Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 04:04
Behavioral task
behavioral1
Sample
agent-7.1.7.0 (1).exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
out.exe
Resource
win10v2004-20231215-en
General
-
Target
agent-7.1.7.0 (1).exe
-
Size
17.1MB
-
MD5
254e7d77f5a53bd4094885703d2cf85e
-
SHA1
36dd3760caec9f0f3caee51709668e7f575c759e
-
SHA256
9c1228a391859ca63161ace42cc9b9024df443529828a89311dc9b675e3a916e
-
SHA512
4790d86f8d389bb578e8edc08bd5ee60d5dfd7c13fc1da96ae3c575ec1c536fc664edf2e5126777a95813723e0260c79691ca63911144322b1baf87e7c851541
-
SSDEEP
393216:g4wcVTVM9WdAtO2X8T5M89qkfNRIjd6FsqN/OyBnuvH6p0:BwK9dAt58ThqppU/O2wH5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rfusclient.exeagent-7.1.7.0 (1).exerfusclient.exerutserv.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation rfusclient.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation agent-7.1.7.0 (1).exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation rfusclient.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation rutserv.exe -
Executes dropped EXE 4 IoCs
Processes:
rfusclient.exerutserv.exerutserv.exerfusclient.exepid Process 1576 rfusclient.exe 5020 rutserv.exe 3148 rutserv.exe 1988 rfusclient.exe -
Loads dropped DLL 4 IoCs
Processes:
rutserv.exerutserv.exepid Process 5020 rutserv.exe 5020 rutserv.exe 3148 rutserv.exe 3148 rutserv.exe -
Processes:
resource yara_rule behavioral1/memory/5096-0-0x0000000000400000-0x000000000296D000-memory.dmp upx behavioral1/memory/5096-66-0x0000000000400000-0x000000000296D000-memory.dmp upx -
Drops file in System32 directory 8 IoCs
Processes:
rutserv.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\26C212D9399727259664BDFCA073966E_C5856A5EB1E3B74AE8014850A678CDBF rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3EC49180A59F0C351C30F112AD97CFA5_248D75C56270E62EB694EC79FE3D3584 rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3EC49180A59F0C351C30F112AD97CFA5_248D75C56270E62EB694EC79FE3D3584 rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_C5856A5EB1E3B74AE8014850A678CDBF rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content rutserv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 45 IoCs
Processes:
rutserv.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs rutserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\ieframe.dll,-5723 = "The Internet" rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust rutserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\prnfldr.dll,-8036 = "Printers" rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates rutserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\windows.storage.dll,-9216 = "This PC" rutserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\NetworkExplorer.dll,-1 = "Network" rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs rutserv.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
rfusclient.exerutserv.exerutserv.exerfusclient.exepid Process 1576 rfusclient.exe 1576 rfusclient.exe 5020 rutserv.exe 5020 rutserv.exe 5020 rutserv.exe 5020 rutserv.exe 5020 rutserv.exe 5020 rutserv.exe 5020 rutserv.exe 5020 rutserv.exe 3148 rutserv.exe 3148 rutserv.exe 3148 rutserv.exe 3148 rutserv.exe 3148 rutserv.exe 3148 rutserv.exe 3148 rutserv.exe 3148 rutserv.exe 1988 rfusclient.exe 1988 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
rutserv.exerutserv.exedescription pid Process Token: SeDebugPrivilege 5020 rutserv.exe Token: SeTakeOwnershipPrivilege 3148 rutserv.exe Token: SeTcbPrivilege 3148 rutserv.exe Token: SeTcbPrivilege 3148 rutserv.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
rfusclient.exepid Process 1988 rfusclient.exe 1988 rfusclient.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
rfusclient.exepid Process 1988 rfusclient.exe 1988 rfusclient.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
rutserv.exerutserv.exepid Process 5020 rutserv.exe 5020 rutserv.exe 5020 rutserv.exe 5020 rutserv.exe 3148 rutserv.exe 3148 rutserv.exe 3148 rutserv.exe 3148 rutserv.exe 3148 rutserv.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
agent-7.1.7.0 (1).exerfusclient.exerutserv.exedescription pid Process procid_target PID 5096 wrote to memory of 1576 5096 agent-7.1.7.0 (1).exe 91 PID 5096 wrote to memory of 1576 5096 agent-7.1.7.0 (1).exe 91 PID 5096 wrote to memory of 1576 5096 agent-7.1.7.0 (1).exe 91 PID 1576 wrote to memory of 5020 1576 rfusclient.exe 92 PID 1576 wrote to memory of 5020 1576 rfusclient.exe 92 PID 1576 wrote to memory of 5020 1576 rfusclient.exe 92 PID 3148 wrote to memory of 1988 3148 rutserv.exe 98 PID 3148 wrote to memory of 1988 3148 rutserv.exe 98 PID 3148 wrote to memory of 1988 3148 rutserv.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\agent-7.1.7.0 (1).exe"C:\Users\Admin\AppData\Local\Temp\agent-7.1.7.0 (1).exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\43F629E616\rfusclient.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\43F629E616\rfusclient.exe" -run_agent2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\43F629E616\rutserv.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\43F629E616\rutserv.exe" -run_agent3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5020 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\43F629E616\rutserv.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\43F629E616\rutserv.exe" -run_agent -second4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\43F629E616\rfusclient.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70170\43F629E616\rfusclient.exe" /tray /user5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1988
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD59b0e600eb09e7a86199f7ba245d1cd2b
SHA1e3e52b3e04b08e59aae74300f7d30c3d0aa27148
SHA256879180116b82210292648709982f405eae84b05e6f2ff324a6a5cc7cd512d3e7
SHA512dd1622474c48ecf5c95e7585fb30b5279cf45dfc89332531758838b05f73499f536f7cadaf529aa4fa5ae0808e30a455465829db7d13f2ee2e7d9b7bd12e17e5
-
Filesize
51KB
MD5ca8a4346b37cdd0220792885c5937b30
SHA1eef05f4b7fb5f8aabfb93d10a6451cc77b489864
SHA256ccd5b9e5947f956e880bd2285a6091dc9f1ee9b0eb8df627ec4e72b451a1c745
SHA512c286b0fa9d24a85fe63d3a3d801f135d12409736742c4fc16ba1dc15529df136577dc8975736146437dd56467576fdedb4ac50cf05ab054547504f3dc5ca0c35
-
Filesize
587KB
MD56bd25997924b153f2521e13b9682ad04
SHA10f34b1dbebfbb05edd284840165c7dd3059fc19a
SHA256242ec51f06b8b7f5559ad68b9576f9a7a63b5c6fb4911fc54274fcc86b6bcfaa
SHA5127ae54a465bf51de16c2fbbdc8b54ae2fc0ac816406819c536105a28aac745141f5e02f0e790a1c9d8dc341459161cfd2b6efbacdebd81da5c19f34a3c2ca3460
-
Filesize
372KB
MD546c2519b5a7e829b68c06866586b12fe
SHA1b52f2764f7f31bcb8377c289c412cfba88366e79
SHA2569e832f5ff121e89c8266df56e2af25a7fe79edb4bfe6bce65efb0b5c3d51c26f
SHA512860d22c096d6c243748630a9ccc56b721cdc84bc4188c30e1e9de398cbb8c7211e5370a4e7694daae768a6a244382d34762069cc3404a0d1e6d8493e9b9f619f
-
Filesize
371KB
MD5d750e06a043b93f925b7906b77126bc2
SHA10c330b5fc971fbe865905a04597de7991082bf13
SHA256738bd5c75a221614ea87daa50defa1270c15513dc664482a1baaccf14579964a
SHA512ceebd64aa1094d5fa378c6b22bc1ab11ea677877e260c00335817b00a99c845f916f202cf686abf9b5b1e1a2f10b844f5c14734a6bc0a3bc3bfabcbc36a4815d
-
Filesize
178KB
MD52868484dfbe0bb27cdee4f66542867a6
SHA14eb39e24077157182f5703471b272fd414d249aa
SHA256135b606c178e059a5205c8b2dfff2e989b7b672f65c256f8dea323e59fa6757a
SHA512ca56de663eeea360be1e7f037193edb752c953bdca821ae6ff8cad4dcd0bbac0e9f6fedda537c5c7b833b12c0f8f702a8d075e24566e721ea9fafce994899587
-
Filesize
517KB
MD5ea5b4d43375d7cc13e37455fa9fb8dee
SHA1bd75b3b3456e14eec88f9aeb4d22de819b28f269
SHA256c6a660522be1a31da3de23a441d714e68fc340dc6a70ef809ed42748d7e5c0d5
SHA512b936ec906dfea5eaf17a909d74e831987cdb327ee361881ab9f886619177d77a6ccca1e8d92148e66cfa8d7bc548ac3b8b3bedb497df867bd3267f9dc69d9014
-
Filesize
338KB
MD5d6bfbe90d64951087460806f10f3e03e
SHA1e9c2eef034d22bc453277555a3354284db1e8e1a
SHA2561e555e1b869c16cb76a7dc61f773fe60d104338dc6a362ecb8924cc0b4ed4e5b
SHA51272ec34f2926061237d59923a27ddaf1d435d81855cc25069875e75b2162078a3a7f3c842a0e181f3cc0b72ce3f7ef92f278a65226f632696edc989638a7d5317
-
Filesize
236KB
MD536f3f5f792ca165be9a3c617584f5ed9
SHA1e39353fd0a1b6b6cd203922eabcc056f4523a129
SHA2568faa4dd39dc604edae6c372339f6b23f2e4baf9348f9269cb8e446c637a01eb0
SHA5124d742b514d7782045dcb06e0516805bba8c36149a5b3f84d84f205f18d85dc1b228403408fe780c24e881ac7a7b6fa1dfeb4eb377a5ceda6e9933425c76da13f
-
Filesize
34KB
MD51d2f1994a9347cb515895f89fc5a9670
SHA15f84da6a60fab53f068f3a8fe40efa5644727772
SHA25606239293e93bf8df21ac365acd124be9e5c7073690b6e1917ab8751dbcdd1210
SHA51296225451f67be9ed8c5f9587569db48a47b23d8980147284004bff27fe04d06be5f3e8ac99d17949a3050c01360e6443b5f936ef4321fc9cb81ba0df234b4834
-
Filesize
521KB
MD5008ecee2b9a6c9c7f6af4839f2b09aaf
SHA19966e9cf2c8cc7c57d4f6ac0a668ab35fee40986
SHA256835cd97d1f2a3a0c309539d6a25937a764d49b60df736871d391fee5b5a9d8af
SHA512466d79ccf6832e31425ac7665ae6e51fe22e9560c1c3451c3bec4e79d92813b496b140765f74a167f24fbeae6cfb4890e3fde825a6e9c0064b4fda39a944e388
-
Filesize
89KB
MD55a9692e071427be5db23ee4f49e4eebb
SHA123439f077872377d2e28d6a1f1af3fee0d5154a5
SHA256725efe5be1e4a3e3c42a5a4ca33bc33911c9916b9ceb920b52a0f9d9dab02041
SHA5128172f460dfec7beb5dfec4d370fbc68213ac8db5a11e9f940ead5e040cd5fd19dd0fb491118981da5b74fa24c4cf0d3681b433e8d12a25aec0d8bec1095478f9
-
Filesize
25KB
MD5aecdcc1bf6160b63d5cc962ded7617f3
SHA17554dadd436f5927a554176bcd4c25a562571710
SHA2567addfafa69f11e84eef2a83cd042ef5ac4e42e971730f17246cc5631c3d2a4db
SHA5125844ac999abab473a7228acca73f39fc1b0a95a7b57112f7ae25613d62b107c49da4a69c52048dd449a50d959e0fd912cb7b276b38c111daafe2fb562efba4c2
-
Filesize
315KB
MD572c4718dab5d985bcf5fec265b6361fa
SHA16a9905159d3b8858700ed9372e420fcf69f92c46
SHA256687dd67f50b33f2058c5da6990afb50d3d10a0ddd0f68f28687387ace4093f07
SHA51270c9b2c1d66a89552d394b3d7725eaa393f7a1ba39f63ac7bc467b634bdbcdddacdccfdff6a26e4c686284c3063e8885589b7d0529a300d432dfb917e9d5caa2
-
Filesize
337KB
MD5fe6d8feaeae983513e0a9a223604041b
SHA1efa54892735d331a24b707068040e5a697455cee
SHA256af029ac96a935594de92f771ef86c3e92fe22d08cb78ebf815cbfd4ef0cb94b0
SHA512a78b1643c9ea02004aabefc9c72d418ee3292edb63a90002608ac02ad4e1a92d86b0fc95e66d6d4b49404c1fc75845d0e6262821b6052ab037b4542fcaf2047d
-
Filesize
276KB
MD5485bbdbf231ddfba36b8e0875865788e
SHA1eb9634abb70fae005df8066f1610566df5da65a0
SHA25600e33ff60994e31dbcef70c2a0b76057d2e46ffa993c28a11a530502e5870144
SHA5125838eba2d1e59a3c91218036df4f723de37e467abc646fe5d3cf6b52e8a6cb7db29f153cff76b76c5a73605cb7924d279aade71654e202edc3abd3e11fd716c9
-
Filesize
258KB
MD5b22866d98eb7d9338977cbe2e6844595
SHA169762d9ff802297705505cddc016a380d949e3ab
SHA2564c0280552e8b25e2885059612e0875e2dd3560e39ddf188a24982974e635fe04
SHA512e2b691cd918c1cdf3159f9cc3d3b49480fd54e3da75ecb99a84582573de572067a36d2982e97a06e1789694a52e89f622352b13db045ff19a1b93369092e830f
-
Filesize
320KB
MD5f3b62ff8c5ca76cf59469bf67205899f
SHA198614f05b5c050338409bead370c018aa6f42791
SHA2566e50712c6152917ae55af917c3552f6d34067559dd459e0df8e8bc41d73756f0
SHA512014440e43aeb306bf57c73c7919a4cbe85a56083c5328a5181e571adecd7435716d1d7785e13a37658d46c1ef2e9a23b8ff9a7345b5aca44762799de16826c2b
-
Filesize
380KB
MD541acd8b6d9d80a61f2f686850e3d676a
SHA138428a08915cf72dd2eca25b3d87613d9aa027dd
SHA25636993fc3312ce757c8adeca3e5969e1fcc11d5b51b12c458ba8d54d73b64d4e7
SHA512d174638965ec781cbcb2927ceafb295c3176dc78da8938467faca3e512a42fe71a9dc1070f23e1c95f0b7c157fff3b00a8b572c39e4670713564f1310360ed23
-
Filesize
337KB
MD51117ef2417f9a3ce02c6f04ee4268387
SHA18a1dfede2b0083bf43774dc877ac3c71d3425672
SHA2569b975c8c9733296da8f47a6eb82117b1f26aa36fffd713a7efe08cf2bdbb5364
SHA512e607e7d48464e975654558e301b8af68a37a044b161d9be8baae122880a575e3de800aed96c4377f82ad75f9d3f712f523230ff563ab1c1851f59e2cd1714fa4
-
Filesize
384KB
MD523ee62cd468458a41b7e12144a6965f9
SHA1728f5d2aea849081153ec94e4434d2d009fb510c
SHA2569237f7b3a5baca84bad1d45823478c828e11d0682bf232637776e88012b5ccb0
SHA5128b690a16d0a1764d0db20b5d114d4942d5507c04590ee889b41d9d765a25f8976334b3932ee4729459323ae3572f7b482d79165ad5851f5c09ada226a2121590
-
Filesize
235KB
MD5ef0a1094a0c316863d0dc61cfe4caaf3
SHA1ea10b607d2d8ecfaf248e5487f34c182bfefd128
SHA256a315a2f5afe14b3300e13a9e1405aa1862663e85dece7f914e5361aad16d6020
SHA51268d5bb34647ecf0470f0a291900e939448385cd7e12bd50f87c3f15e46219fd77325ddc7c9ed7bf03c109db392836139ef90fb37b48a9228e62ea85ca6530c41
-
Filesize
260KB
MD58a683f90a78778fba037565588a6f752
SHA1011939c1fa7b73272db340c32386a13e140adc6a
SHA256bd520007864b44e0bda7a466384d12c3c3f328326cf3549ba1853a58ccdbc99d
SHA5129280fbb121f8b94f57560d1be3bcfe5e7c308d54dac278f13ea6c00256444fb9f17f543dd0d32c9844460818c1a50d83b26ce51c79698e9ca7a304652a3f5ea9
-
Filesize
106KB
MD5d3df47b14b866dd94a7a6f150aa91110
SHA1ff658974319e5fcc18ed0a5fbaea460db0f95824
SHA25698f64a9619cb5c637d869a97dc9d81b1e79dfbdc8a4393fb48c2ad129b4cf865
SHA5122552b66c97d769dc242b982eca47c97e41cadadda0577d6a2c257eb338bcb8457ca8f881a3c984d8014cd070dd4d3e27cfe88cf278298d72a8419104ceb5317e
-
Filesize
343KB
MD5233e86a3f163453e00d9d1181296c6ab
SHA13fd696430087839fd6e5ca37dc75d7bcaa8e5a5a
SHA256c2bc8d2edcf15522c3274cfbbbc3e8872c8595594270463ab79a96160e5fdea6
SHA512f1063b143c14d972f69dbc37a6386fe2ecca74bad08b9e7672eceb2c092a31052f383179fa1c2f19cc6ede13be61bd79454837b6ae6ff088210f4cc694627765
-
Filesize
214KB
MD511936d08ef0b6d4ec9035811d989cc1a
SHA170d8393bce3017fc38f7b36bd43ba47404d9839b
SHA256aea8d6b6c98820f8c2867c39deef0d727178179c9b960c78a3668adb175425e1
SHA51215221a58c333705c9904980beb46aacdf6900ae3fa07052f51ff340fd0d7ee5efea47dc46462dded42934db084fb7de50789ad530bec5f5998e10544b99f7e8a
-
Filesize
509KB
MD5afef64f9665b4447a26a630923530d96
SHA1020166db6524f8e648a49501889d194c16abd5a1
SHA256134d04c568841ff5c40459c445aecb18af38bb6457e1f63a1af11c8476f196b2
SHA5126e11050fc30fb415eee8631f2a7196b60c34bd218670a88bb6863c098cb47734948cbff5f08992e6b2590202fd732a43e0dd7bc09430ad3389a8c496780bf170
-
Filesize
252KB
MD5c798777046c2785ce330501cb0475ad9
SHA13261023fe9a458b1e5abb86e10a1b25539727c43
SHA256251173c40f231bab8ca7bca004595e66959b4f4ae2c3c2e76030dbaec4083b62
SHA512053780826f3e7178bf1aedf36790e3e3d37fd7972da77b7b24d358e6657ce6b576913398e9f91ceef17299643c7294c3638831109e8c5371d86fb44c0908dc75