb6827c485269b61ba19718f773
-
SSDEEP
24576:Xy40POuk6AxshWoadVb7uEla50CTd9Zijzers8QScFfv2LO5RM1u9773VaVAR3:i40POyWBd7uEl5Yd6+gRd2LyRZ9daU
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral2/memory/2396-162-0x0000000000430000-0x000000000043A000-memory.dmp healer behavioral2/files/0x00060000000231f7-172.dat healer behavioral2/files/0x00060000000231f7-173.dat healer behavioral2/memory/3068-174-0x00000000004E0000-0x00000000004EA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b7560369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b7560369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b7560369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b7560369.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7493921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7493921.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b7560369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7493921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b7560369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7493921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7493921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7493921.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation d5025650.exe Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation danke.exe -
Executes dropped EXE 11 IoCs
pid Process 2360 v0068831.exe 816 v5550060.exe 3100 v2959317.exe 2396 a7493921.exe 3068 b7560369.exe 2408 c7857078.exe 2952 d5025650.exe 4068 danke.exe 3284 e5000538.exe 2212 danke.exe 4268 danke.exe -
Loads dropped DLL 1 IoCs
pid Process 2716 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7493921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7493921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b7560369.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v2959317.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0068831.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0068831.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5550060.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5550060.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2959317.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2644 2408 WerFault.exe 95 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e5000538.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e5000538.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e5000538.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3488 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2396 a7493921.exe 2396 a7493921.exe 3068 b7560369.exe 3068 b7560369.exe 3284 e5000538.exe 3284 e5000538.exe 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1352 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3284 e5000538.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2396 a7493921.exe Token: SeDebugPrivilege 3068 b7560369.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2952 d5025650.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 5000 wrote to memory of 2360 5000 file.exe 85 PID 5000 wrote to memory of 2360 5000 file.exe 85 PID 5000 wrote to memory of 2360 5000 file.exe 85 PID 2360 wrote to memory of 816 2360 v0068831.exe 86 PID 2360 wrote to memory of 816 2360 v0068831.exe 86 PID 2360 wrote to memory of 816 2360 v0068831.exe 86 PID 816 wrote to memory of 3100 816 v5550060.exe 87 PID 816 wrote to memory of 3100 816 v5550060.exe 87 PID 816 wrote to memory of 3100 816 v5550060.exe 87 PID 3100 wrote to memory of 2396 3100 v2959317.exe 88 PID 3100 wrote to memory of 2396 3100 v2959317.exe 88 PID 3100 wrote to memory of 2396 3100 v2959317.exe 88 PID 3100 wrote to memory of 3068 3100 v2959317.exe 94 PID 3100 wrote to memory of 3068 3100 v2959317.exe 94 PID 816 wrote to memory of 2408 816 v5550060.exe 95 PID 816 wrote to memory of 2408 816 v5550060.exe 95 PID 816 wrote to memory of 2408 816 v5550060.exe 95 PID 2360 wrote to memory of 2952 2360 v0068831.exe 100 PID 2360 wrote to memory of 2952 2360 v0068831.exe 100 PID 2360 wrote to memory of 2952 2360 v0068831.exe 100 PID 2952 wrote to memory of 4068 2952 d5025650.exe 101 PID 2952 wrote to memory of 4068 2952 d5025650.exe 101 PID 2952 wrote to memory of 4068 2952 d5025650.exe 101 PID 5000 wrote to memory of 3284 5000 file.exe 102 PID 5000 wrote to memory of 3284 5000 file.exe 102 PID 5000 wrote to memory of 3284 5000 file.exe 102 PID 4068 wrote to memory of 3488 4068 danke.exe 103 PID 4068 wrote to memory of 3488 4068 danke.exe 103 PID 4068 wrote to memory of 3488 4068 danke.exe 103 PID 4068 wrote to memory of 4472 4068 danke.exe 105 PID 4068 wrote to memory of 4472 4068 danke.exe 105 PID 4068 wrote to memory of 4472 4068 danke.exe 105 PID 4472 wrote to memory of 4604 4472 cmd.exe 107 PID 4472 wrote to memory of 4604 4472 cmd.exe 107 PID 4472 wrote to memory of 4604 4472 cmd.exe 107 PID 4472 wrote to memory of 4172 4472 cmd.exe 108 PID 4472 wrote to memory of 4172 4472 cmd.exe 108 PID 4472 wrote to memory of 4172 4472 cmd.exe 108 PID 4472 wrote to memory of 4564 4472 cmd.exe 109 PID 4472 wrote to memory of 4564 4472 cmd.exe 109 PID 4472 wrote to memory of 4564 4472 cmd.exe 109 PID 4472 wrote to memory of 1592 4472 cmd.exe 110 PID 4472 wrote to memory of 1592 4472 cmd.exe 110 PID 4472 wrote to memory of 1592 4472 cmd.exe 110 PID 4472 wrote to memory of 2468 4472 cmd.exe 111 PID 4472 wrote to memory of 2468 4472 cmd.exe 111 PID 4472 wrote to memory of 2468 4472 cmd.exe 111 PID 4472 wrote to memory of 5072 4472 cmd.exe 112 PID 4472 wrote to memory of 5072 4472 cmd.exe 112 PID 4472 wrote to memory of 5072 4472 cmd.exe 112 PID 4068 wrote to memory of 2716 4068 danke.exe 124 PID 4068 wrote to memory of 2716 4068 danke.exe 124 PID 4068 wrote to memory of 2716 4068 danke.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0068831.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0068831.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5550060.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5550060.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2959317.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2959317.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7493921.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7493921.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7560369.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7560369.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7857078.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7857078.exe4⤵
- Executes dropped EXE
PID:2408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 1365⤵
- Program crash
PID:2644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5025650.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5025650.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F5⤵
- Creates scheduled task(s)
PID:3488
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"6⤵PID:4172
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E6⤵PID:4564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1592
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"6⤵PID:2468
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E6⤵PID:5072
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2716
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e5000538.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e5000538.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2408 -ip 24081⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:2212
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
1.5MB
MD5b81ac533fd232a2f56893abde18d5ec7
SHA120498126ce49089a86fcf3c354aa78b2e1e06068
SHA256d254a10f5de33418593597e66b1250e105e80481713e398c5eef16a3ffa0e495
SHA5126f19e9f28db6abc792d3ac498ed75cf1eddcebbb933e53506a16412197afc2dc135dd9f291fa9f7e39198dc69b9e6446cbb54e21cd786357fcea54c165dcc430
-
Filesize
1.5MB
MD5b81ac533fd232a2f56893abde18d5ec7
SHA120498126ce49089a86fcf3c354aa78b2e1e06068
SHA256d254a10f5de33418593597e66b1250e105e80481713e398c5eef16a3ffa0e495
SHA5126f19e9f28db6abc792d3ac498ed75cf1eddcebbb933e53506a16412197afc2dc135dd9f291fa9f7e39198dc69b9e6446cbb54e21cd786357fcea54c165dcc430
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
1.4MB
MD53e687bae32fdb9c50e5e3934b5a6ca9c
SHA17e6d3cdc9246a9e21cab11b8a44a32c05bcb4f61
SHA25623061041c2fd39ae3f3b91178ea7f8fca0b970101138b956ff5597f0ca25f95a
SHA5126235acf467b1c85a2329a4fec19100efe3b9c4651a0668e8592cce7de78fc0f7a2abc40c50065bcf796c66e89b1428a4babdc0d45d593ef0f22b02835cbfc871
-
Filesize
1.4MB
MD53e687bae32fdb9c50e5e3934b5a6ca9c
SHA17e6d3cdc9246a9e21cab11b8a44a32c05bcb4f61
SHA25623061041c2fd39ae3f3b91178ea7f8fca0b970101138b956ff5597f0ca25f95a
SHA5126235acf467b1c85a2329a4fec19100efe3b9c4651a0668e8592cce7de78fc0f7a2abc40c50065bcf796c66e89b1428a4babdc0d45d593ef0f22b02835cbfc871
-
Filesize
1.7MB
MD5a4e6eae5b7a3efff9f0924e4a07039b1
SHA141b26a0054c1876183d42a5df4cd33fbda7f7979
SHA2569f25017ed10528ca31216bc326bfa3e4c1ea0bcb9078399a4a1bc1d2c5536bb7
SHA512315a55c670dc00824d1e78230786472977ef573ecd6c946eebbbc4c47ac7853262a6fcaa821e577fa2d473bd5733a3a2268ca091732a364c3e6491ad4b4a8bc6
-
Filesize
1.7MB
MD5a4e6eae5b7a3efff9f0924e4a07039b1
SHA141b26a0054c1876183d42a5df4cd33fbda7f7979
SHA2569f25017ed10528ca31216bc326bfa3e4c1ea0bcb9078399a4a1bc1d2c5536bb7
SHA512315a55c670dc00824d1e78230786472977ef573ecd6c946eebbbc4c47ac7853262a6fcaa821e577fa2d473bd5733a3a2268ca091732a364c3e6491ad4b4a8bc6
-
Filesize
653KB
MD5890589a430ca372533f594d5f6e5365e
SHA12682226e935ce560f22b1b7c63c650c00d94347e
SHA2561505e178fd996dc966a092457fc4bdd23c9369d8dcb15734f0ac7451d1e5c90f
SHA51266dc7b41cd8d030c9241064e6bac2f7def908b15ba6efae7bce504368832622020b1618f2a088064f323518111e6b61914dda53e8e44e3dc757b22af9abef6ea
-
Filesize
653KB
MD5890589a430ca372533f594d5f6e5365e
SHA12682226e935ce560f22b1b7c63c650c00d94347e
SHA2561505e178fd996dc966a092457fc4bdd23c9369d8dcb15734f0ac7451d1e5c90f
SHA51266dc7b41cd8d030c9241064e6bac2f7def908b15ba6efae7bce504368832622020b1618f2a088064f323518111e6b61914dda53e8e44e3dc757b22af9abef6ea
-
Filesize
640KB
MD5b8ea0d90ffee22d62d55821ad4708489
SHA1fd41d0739630a1ac13016ebb310011b34b16853d
SHA256d1a8bf854ac371b6bbbdf4b43d2301f80b02c89cce9f9d0cce400fed1ef8d118
SHA512afbb6f78a79b0e4a628e789ce4698268a0d7bbac0e38d9761538d156ae299e19611ec1778566317fab72d19231620089a4dc6ab34841aea7a8d97617adca1bef
-
Filesize
640KB
MD5b8ea0d90ffee22d62d55821ad4708489
SHA1fd41d0739630a1ac13016ebb310011b34b16853d
SHA256d1a8bf854ac371b6bbbdf4b43d2301f80b02c89cce9f9d0cce400fed1ef8d118
SHA512afbb6f78a79b0e4a628e789ce4698268a0d7bbac0e38d9761538d156ae299e19611ec1778566317fab72d19231620089a4dc6ab34841aea7a8d97617adca1bef
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59