Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
30-07-2023 23:44
Static task
static1
Behavioral task
behavioral1
Sample
ValorantExternal v3.4.1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ValorantExternal v3.4.1.exe
Resource
win10v2004-20230703-en
General
-
Target
ValorantExternal v3.4.1.exe
-
Size
978KB
-
MD5
c36eae4946702af2ff4896cc89f13823
-
SHA1
7b136099fa2e6ef706bb88d0ba7c69b4386705a1
-
SHA256
55b003f9fc3a0c8b538d04701cb2fb57441bdd24144b69f258eb1df7b74de79e
-
SHA512
308cdfe1fb9034f98bf5726608d427e6b3c25656eee5c4003ec0399ea022b88f40b87c4f4acff823f39278237457e93c93f439259212e5d4fd207c2b598292e9
-
SSDEEP
12288:me9LrhpIF+G5PMZ619CsajupXmzrgSyszQuUg4sEnduzzercMgO4WvN3NMoqd:p9fhpIwG5PMZ6pgQuUgUnOzU3NB
Malware Config
Extracted
redline
@wtflooool
94.142.138.4:80
-
auth_value
73b07b01031cf6f2730ccdf9b9448a33
Extracted
laplas
http://185.209.161.189
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 2700 svchost.exe 2776 conhost.exe 844 7z.exe 3036 7z.exe 3012 7z.exe 3008 4.exe 1692 ntlhost.exe -
Loads dropped DLL 11 IoCs
pid Process 2612 AppLaunch.exe 2612 AppLaunch.exe 2612 AppLaunch.exe 2680 cmd.exe 844 7z.exe 2680 cmd.exe 3036 7z.exe 2680 cmd.exe 3012 7z.exe 2700 svchost.exe 2700 svchost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2468 set thread context of 2612 2468 ValorantExternal v3.4.1.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2988 2468 WerFault.exe 27 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 6 Go-http-client/1.1 -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 3008 4.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2612 AppLaunch.exe 2612 AppLaunch.exe 3008 4.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 2612 AppLaunch.exe Token: SeRestorePrivilege 844 7z.exe Token: 35 844 7z.exe Token: SeSecurityPrivilege 844 7z.exe Token: SeSecurityPrivilege 844 7z.exe Token: SeRestorePrivilege 3036 7z.exe Token: 35 3036 7z.exe Token: SeSecurityPrivilege 3036 7z.exe Token: SeSecurityPrivilege 3036 7z.exe Token: SeRestorePrivilege 3012 7z.exe Token: 35 3012 7z.exe Token: SeSecurityPrivilege 3012 7z.exe Token: SeSecurityPrivilege 3012 7z.exe Token: SeDebugPrivilege 3008 4.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2612 2468 ValorantExternal v3.4.1.exe 29 PID 2468 wrote to memory of 2612 2468 ValorantExternal v3.4.1.exe 29 PID 2468 wrote to memory of 2612 2468 ValorantExternal v3.4.1.exe 29 PID 2468 wrote to memory of 2612 2468 ValorantExternal v3.4.1.exe 29 PID 2468 wrote to memory of 2612 2468 ValorantExternal v3.4.1.exe 29 PID 2468 wrote to memory of 2612 2468 ValorantExternal v3.4.1.exe 29 PID 2468 wrote to memory of 2612 2468 ValorantExternal v3.4.1.exe 29 PID 2468 wrote to memory of 2612 2468 ValorantExternal v3.4.1.exe 29 PID 2468 wrote to memory of 2612 2468 ValorantExternal v3.4.1.exe 29 PID 2468 wrote to memory of 2988 2468 ValorantExternal v3.4.1.exe 30 PID 2468 wrote to memory of 2988 2468 ValorantExternal v3.4.1.exe 30 PID 2468 wrote to memory of 2988 2468 ValorantExternal v3.4.1.exe 30 PID 2468 wrote to memory of 2988 2468 ValorantExternal v3.4.1.exe 30 PID 2612 wrote to memory of 2700 2612 AppLaunch.exe 32 PID 2612 wrote to memory of 2700 2612 AppLaunch.exe 32 PID 2612 wrote to memory of 2700 2612 AppLaunch.exe 32 PID 2612 wrote to memory of 2700 2612 AppLaunch.exe 32 PID 2612 wrote to memory of 2776 2612 AppLaunch.exe 33 PID 2612 wrote to memory of 2776 2612 AppLaunch.exe 33 PID 2612 wrote to memory of 2776 2612 AppLaunch.exe 33 PID 2612 wrote to memory of 2776 2612 AppLaunch.exe 33 PID 2612 wrote to memory of 2776 2612 AppLaunch.exe 33 PID 2612 wrote to memory of 2776 2612 AppLaunch.exe 33 PID 2612 wrote to memory of 2776 2612 AppLaunch.exe 33 PID 2776 wrote to memory of 2680 2776 conhost.exe 34 PID 2776 wrote to memory of 2680 2776 conhost.exe 34 PID 2776 wrote to memory of 2680 2776 conhost.exe 34 PID 2776 wrote to memory of 2680 2776 conhost.exe 34 PID 2776 wrote to memory of 2680 2776 conhost.exe 34 PID 2776 wrote to memory of 2680 2776 conhost.exe 34 PID 2776 wrote to memory of 2680 2776 conhost.exe 34 PID 2680 wrote to memory of 832 2680 cmd.exe 36 PID 2680 wrote to memory of 832 2680 cmd.exe 36 PID 2680 wrote to memory of 832 2680 cmd.exe 36 PID 2680 wrote to memory of 844 2680 cmd.exe 37 PID 2680 wrote to memory of 844 2680 cmd.exe 37 PID 2680 wrote to memory of 844 2680 cmd.exe 37 PID 2680 wrote to memory of 3036 2680 cmd.exe 39 PID 2680 wrote to memory of 3036 2680 cmd.exe 39 PID 2680 wrote to memory of 3036 2680 cmd.exe 39 PID 2680 wrote to memory of 3012 2680 cmd.exe 41 PID 2680 wrote to memory of 3012 2680 cmd.exe 41 PID 2680 wrote to memory of 3012 2680 cmd.exe 41 PID 2680 wrote to memory of 2996 2680 cmd.exe 42 PID 2680 wrote to memory of 2996 2680 cmd.exe 42 PID 2680 wrote to memory of 2996 2680 cmd.exe 42 PID 2680 wrote to memory of 3008 2680 cmd.exe 43 PID 2680 wrote to memory of 3008 2680 cmd.exe 43 PID 2680 wrote to memory of 3008 2680 cmd.exe 43 PID 2680 wrote to memory of 3008 2680 cmd.exe 43 PID 2680 wrote to memory of 3008 2680 cmd.exe 43 PID 2680 wrote to memory of 3008 2680 cmd.exe 43 PID 2680 wrote to memory of 3008 2680 cmd.exe 43 PID 2700 wrote to memory of 1692 2700 svchost.exe 44 PID 2700 wrote to memory of 1692 2700 svchost.exe 44 PID 2700 wrote to memory of 1692 2700 svchost.exe 44 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2996 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ValorantExternal v3.4.1.exe"C:\Users\Admin\AppData\Local\Temp\ValorantExternal v3.4.1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
PID:1692
-
-
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\mode.commode 65,105⤵PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p151971033210090161381766327410 -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Windows\system32\attrib.exeattrib +H "4.exe"5⤵
- Views/modifies file attributes
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\main\4.exe"4.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 962⤵
- Program crash
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD56736c0e1179296ff6dfa0191ac874c7a
SHA189566e42fb866eecf5e8282b967461299ab7a08c
SHA256c60ecd5714a23a727d9749652883ec95bcdb350b9f278c34ac504edb898073e4
SHA51285791acbc9d538b92ac3c10a5ee87638ee0d9dd0323aa1eaf38c1c055e4312e5722f6b07e3f450c00cd595123a9981815a8ca972432749ee830852a76177125c
-
Filesize
2.5MB
MD56736c0e1179296ff6dfa0191ac874c7a
SHA189566e42fb866eecf5e8282b967461299ab7a08c
SHA256c60ecd5714a23a727d9749652883ec95bcdb350b9f278c34ac504edb898073e4
SHA51285791acbc9d538b92ac3c10a5ee87638ee0d9dd0323aa1eaf38c1c055e4312e5722f6b07e3f450c00cd595123a9981815a8ca972432749ee830852a76177125c
-
Filesize
21KB
MD5a761e93d5993567d382af163745760ad
SHA127bd150490cd443a60bb70fa8b83299d75e02779
SHA2561edbffa93edd8b72a352aec6bbf6cd36b1045b26b8dfa141b10067aaddc8d6e1
SHA512c9e4d46a747e02b7f387d6551f2d26ce847e66a69b8a8bddb276a83388b367f2fa28153402d5f274a81fcc260840afc043c4b853dd06d87125980a49934f14fa
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
21KB
MD5a761e93d5993567d382af163745760ad
SHA127bd150490cd443a60bb70fa8b83299d75e02779
SHA2561edbffa93edd8b72a352aec6bbf6cd36b1045b26b8dfa141b10067aaddc8d6e1
SHA512c9e4d46a747e02b7f387d6551f2d26ce847e66a69b8a8bddb276a83388b367f2fa28153402d5f274a81fcc260840afc043c4b853dd06d87125980a49934f14fa
-
Filesize
2.1MB
MD54762f0b6652250641a06e2029d6dda23
SHA1bfa7925486f951f729b3ce47caa6ff52330420ad
SHA2561e9654f0b077cfb8c393cb6cfd3d2b7918d87d56eaaf14f8523a582343d13b4e
SHA51233227e64cc34f7e591f6a26b6eaef2f2b4369050e5a2c544413b8f8264114083a93fa70911810c19390ed3d1724bd73c135a2acf11f12f70892f20609593c72d
-
Filesize
9KB
MD5018ccdb718d3ad7641fecfdad0fbeb4e
SHA146cdffdea8e44b455873659a35dcd973364a84dd
SHA256708b3379e029aafb112f890a6ae10f2a4eebe52eef991d2d6136a11fe84143b5
SHA512dcd1494429ced81dfbcc83cb8c87d4cd42719d53918834e16691c0d068631ae39fe0381c668e92341a5cdccf75877c2af3ae81c66b6d37e4b149f68a06ab2803
-
Filesize
1.5MB
MD5270d4612657b69eda3ebbb1207fc8cd7
SHA1e023ff99c13c056fa7f80b55dc12f1d02df92114
SHA25683b0eb7eee4c982f034d53b7541758fac699956433baeedf9b8f4494e367b5e7
SHA5126fe46a7dd1fc6930646e3ba08306e1cfe826dcba6b7e3af1c9439157f35919739940e1d8143c6abecfa83f6b92d324764dfa8ca54dca91250b849c2cd138e6fe
-
Filesize
1.5MB
MD57cebec977eb671d25c4160ee75cbf124
SHA1e09e0e906834b7f2ec270ba589a01e455ebdf0d1
SHA256f0e78c63d52116f121709480935013c26a99bd85ba6bfd5100bc5e4411c7178e
SHA512b79c8d6d4c947fdee755ef81c5c36d657ca1b4030c8f90f906961a22968c98d8fb6e33302191c28135c2593598876b6921f766270a50063754927b4404c798d1
-
Filesize
436B
MD57f4c4965a2f78d6de87d304fdd355abf
SHA187a05c16753a036126677fe53118c07d36c0e671
SHA256ed489607187114988306637dae2b81eff225315a8a8ee221249d14430f264fdb
SHA51241c949862477065b8f537670b6747074c9e543753812fcb28b02be12b1bbf0fb8b9473ea0859fb1450fee848d62d4c70249d09f48a5e5eac15eb510b70b3f741
-
Filesize
436B
MD57f4c4965a2f78d6de87d304fdd355abf
SHA187a05c16753a036126677fe53118c07d36c0e671
SHA256ed489607187114988306637dae2b81eff225315a8a8ee221249d14430f264fdb
SHA51241c949862477065b8f537670b6747074c9e543753812fcb28b02be12b1bbf0fb8b9473ea0859fb1450fee848d62d4c70249d09f48a5e5eac15eb510b70b3f741
-
Filesize
4.0MB
MD5d076c4b5f5c42b44d583c534f78adbe7
SHA1c35478e67d490145520be73277cd72cd4e837090
SHA2562c63c61e0adaaf669c9c674edfc9081d415c05b834611944a682f120ab9559d8
SHA512b2dfcf98695e7e40578f02a104a1c2fa1de29d13b0056d3dc4a5689168546f437bfd6acbc99e3766f94efb01bac5c908f3e80795f017e1629c97b6b1026ce638
-
Filesize
4.0MB
MD5d076c4b5f5c42b44d583c534f78adbe7
SHA1c35478e67d490145520be73277cd72cd4e837090
SHA2562c63c61e0adaaf669c9c674edfc9081d415c05b834611944a682f120ab9559d8
SHA512b2dfcf98695e7e40578f02a104a1c2fa1de29d13b0056d3dc4a5689168546f437bfd6acbc99e3766f94efb01bac5c908f3e80795f017e1629c97b6b1026ce638
-
Filesize
4.0MB
MD5d076c4b5f5c42b44d583c534f78adbe7
SHA1c35478e67d490145520be73277cd72cd4e837090
SHA2562c63c61e0adaaf669c9c674edfc9081d415c05b834611944a682f120ab9559d8
SHA512b2dfcf98695e7e40578f02a104a1c2fa1de29d13b0056d3dc4a5689168546f437bfd6acbc99e3766f94efb01bac5c908f3e80795f017e1629c97b6b1026ce638
-
Filesize
528.4MB
MD52f4299d538aa4d56dab545b312547b17
SHA144bfb35b0a33410610abff6e1cb6dbfc38ca7552
SHA256f559774b1a076d17641c62b0586ba15bf43ff0cf9ad058a3ea821bce361fd76e
SHA51201a2a36f4f377ebfe53e5f1f71afe9a84f7df673bca75a464e8a65cea171d70ba1f049c75ec2fa90b7c5586ae16df86e5e035a61ad647582983fd71260813f04
-
Filesize
2.5MB
MD56736c0e1179296ff6dfa0191ac874c7a
SHA189566e42fb866eecf5e8282b967461299ab7a08c
SHA256c60ecd5714a23a727d9749652883ec95bcdb350b9f278c34ac504edb898073e4
SHA51285791acbc9d538b92ac3c10a5ee87638ee0d9dd0323aa1eaf38c1c055e4312e5722f6b07e3f450c00cd595123a9981815a8ca972432749ee830852a76177125c
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
4.0MB
MD5d076c4b5f5c42b44d583c534f78adbe7
SHA1c35478e67d490145520be73277cd72cd4e837090
SHA2562c63c61e0adaaf669c9c674edfc9081d415c05b834611944a682f120ab9559d8
SHA512b2dfcf98695e7e40578f02a104a1c2fa1de29d13b0056d3dc4a5689168546f437bfd6acbc99e3766f94efb01bac5c908f3e80795f017e1629c97b6b1026ce638
-
Filesize
4.0MB
MD5d076c4b5f5c42b44d583c534f78adbe7
SHA1c35478e67d490145520be73277cd72cd4e837090
SHA2562c63c61e0adaaf669c9c674edfc9081d415c05b834611944a682f120ab9559d8
SHA512b2dfcf98695e7e40578f02a104a1c2fa1de29d13b0056d3dc4a5689168546f437bfd6acbc99e3766f94efb01bac5c908f3e80795f017e1629c97b6b1026ce638
-
Filesize
520.9MB
MD5695459d2cc98184cb5b248d0b8228d1b
SHA10aaff29dae5187c304df7e6fdf0e5cffe0c2c33b
SHA2562a6adf1325e2a8ec83706d88c4d595d91ad7b66e261e412c29e4d89315ac8924
SHA5126884f56a25f26d5f0feba89600e4eadce47dd500ad4fe61283653ef97b965d84f842af1ddb93747a6d1a2b0ddbf1b007c970961964e24a9ee78d763cc074a6d2
-
Filesize
528.9MB
MD50d957ed6a72bdb416b0f1aeea8870d89
SHA192485d660107e2b47101dc3fdee83e08d9af51f0
SHA256716baa7db1934fd3c851c24065188c8460b67747c806f0a4c15de34eb2b7a22d
SHA512a8e719667d9b27d89766dc37583d6290a82ffcb2e8c1bb9ae35c48744a4398f32c7f9885253b20f3cd772789b1a9285d015234d4bf4dcd2f84c28db3372f0cc6