Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
29-07-2023 13:24
Behavioral task
behavioral1
Sample
df3c28e2ab0948020e93b8850dfc16b842f_JC.exe
Resource
win7-20230712-en
General
-
Target
df3c28e2ab0948020e93b8850dfc16b842f_JC.exe
-
Size
17.1MB
-
MD5
5543ec7918879f075e2714ba2aa7995b
-
SHA1
e72fc9f9fa3030ecb9e71ee81d9b1f301717db0a
-
SHA256
df3c28e2ab0948020e93b8850dfc16b842f2ed5ce7ebf18c5f536c0cabbae2d3
-
SHA512
53fc8e43b5ec22666ccda2a3c212cfb0ba366d266ee290ca9e6be232b0919048e427abe843715014a6ebb8a62a61fbdab1ae6327215a931cca340900ced1a3ee
-
SSDEEP
393216:s4wctNG7SXLKhzMEOzMjjZlguA44g7Li70+VVuNcPN/S6nr2tAj:VwJGLYPnzguA44gHZUNK6noAj
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2184-54-0x0000000000400000-0x0000000002971000-memory.dmp upx behavioral1/memory/2184-132-0x0000000000400000-0x0000000002971000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rutserv.exerfusclient.exerfusclient.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Control Panel\International\Geo\Nation rutserv.exe Key value queried \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Control Panel\International\Geo\Nation rfusclient.exe Key value queried \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Control Panel\International\Geo\Nation rfusclient.exe -
Executes dropped EXE 4 IoCs
Processes:
rfusclient.exerutserv.exerutserv.exerfusclient.exepid Process 2864 rfusclient.exe 2860 rutserv.exe 2732 rutserv.exe 2244 rfusclient.exe -
Loads dropped DLL 9 IoCs
Processes:
df3c28e2ab0948020e93b8850dfc16b842f_JC.exerfusclient.exerutserv.exerutserv.exepid Process 2184 df3c28e2ab0948020e93b8850dfc16b842f_JC.exe 2864 rfusclient.exe 2864 rfusclient.exe 2864 rfusclient.exe 2864 rfusclient.exe 2860 rutserv.exe 2860 rutserv.exe 2732 rutserv.exe 2732 rutserv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 4 IoCs
Processes:
rutserv.exedescription ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 rutserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\SysWOW64\ieframe.dll,-5723 = "The Internet" rutserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\prnfldr.dll,-8036 = "Printers" rutserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\NetworkExplorer.dll,-1 = "Network" rutserv.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
rfusclient.exerutserv.exerutserv.exerfusclient.exepid Process 2864 rfusclient.exe 2864 rfusclient.exe 2860 rutserv.exe 2860 rutserv.exe 2860 rutserv.exe 2860 rutserv.exe 2860 rutserv.exe 2860 rutserv.exe 2732 rutserv.exe 2732 rutserv.exe 2732 rutserv.exe 2732 rutserv.exe 2732 rutserv.exe 2732 rutserv.exe 2244 rfusclient.exe 2244 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
rutserv.exerutserv.exedescription pid Process Token: SeDebugPrivilege 2860 rutserv.exe Token: SeTakeOwnershipPrivilege 2732 rutserv.exe Token: SeTcbPrivilege 2732 rutserv.exe Token: SeTcbPrivilege 2732 rutserv.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
rfusclient.exepid Process 2244 rfusclient.exe 2244 rfusclient.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
rfusclient.exepid Process 2244 rfusclient.exe 2244 rfusclient.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
rutserv.exerutserv.exepid Process 2860 rutserv.exe 2860 rutserv.exe 2860 rutserv.exe 2860 rutserv.exe 2732 rutserv.exe 2732 rutserv.exe 2732 rutserv.exe 2732 rutserv.exe 2732 rutserv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
df3c28e2ab0948020e93b8850dfc16b842f_JC.exerfusclient.exerutserv.exedescription pid Process procid_target PID 2184 wrote to memory of 2864 2184 df3c28e2ab0948020e93b8850dfc16b842f_JC.exe 28 PID 2184 wrote to memory of 2864 2184 df3c28e2ab0948020e93b8850dfc16b842f_JC.exe 28 PID 2184 wrote to memory of 2864 2184 df3c28e2ab0948020e93b8850dfc16b842f_JC.exe 28 PID 2184 wrote to memory of 2864 2184 df3c28e2ab0948020e93b8850dfc16b842f_JC.exe 28 PID 2864 wrote to memory of 2860 2864 rfusclient.exe 29 PID 2864 wrote to memory of 2860 2864 rfusclient.exe 29 PID 2864 wrote to memory of 2860 2864 rfusclient.exe 29 PID 2864 wrote to memory of 2860 2864 rfusclient.exe 29 PID 2732 wrote to memory of 2244 2732 rutserv.exe 33 PID 2732 wrote to memory of 2244 2732 rutserv.exe 33 PID 2732 wrote to memory of 2244 2732 rutserv.exe 33 PID 2732 wrote to memory of 2244 2732 rutserv.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\df3c28e2ab0948020e93b8850dfc16b842f_JC.exe"C:\Users\Admin\AppData\Local\Temp\df3c28e2ab0948020e93b8850dfc16b842f_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\CFDF2F0C56\rfusclient.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\CFDF2F0C56\rfusclient.exe" -run_agent2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\CFDF2F0C56\rutserv.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\CFDF2F0C56\rutserv.exe" -run_agent3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\CFDF2F0C56\rutserv.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\CFDF2F0C56\rutserv.exe" -run_agent -second4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\CFDF2F0C56\rfusclient.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\CFDF2F0C56\rfusclient.exe" /tray /user5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2244
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD59b0e600eb09e7a86199f7ba245d1cd2b
SHA1e3e52b3e04b08e59aae74300f7d30c3d0aa27148
SHA256879180116b82210292648709982f405eae84b05e6f2ff324a6a5cc7cd512d3e7
SHA512dd1622474c48ecf5c95e7585fb30b5279cf45dfc89332531758838b05f73499f536f7cadaf529aa4fa5ae0808e30a455465829db7d13f2ee2e7d9b7bd12e17e5
-
Filesize
484B
MD5adfc444c477d1c2021a187d75f21ce72
SHA11d52b7854ab07c9b86ee955b95af9e25a43dc619
SHA25633ddc7deececb8a5ff7f7d009d61ae416b777e8fc519e0c79910027158d49580
SHA5127b226f8c503a9baeb30bdae2a300240c02046460729439c4cac14464b522c89322309f5f5c3de2e7657920433657e54a35160f3c5f40e8a0781fb7ed6021a796
-
Filesize
484B
MD5adfc444c477d1c2021a187d75f21ce72
SHA11d52b7854ab07c9b86ee955b95af9e25a43dc619
SHA25633ddc7deececb8a5ff7f7d009d61ae416b777e8fc519e0c79910027158d49580
SHA5127b226f8c503a9baeb30bdae2a300240c02046460729439c4cac14464b522c89322309f5f5c3de2e7657920433657e54a35160f3c5f40e8a0781fb7ed6021a796
-
Filesize
51KB
MD5ca8a4346b37cdd0220792885c5937b30
SHA1eef05f4b7fb5f8aabfb93d10a6451cc77b489864
SHA256ccd5b9e5947f956e880bd2285a6091dc9f1ee9b0eb8df627ec4e72b451a1c745
SHA512c286b0fa9d24a85fe63d3a3d801f135d12409736742c4fc16ba1dc15529df136577dc8975736146437dd56467576fdedb4ac50cf05ab054547504f3dc5ca0c35
-
Filesize
51KB
MD5ca8a4346b37cdd0220792885c5937b30
SHA1eef05f4b7fb5f8aabfb93d10a6451cc77b489864
SHA256ccd5b9e5947f956e880bd2285a6091dc9f1ee9b0eb8df627ec4e72b451a1c745
SHA512c286b0fa9d24a85fe63d3a3d801f135d12409736742c4fc16ba1dc15529df136577dc8975736146437dd56467576fdedb4ac50cf05ab054547504f3dc5ca0c35
-
Filesize
1.3MB
MD5d9871a6ba02aacf3d51e6c168d9c6066
SHA142012a0116a9e8aed16c7298bd43cb1206a0f0cd
SHA2567975ac81130ae8fe09caf6bef313c44fe064b67ed9205f0bd11ac165386e2f95
SHA512ae9118dac893097cd0e388ce45ff76c26b99b1cc9aea59547cc1dedf00bfbaf575f3d05317fac2f3f8b5c97896f6080bea9a90425333dbf02013eb01a002e43f
-
Filesize
1.3MB
MD5d9871a6ba02aacf3d51e6c168d9c6066
SHA142012a0116a9e8aed16c7298bd43cb1206a0f0cd
SHA2567975ac81130ae8fe09caf6bef313c44fe064b67ed9205f0bd11ac165386e2f95
SHA512ae9118dac893097cd0e388ce45ff76c26b99b1cc9aea59547cc1dedf00bfbaf575f3d05317fac2f3f8b5c97896f6080bea9a90425333dbf02013eb01a002e43f
-
Filesize
5KB
MD58806891fb2a75cd5269cc6fc2d4ca1fc
SHA139eb5d1e5d6a14d7e2f129f523eabe488d53d05a
SHA256fecf0fd7f990be47b10cf903bd6d1b1bc219a3820b328e2ba9f408305a7e67fc
SHA5123f8daca37ae924c91d98a16667aa5240ff90dfdd994a29dce6bec9ea2dc1238d851171781d0b08926598dab1eb7993c2c73c37f733e6511f0bbfa340da1dc138
-
Filesize
5KB
MD58806891fb2a75cd5269cc6fc2d4ca1fc
SHA139eb5d1e5d6a14d7e2f129f523eabe488d53d05a
SHA256fecf0fd7f990be47b10cf903bd6d1b1bc219a3820b328e2ba9f408305a7e67fc
SHA5123f8daca37ae924c91d98a16667aa5240ff90dfdd994a29dce6bec9ea2dc1238d851171781d0b08926598dab1eb7993c2c73c37f733e6511f0bbfa340da1dc138
-
Filesize
10.4MB
MD568a63168426f28bc06c7c06eac6f09d5
SHA1ae947e6b9b3322f7837396f606e64b0f372fa78c
SHA25602003563373af3215195ca0c23af03f845921fcfa31f58770927266b03c2ac40
SHA5127beabe39242237dd19606392bb7970f2eea0e8d467ee42a10e8ad3608e9b6a6aa060e4cd112fce425677dcc33ea062c6224574599351e81060c348409eeb11a6
-
Filesize
10.4MB
MD568a63168426f28bc06c7c06eac6f09d5
SHA1ae947e6b9b3322f7837396f606e64b0f372fa78c
SHA25602003563373af3215195ca0c23af03f845921fcfa31f58770927266b03c2ac40
SHA5127beabe39242237dd19606392bb7970f2eea0e8d467ee42a10e8ad3608e9b6a6aa060e4cd112fce425677dcc33ea062c6224574599351e81060c348409eeb11a6
-
Filesize
10.4MB
MD568a63168426f28bc06c7c06eac6f09d5
SHA1ae947e6b9b3322f7837396f606e64b0f372fa78c
SHA25602003563373af3215195ca0c23af03f845921fcfa31f58770927266b03c2ac40
SHA5127beabe39242237dd19606392bb7970f2eea0e8d467ee42a10e8ad3608e9b6a6aa060e4cd112fce425677dcc33ea062c6224574599351e81060c348409eeb11a6
-
Filesize
10.4MB
MD568a63168426f28bc06c7c06eac6f09d5
SHA1ae947e6b9b3322f7837396f606e64b0f372fa78c
SHA25602003563373af3215195ca0c23af03f845921fcfa31f58770927266b03c2ac40
SHA5127beabe39242237dd19606392bb7970f2eea0e8d467ee42a10e8ad3608e9b6a6aa060e4cd112fce425677dcc33ea062c6224574599351e81060c348409eeb11a6
-
Filesize
19.8MB
MD531c0bafc3f6e6c7322a7a32ac1bd87da
SHA142fd1a41e1eef5998de674ec068c702f1ee3b4f3
SHA256f2a5023cd559597a1b70a7e02345fb9c80b740377fcf7341d5df2d462efafda5
SHA512ab8dcda75a2e9c4d7dfcc23e76b3ca76b4ec5f1fbf24007bf0e9707de17461c5016ec9005dae3f62e34f586452aa145871d371536572365b35bf33b43a8d24ab
-
Filesize
19.8MB
MD531c0bafc3f6e6c7322a7a32ac1bd87da
SHA142fd1a41e1eef5998de674ec068c702f1ee3b4f3
SHA256f2a5023cd559597a1b70a7e02345fb9c80b740377fcf7341d5df2d462efafda5
SHA512ab8dcda75a2e9c4d7dfcc23e76b3ca76b4ec5f1fbf24007bf0e9707de17461c5016ec9005dae3f62e34f586452aa145871d371536572365b35bf33b43a8d24ab
-
Filesize
19.8MB
MD531c0bafc3f6e6c7322a7a32ac1bd87da
SHA142fd1a41e1eef5998de674ec068c702f1ee3b4f3
SHA256f2a5023cd559597a1b70a7e02345fb9c80b740377fcf7341d5df2d462efafda5
SHA512ab8dcda75a2e9c4d7dfcc23e76b3ca76b4ec5f1fbf24007bf0e9707de17461c5016ec9005dae3f62e34f586452aa145871d371536572365b35bf33b43a8d24ab
-
Filesize
19.8MB
MD531c0bafc3f6e6c7322a7a32ac1bd87da
SHA142fd1a41e1eef5998de674ec068c702f1ee3b4f3
SHA256f2a5023cd559597a1b70a7e02345fb9c80b740377fcf7341d5df2d462efafda5
SHA512ab8dcda75a2e9c4d7dfcc23e76b3ca76b4ec5f1fbf24007bf0e9707de17461c5016ec9005dae3f62e34f586452aa145871d371536572365b35bf33b43a8d24ab
-
Filesize
9KB
MD5b9a55a7b2ba6ac1586019ff0731b7ac2
SHA15b5e2354151d4151d844152f86bde86b6a80edd9
SHA256bd4b90278ddbb9fa01b2c82ca5eb9430560c1ed15c666a8a4ac4139dddb564d0
SHA512cdcbdd67da21ac256cece0acc012ed20274e308d434b80607a5dc169d52649065636fa50e4e1387e496247eb36a7bf487fd69ea30efe512ca13b7ca69b4c6fad
-
Filesize
9KB
MD5b9a55a7b2ba6ac1586019ff0731b7ac2
SHA15b5e2354151d4151d844152f86bde86b6a80edd9
SHA256bd4b90278ddbb9fa01b2c82ca5eb9430560c1ed15c666a8a4ac4139dddb564d0
SHA512cdcbdd67da21ac256cece0acc012ed20274e308d434b80607a5dc169d52649065636fa50e4e1387e496247eb36a7bf487fd69ea30efe512ca13b7ca69b4c6fad
-
Filesize
337KB
MD5fe6d8feaeae983513e0a9a223604041b
SHA1efa54892735d331a24b707068040e5a697455cee
SHA256af029ac96a935594de92f771ef86c3e92fe22d08cb78ebf815cbfd4ef0cb94b0
SHA512a78b1643c9ea02004aabefc9c72d418ee3292edb63a90002608ac02ad4e1a92d86b0fc95e66d6d4b49404c1fc75845d0e6262821b6052ab037b4542fcaf2047d
-
Filesize
337KB
MD5fe6d8feaeae983513e0a9a223604041b
SHA1efa54892735d331a24b707068040e5a697455cee
SHA256af029ac96a935594de92f771ef86c3e92fe22d08cb78ebf815cbfd4ef0cb94b0
SHA512a78b1643c9ea02004aabefc9c72d418ee3292edb63a90002608ac02ad4e1a92d86b0fc95e66d6d4b49404c1fc75845d0e6262821b6052ab037b4542fcaf2047d
-
Filesize
380KB
MD541acd8b6d9d80a61f2f686850e3d676a
SHA138428a08915cf72dd2eca25b3d87613d9aa027dd
SHA25636993fc3312ce757c8adeca3e5969e1fcc11d5b51b12c458ba8d54d73b64d4e7
SHA512d174638965ec781cbcb2927ceafb295c3176dc78da8938467faca3e512a42fe71a9dc1070f23e1c95f0b7c157fff3b00a8b572c39e4670713564f1310360ed23
-
Filesize
380KB
MD541acd8b6d9d80a61f2f686850e3d676a
SHA138428a08915cf72dd2eca25b3d87613d9aa027dd
SHA25636993fc3312ce757c8adeca3e5969e1fcc11d5b51b12c458ba8d54d73b64d4e7
SHA512d174638965ec781cbcb2927ceafb295c3176dc78da8938467faca3e512a42fe71a9dc1070f23e1c95f0b7c157fff3b00a8b572c39e4670713564f1310360ed23
-
Filesize
1.6MB
MD52ac39d6990170ca37a735f2f15f970e8
SHA18148a9cdc6b3fe6492281ebad79636433a6064ab
SHA2560961d83cb25e1a50d5c0ec2f9fb0d17f2504dae0b22a865f6e1ea8e987e1c6fa
SHA5127e30fde909d5f8efd6c2e40e125525697267273163ac35cf53561a2bd32e5dad8e4fba32905f53e422c9c73b8ad9a0c151f8d36042c5f156b50bf42dc21a9cee
-
Filesize
1.6MB
MD52ac39d6990170ca37a735f2f15f970e8
SHA18148a9cdc6b3fe6492281ebad79636433a6064ab
SHA2560961d83cb25e1a50d5c0ec2f9fb0d17f2504dae0b22a865f6e1ea8e987e1c6fa
SHA5127e30fde909d5f8efd6c2e40e125525697267273163ac35cf53561a2bd32e5dad8e4fba32905f53e422c9c73b8ad9a0c151f8d36042c5f156b50bf42dc21a9cee
-
Filesize
260KB
MD58a683f90a78778fba037565588a6f752
SHA1011939c1fa7b73272db340c32386a13e140adc6a
SHA256bd520007864b44e0bda7a466384d12c3c3f328326cf3549ba1853a58ccdbc99d
SHA5129280fbb121f8b94f57560d1be3bcfe5e7c308d54dac278f13ea6c00256444fb9f17f543dd0d32c9844460818c1a50d83b26ce51c79698e9ca7a304652a3f5ea9
-
Filesize
260KB
MD58a683f90a78778fba037565588a6f752
SHA1011939c1fa7b73272db340c32386a13e140adc6a
SHA256bd520007864b44e0bda7a466384d12c3c3f328326cf3549ba1853a58ccdbc99d
SHA5129280fbb121f8b94f57560d1be3bcfe5e7c308d54dac278f13ea6c00256444fb9f17f543dd0d32c9844460818c1a50d83b26ce51c79698e9ca7a304652a3f5ea9
-
Filesize
365KB
MD5c9d412c1d30abb9d61151a10371f4140
SHA187120faa6b859f5e23f7344f9547b2fc228af15b
SHA256f3465ce8a23db5e8228eed5a60a6f7a096d1a9adf3012c39bc6d81d4e57e8e9e
SHA5121c020afa89cdae55f4dcb80a455dc1b352f40455142f3947ed29c3e3d51fbd465b6e0ea16cd103186c252783a3f2a7f7c417e4df5727d9b2db511b650308face
-
Filesize
365KB
MD5c9d412c1d30abb9d61151a10371f4140
SHA187120faa6b859f5e23f7344f9547b2fc228af15b
SHA256f3465ce8a23db5e8228eed5a60a6f7a096d1a9adf3012c39bc6d81d4e57e8e9e
SHA5121c020afa89cdae55f4dcb80a455dc1b352f40455142f3947ed29c3e3d51fbd465b6e0ea16cd103186c252783a3f2a7f7c417e4df5727d9b2db511b650308face
-
Filesize
860KB
MD5a59f69797c42324540e26c7c7998c18c
SHA17f7bc5bc62a8744f87a7d2e30cc6dd74c72e19b4
SHA25683e1c1eb55bfd0f2d85d41c1e4dee65046b064ccb263ec7f412a5f329c75cfd1
SHA512837f244e6b70658974506ac35bd3ee2d413b89fe4b26e75f4a61cc7bec63e999c9c2cffb690ad567f74962bab13f2f5471300cd0e0cfe61bb1084072cb55c38b
-
Filesize
860KB
MD5a59f69797c42324540e26c7c7998c18c
SHA17f7bc5bc62a8744f87a7d2e30cc6dd74c72e19b4
SHA25683e1c1eb55bfd0f2d85d41c1e4dee65046b064ccb263ec7f412a5f329c75cfd1
SHA512837f244e6b70658974506ac35bd3ee2d413b89fe4b26e75f4a61cc7bec63e999c9c2cffb690ad567f74962bab13f2f5471300cd0e0cfe61bb1084072cb55c38b
-
Filesize
1.3MB
MD5d9871a6ba02aacf3d51e6c168d9c6066
SHA142012a0116a9e8aed16c7298bd43cb1206a0f0cd
SHA2567975ac81130ae8fe09caf6bef313c44fe064b67ed9205f0bd11ac165386e2f95
SHA512ae9118dac893097cd0e388ce45ff76c26b99b1cc9aea59547cc1dedf00bfbaf575f3d05317fac2f3f8b5c97896f6080bea9a90425333dbf02013eb01a002e43f
-
Filesize
1.3MB
MD5d9871a6ba02aacf3d51e6c168d9c6066
SHA142012a0116a9e8aed16c7298bd43cb1206a0f0cd
SHA2567975ac81130ae8fe09caf6bef313c44fe064b67ed9205f0bd11ac165386e2f95
SHA512ae9118dac893097cd0e388ce45ff76c26b99b1cc9aea59547cc1dedf00bfbaf575f3d05317fac2f3f8b5c97896f6080bea9a90425333dbf02013eb01a002e43f
-
Filesize
10.4MB
MD568a63168426f28bc06c7c06eac6f09d5
SHA1ae947e6b9b3322f7837396f606e64b0f372fa78c
SHA25602003563373af3215195ca0c23af03f845921fcfa31f58770927266b03c2ac40
SHA5127beabe39242237dd19606392bb7970f2eea0e8d467ee42a10e8ad3608e9b6a6aa060e4cd112fce425677dcc33ea062c6224574599351e81060c348409eeb11a6
-
Filesize
19.8MB
MD531c0bafc3f6e6c7322a7a32ac1bd87da
SHA142fd1a41e1eef5998de674ec068c702f1ee3b4f3
SHA256f2a5023cd559597a1b70a7e02345fb9c80b740377fcf7341d5df2d462efafda5
SHA512ab8dcda75a2e9c4d7dfcc23e76b3ca76b4ec5f1fbf24007bf0e9707de17461c5016ec9005dae3f62e34f586452aa145871d371536572365b35bf33b43a8d24ab
-
Filesize
19.8MB
MD531c0bafc3f6e6c7322a7a32ac1bd87da
SHA142fd1a41e1eef5998de674ec068c702f1ee3b4f3
SHA256f2a5023cd559597a1b70a7e02345fb9c80b740377fcf7341d5df2d462efafda5
SHA512ab8dcda75a2e9c4d7dfcc23e76b3ca76b4ec5f1fbf24007bf0e9707de17461c5016ec9005dae3f62e34f586452aa145871d371536572365b35bf33b43a8d24ab
-
Filesize
19.8MB
MD531c0bafc3f6e6c7322a7a32ac1bd87da
SHA142fd1a41e1eef5998de674ec068c702f1ee3b4f3
SHA256f2a5023cd559597a1b70a7e02345fb9c80b740377fcf7341d5df2d462efafda5
SHA512ab8dcda75a2e9c4d7dfcc23e76b3ca76b4ec5f1fbf24007bf0e9707de17461c5016ec9005dae3f62e34f586452aa145871d371536572365b35bf33b43a8d24ab
-
Filesize
19.8MB
MD531c0bafc3f6e6c7322a7a32ac1bd87da
SHA142fd1a41e1eef5998de674ec068c702f1ee3b4f3
SHA256f2a5023cd559597a1b70a7e02345fb9c80b740377fcf7341d5df2d462efafda5
SHA512ab8dcda75a2e9c4d7dfcc23e76b3ca76b4ec5f1fbf24007bf0e9707de17461c5016ec9005dae3f62e34f586452aa145871d371536572365b35bf33b43a8d24ab
-
Filesize
337KB
MD5fe6d8feaeae983513e0a9a223604041b
SHA1efa54892735d331a24b707068040e5a697455cee
SHA256af029ac96a935594de92f771ef86c3e92fe22d08cb78ebf815cbfd4ef0cb94b0
SHA512a78b1643c9ea02004aabefc9c72d418ee3292edb63a90002608ac02ad4e1a92d86b0fc95e66d6d4b49404c1fc75845d0e6262821b6052ab037b4542fcaf2047d
-
Filesize
337KB
MD5fe6d8feaeae983513e0a9a223604041b
SHA1efa54892735d331a24b707068040e5a697455cee
SHA256af029ac96a935594de92f771ef86c3e92fe22d08cb78ebf815cbfd4ef0cb94b0
SHA512a78b1643c9ea02004aabefc9c72d418ee3292edb63a90002608ac02ad4e1a92d86b0fc95e66d6d4b49404c1fc75845d0e6262821b6052ab037b4542fcaf2047d