Analysis
-
max time kernel
143s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe
Resource
win10v2004-20231215-en
General
-
Target
1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe
-
Size
84.1MB
-
MD5
3f1e9c8ffb6a2ece33792a68ef1f6e9a
-
SHA1
ef18a53db0856755de320e4982e8c492e441bf65
-
SHA256
1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d
-
SHA512
4091ef3c14fb6d2e84915357a0bdc6765345180129a36420f0144e33ceac8a4a34429ed5ad3d7b24317737cb40254f54cd99823d81686f113d139f4de95cb173
-
SSDEEP
1572864:tgyw4TuSCiBem/SSde6JUgdjlROqNnVyizOAkR5TwoDTTwoD5:tguT1CZzSLjTOMR6YoDQoD5
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2164 irsetup.exe 1204 SRLicenseManager_Setup.exe 2956 irsetup.exe 2936 SetACL.exe 1112 SRLicenseManager.exe 1968 SRLicenseManager.exe -
Loads dropped DLL 16 IoCs
pid Process 1104 1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe 1104 1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe 1104 1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe 1104 1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe 2164 irsetup.exe 2164 irsetup.exe 1204 SRLicenseManager_Setup.exe 1204 SRLicenseManager_Setup.exe 1204 SRLicenseManager_Setup.exe 1204 SRLicenseManager_Setup.exe 2956 irsetup.exe 2956 irsetup.exe 2956 irsetup.exe 2956 irsetup.exe 932 cmd.exe 2164 irsetup.exe -
resource yara_rule behavioral1/files/0x000b00000001494f-3.dat upx behavioral1/memory/1104-15-0x0000000002C00000-0x0000000002FCB000-memory.dmp upx behavioral1/files/0x000b00000001494f-14.dat upx behavioral1/memory/2164-21-0x0000000000400000-0x00000000007CB000-memory.dmp upx behavioral1/files/0x000b00000001494f-20.dat upx behavioral1/files/0x000b00000001494f-12.dat upx behavioral1/files/0x000b00000001494f-10.dat upx behavioral1/files/0x000b00000001494f-7.dat upx behavioral1/files/0x000b00000001494f-6.dat upx behavioral1/memory/2164-36-0x0000000000400000-0x00000000007CB000-memory.dmp upx behavioral1/memory/2164-40-0x0000000000400000-0x00000000007CB000-memory.dmp upx behavioral1/memory/2164-42-0x0000000000400000-0x00000000007CB000-memory.dmp upx behavioral1/files/0x000600000001658a-52.dat upx behavioral1/files/0x000600000001658a-64.dat upx behavioral1/files/0x000600000001658a-62.dat upx behavioral1/memory/2956-82-0x0000000000400000-0x00000000007CB000-memory.dmp upx behavioral1/files/0x000600000001658a-67.dat upx behavioral1/files/0x000600000001658a-60.dat upx behavioral1/files/0x000600000001658a-57.dat upx behavioral1/memory/2164-54-0x0000000000400000-0x00000000007CB000-memory.dmp upx behavioral1/memory/2956-109-0x0000000000400000-0x00000000007CB000-memory.dmp upx behavioral1/memory/2164-131-0x0000000000400000-0x00000000007CB000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Stage Research\SRLicenseManager.exe irsetup.exe File opened for modification C:\Program Files (x86)\Stage Research\SRLicenseManager.exe irsetup.exe File created C:\Program Files (x86)\Stage Research\SRWebsite.ico irsetup.exe File opened for modification C:\Program Files (x86)\Stage Research\SRWebsite.ico irsetup.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Setup_SoftPlot9_Log.txt irsetup.exe File opened for modification C:\Windows\Setup_SoftPlot9_Log.txt irsetup.exe File created C:\Windows\SRLicenseManager Setup Log.txt irsetup.exe File opened for modification C:\Windows\SRLicenseManager Setup Log.txt irsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 2936 SetACL.exe Token: SeRestorePrivilege 2936 SetACL.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2164 irsetup.exe 2164 irsetup.exe 2956 irsetup.exe 2956 irsetup.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1104 wrote to memory of 2164 1104 1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe 28 PID 1104 wrote to memory of 2164 1104 1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe 28 PID 1104 wrote to memory of 2164 1104 1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe 28 PID 1104 wrote to memory of 2164 1104 1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe 28 PID 1104 wrote to memory of 2164 1104 1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe 28 PID 1104 wrote to memory of 2164 1104 1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe 28 PID 1104 wrote to memory of 2164 1104 1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe 28 PID 2164 wrote to memory of 1204 2164 irsetup.exe 29 PID 2164 wrote to memory of 1204 2164 irsetup.exe 29 PID 2164 wrote to memory of 1204 2164 irsetup.exe 29 PID 2164 wrote to memory of 1204 2164 irsetup.exe 29 PID 2164 wrote to memory of 1204 2164 irsetup.exe 29 PID 2164 wrote to memory of 1204 2164 irsetup.exe 29 PID 2164 wrote to memory of 1204 2164 irsetup.exe 29 PID 1204 wrote to memory of 2956 1204 SRLicenseManager_Setup.exe 30 PID 1204 wrote to memory of 2956 1204 SRLicenseManager_Setup.exe 30 PID 1204 wrote to memory of 2956 1204 SRLicenseManager_Setup.exe 30 PID 1204 wrote to memory of 2956 1204 SRLicenseManager_Setup.exe 30 PID 1204 wrote to memory of 2956 1204 SRLicenseManager_Setup.exe 30 PID 1204 wrote to memory of 2956 1204 SRLicenseManager_Setup.exe 30 PID 1204 wrote to memory of 2956 1204 SRLicenseManager_Setup.exe 30 PID 2956 wrote to memory of 932 2956 irsetup.exe 33 PID 2956 wrote to memory of 932 2956 irsetup.exe 33 PID 2956 wrote to memory of 932 2956 irsetup.exe 33 PID 2956 wrote to memory of 932 2956 irsetup.exe 33 PID 932 wrote to memory of 2936 932 cmd.exe 34 PID 932 wrote to memory of 2936 932 cmd.exe 34 PID 932 wrote to memory of 2936 932 cmd.exe 34 PID 932 wrote to memory of 2936 932 cmd.exe 34 PID 2164 wrote to memory of 1112 2164 irsetup.exe 36 PID 2164 wrote to memory of 1112 2164 irsetup.exe 36 PID 2164 wrote to memory of 1112 2164 irsetup.exe 36 PID 2164 wrote to memory of 1112 2164 irsetup.exe 36 PID 2164 wrote to memory of 1968 2164 irsetup.exe 38 PID 2164 wrote to memory of 1968 2164 irsetup.exe 38 PID 2164 wrote to memory of 1968 2164 irsetup.exe 38 PID 2164 wrote to memory of 1968 2164 irsetup.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe"C:\Users\Admin\AppData\Local\Temp\1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1742194 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\1d4cbdaae33209e38abf2e641a9d14840d6d0f4f06b951af7f5c70ac8932f18d.exe" "__IRCT:0" "__IRTSS:0" "__IRSID:S-1-5-21-1603059206-2004189698-4139800220-1000"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\SRLicenseManager\SRLicenseManager_Setup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\SRLicenseManager\SRLicenseManager_Setup.exe" /S3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe" /S __IRAOFF:1742194 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\SRLicenseManager\SRLicenseManager_Setup.exe" "__IRCT:0" "__IRTSS:0" "__IRSID:S-1-5-21-1603059206-2004189698-4139800220-1000"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\perms.bat5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\SetACL.exeC:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\SETACL.EXE -on "C:\ProgramData\Stage Research" -ot file -actn ace -ace "n:S-1-1-0;p:full,write_dacl;s:y;"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
-
-
-
C:\Program Files (x86)\Stage Research\SRLicenseManager.exe"C:\Program Files (x86)\Stage Research\SRLicenseManager.exe" SoftPlot3⤵
- Executes dropped EXE
PID:1112
-
-
C:\Program Files (x86)\Stage Research\SRLicenseManager.exe"C:\Program Files (x86)\Stage Research\SRLicenseManager.exe" SoftPlot3D3⤵
- Executes dropped EXE
PID:1968
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD54a83a88ccafe975014b3f2a46230ec75
SHA1da58f41dba04468aeedf0cce11d93a81e6b11f57
SHA2568e907c41edbfe438b21ddd13432e7e0f5c508739a8df07c13a99a4f720df739a
SHA5127cb218a2a3dbe57ca6f69be4f5a60ef544d9668e7781105478b8ae31035c92fc6b9a536c4b711271d23fbddd0bf5b0f8ef5c9f127409071da40a370b660833fa
-
Filesize
1.1MB
MD5be40e686bdff59c0c4d302af463ce6af
SHA1d2d39c53685c55693250694a82e52ccc20ff0735
SHA2566f2a768cd094763e48e8e81b1e7c40c1576bc81095aab6a1db16dead509c3844
SHA512ccc7cd9dd0f1ec7e6deb4fbf526b73d53273b1bfa12ee41cbc6c8517016226ff568628430ce7bdc0fd8413c875ac4fb6aba1b20babe0264cf6890d200b526ebd
-
Filesize
2.2MB
MD5bea397f18c471056a3ebff4e6102dc45
SHA10d91d733ee2535a6a7d017c9e6a02173f0a43d90
SHA256ab87dfb23a271335a5be7dd307b9523f992ad858149a699f34358c7b89d5a9ad
SHA5126c4f1118037d53ee4128c23905e84f1841705338399465ab7f1d8e02aa7b014e016ab863f8bb8634078f94e7e97369d0eb8731cace3da8d3d59453e8da8fb95c
-
Filesize
93KB
MD52a5c4e46a244d40ada2514577a3e0466
SHA1bb41405f881cdc79bde31d7282e69406abf7c6d2
SHA256d67d8f69ffb97437ae0aacd7f9ef4f6cab0421f0ac0f8a24a6f91bbaf3b6540c
SHA51224d285001c19a29767a3d6b5bf78d3d793083d5b770d404ed01f7473b10aafabb028e67d753b8dfcc81994672062c4fe3aa01d659d659811fd7e5ef90454d790
-
Filesize
123KB
MD58a32e98dcdfdc6730dbd878a043b9d92
SHA13463a8624d45186340c0e8d3bd2185478d69a160
SHA25620e578035b48ce0e01c489a90a44ce9f66279f7f45b3bc7285ad05f2b9dfb966
SHA5121860b2988de181b9ae8614fb1323c8265cdb629fe36125e2042abf30a1f7bfaf888bb1ca0942c95a245c19bb5ad605a0b9acacb5e656a6025243bfe9faa05a48
-
Filesize
52KB
MD5265c5203f435725d63273321e03d77a7
SHA1d56f8561cbce42fb74ba008c799c1266932d3140
SHA2569c4d55555640f2e317ff9f062d79f2f642ea9b17244376e2d921b6f2933c4d3c
SHA5125fb820a25f39edabee24907570ed4e2f6f8a239d3f3747ff87397e5e1421f36737adaeba3f06778c671606ad1231e68838ad613a3f792708372552c4c454f153
-
Filesize
35KB
MD54f240e7900d72e8e10146277a69cb97f
SHA124c8bd9eba7a0b8ec18cdc44902a6fc68728ea0b
SHA2566fb1da7f44d87927735373869a27e5e83ee3782dab5fd1e7dc676881328144f5
SHA512835808321fe7551b0b233bedce82a02a0db4616a735e9e87a72d1ff8e00fb9fe0f0ab5552273157091f7bba58eaf1043077b707b5921d76f760bac2964300902
-
Filesize
9KB
MD51d8de14f92c81621dd5cbd5e306054cc
SHA1b83854d237a28455444179ecfbc978ead2dcc2fd
SHA2568a533223e545b5c91f7546392626cef9d5b964f3b2827b7983044181829e015b
SHA51271ab0432e6d4cde1b4f9017408bd99e4f579912483da90694e33d5346ca910788c8c18991dcae5a8d109c6e09cb2a901249c28c1eeefed4fa3203393b0d9b93a
-
Filesize
45KB
MD59334b85e369240617d3552dc8dc2a0af
SHA1b9e0d6aacbad0597434371b1cb8e8ff180a3727e
SHA25606be529bc93d4d1b535e05ed0e9e986bd3f2915fa0bc4b3f7b4212a977cb5a7b
SHA512976d63e9b8e2119ec0fc350b1365ed8d20f0f19a6855a647e5c53ba58aa0b77981bd495575c8b868b7c78ac54e41070cabbe4d56f403949904c91749e7d2dffc
-
Filesize
9KB
MD50fd584449cc088eaf6426e56548dfc4f
SHA17c0600ebf393007d8c46ef5d1b27b80cb9b6ad38
SHA2560f5b2de20255528f0c2e5a3ac19aa43ba77880f7aa6de41e177f9179d478e03a
SHA51269e721be5b9e069acb830a26e0e211483fba725bc12cf9de7d32be321f61e5b6c04c48e1f58655b8316f4943364923fbf39cdaf8a2307baae2d51f20f838f1bc
-
Filesize
296KB
MD52e5a7d12c3170f61a08866600e74075b
SHA1c13e3ee03a215b8620e015fab2f4d6d980f82a73
SHA256f921a1f235dcc23114c359110e63739fc1eb5eed5fe7dcc8346b2b6768d05508
SHA512d4b07286c39f13658da288e1b905c9f2208d6d2ee68cba8d36794127e40e3e0cacbb5caad5ee20938501a912f5cf296c3fb1198fd62ce93d60f8cc09b0ccc486
-
Filesize
108KB
MD55db8ed2a6ef398dffa62654a93a9f182
SHA13bc92db2632ac0a332b879935e4d60639497b8d0
SHA25621415a09691f3f0b1dd1d731228576dec36d52aecef2ba067afa6e845564feef
SHA512490ea9e347cd173d2c6c8f49a62a767127d720bf1a9c44100d0e39ce17a33c41fe378c0075b04afbb0b2d90aae73a7f135c63c3e8ab11141cba02d827d9c1387
-
Filesize
115KB
MD5259975f9c5ed65cf3c10b6875d166671
SHA128c5e602863f7809fcc175a984dacb51ddeed847
SHA256ccbfee9bd6ce79b76eaf7449e6c16d5e2478c028ef17b48e89bd1b7b9b698134
SHA512db31dc2d672896a3516c490cd397adea3b459129a90c8a93d94dfecdfb08a67372477fcad63351748f638c20ceadf35f4a32e1e1fa806f669964b9f7561da1e0
-
Filesize
466KB
MD53b78e9ca25a70900dd42fab3a8257108
SHA1e836201f8cd9510f13cf8d1e22ea6eadefbc33e9
SHA256d1636272e03bcc63bbd1cffa35758f6439c993348e34e232f07dbb60f6a1d075
SHA512d7ab6c7552926ef909493ee4d63d1f254c22c7f2380551e70c30334a4c8f101daa5f73a4aa69b60ad2083ca1a0c2895ad25978b396025dd815d24567d40c83d6
-
Filesize
318KB
MD5b5fc476c1bf08d5161346cc7dd4cb0ba
SHA1280fac9cf711d93c95f6b80ac97d89cf5853c096
SHA25612cb9b8f59c00ef40ea8f28bfc59a29f12dc28332bf44b1a5d8d6a8823365650
SHA51217fa97f399287b941e958d2d42fe6adb62700b01d9dbe0c824604e8e06d903b330f9d7d8ffb109bfb7f6742f46e7e9cedad6981f0d94d629b8402d0a0174f697
-
Filesize
153B
MD55a051aca535bdd8a938dd1cc45caaf41
SHA1e6b0c6941112fb411d5b126ffee672c6bbef7d59
SHA2567cf8ebeb2c6e9cff127d10c29f4b130e8e76142e1169fd3a178f4c6439aba44a
SHA51222dc0dbb1309b3ce24fcbb267ee8eced3efc439ca18e8d7212ebee04dfb98441fe36ca0f93b92f5a40b79d932de6d8a428824509f149cab901759293b5f57195
-
Filesize
875KB
MD59918bd136f814e51cba2e2c499c8e719
SHA18094bd7ab933ac999a89b1a4a8f2284df837e2c3
SHA256985eca277301a7e691e56117094e270e20385717c56ed19e1764033dfbc75cd4
SHA51289b2ed2e4515cdaea878c0446d7151219ad212044b217785232a57cf205cc60de8a9e516765312bc579a4082429f1e2c9e79f02205f752f4c7a09bc6e9458db4
-
Filesize
589KB
MD502a46d8ee9cfb3056a14da0786bdea4d
SHA1fb4486f66f6ed1f8bcdf19153e8ceb2a30c9b711
SHA256b1255e9a26141978363d1b5838cb0eed7bf60c71ea79554c9a8ff37fc3d51206
SHA51246624abcfe0f03136cad49fc002a7414a2d89a350895b910ac3f6abaa9caff9e81595995786b1d765a20a9e454401719e74686523c279f50628e3f5a89151959
-
Filesize
149KB
MD5194a2e3303975dd23effd9a22a41d315
SHA15b995f5130fc9151bcbeab4a7db418baf4c09d3f
SHA256d36f670f45d0b5f73293fbca2ae27d0b33f0a6df8e91767673f8993757356556
SHA51282eeb318ae22185fc0e2927e3f15fe9d82d4407a1525df8b67a4d8a22b61d41018731aac18ad854648ce99884090f9e7b3b710272e387eeb3dd6c0f1f47057c4
-
Filesize
511KB
MD5fd2f8e11cd5266a02fe17c12c058df5a
SHA18fbca48f898d5a53cfa9883ddbd7c8fceb2c4417
SHA256db9c1e7026608ed7b663e1f58f6e63f1526ad917b728804b35887effbdfe2ecf
SHA5121bc8bcf3e7b88120b4f284bb455097994e457c74e13d5acfbe1a1111dc3843fcc52169af0f405330703feed0199a2ff8de908a0367c03cf15f6d2413d179f039
-
Filesize
506KB
MD5d4587399b6723e31132ec3b79743657c
SHA17f19cf8cd38fdf74b8875b76c66b7944662716a8
SHA256c76165671aa24d2eff68cffa55280eac2ba4651e42065cecedd90c1aaed5fc23
SHA5127c18a4f8e03d57314108d2c4441c7ecead70c8357adc5278fe5617916876a2664d6e8b28f58abee9b35faa0faed82f270af81269c89a8fa212a2b5dc976a53cf
-
Filesize
73KB
MD5bdcd1d2f70cf7bc20d7e5c0642fbdc35
SHA1bec03c60e9183d491e8634a4fb02e5925d4018df
SHA256834c967fe6acd152b1ca4222b554fd4f3e0f4ec4adb60aeff6784fc5f6af0890
SHA5120c8db712ab2ae1e9a275599d9c607d73c3254a8b1e17fce457a5f8a003b5b7d92701d6488721a84760b76a80cca391d42285887af63cef6c221736795fceb488
-
Filesize
39KB
MD58a74f85dc6a657c1181d7cdeef03fa78
SHA176704b29abf4afb025c833002f1691f2393acb23
SHA2560dbaa882a73dc2db49ffaf6dbb3bd43c18cf60bf8610595751d7a46f5014d561
SHA5127e2e374174424454b885c751a8c78197b2d1afbab705300bb9261569818fbb32bf39e55b34a2f1972a4f2638cac6eac5db1c14619125ce254d7ba90c050cc93e
-
Filesize
18KB
MD5c42090d26dd8dcb9e7612c7e86bc3bd3
SHA1b002a90312ebbed65225d8ff04790c70c6eaddee
SHA2562e7de44e9b7a2745b0b647be8bcf37b7afe9cac0cf9969b7d53c26db8ea2d965
SHA512168405f16c0ed3252f7850df96cc5da44d1b5c5d4a3a6c77644c052add68bebd5460fe3f8ded60ddd03fdd1b5d6a53ac3560e63bcbc22ed4267df0d42bf9a9ef
-
Filesize
101KB
MD558da871b45593218cc9be73a99708067
SHA1b9590e7edda0351a564a0b0061c625f48cf11267
SHA25683dad210565183b71d26898519d1adbf4311e2b3b6a14e8783c2c0113d15c546
SHA512f5184310229c89b1f4677a7537790f453f3584d9e9b420d284f21cc83d9ecacc47a1eefa69bb3bb796cffe6800dbff6c7d63aaa5435671e62d04f1680b860d60
-
Filesize
10KB
MD5235510ed2096fe906e580581fc552eaf
SHA13889e4ff9e8952ce86a886b8cfd0ca8d40f17f71
SHA2564cfeb37cfdd2c2827ba197a7ef8dbde7e59bd0c32da81e5d182ffda1898e183f
SHA512de73396592ae3bcb2335ce37d8e58ab15a619e25704d43c54ef3ce96c61af92289f9a6c8e2a28d4030498fc0df612c3141bb78de0777dc4ed46cccdd6106f211
-
Filesize
211KB
MD5dcca57f324422a4f01238485c56b533c
SHA197a52c2d005801f77c0df9aad9c59c70bf6210b4
SHA2569482664d5a4cfb64813dbdee1761e7ce5cc0c5b7a2605fd5b4ee39c9b1ce4ceb
SHA5121d00be1fddcadca009efc46ddc0897e598a2c4c288934305db3ec0565bfc5a498581871901044c14a28a334d489fac6c456c0911d817d2f592b01cc37ed1deab
-
Filesize
590KB
MD583baef55bf645abf15ca21e4bab612cd
SHA132aca46c7d988241a4c5592a1b4a2011dc83a6e5
SHA256e4e75a2918ef82abc837435d3e88b48033b4083e251ffe524eabc1f697802b25
SHA512e6bf41e8c5c27faf7777615f26ce18bd16b220f04bad56e27fff05a5d38d14c01d53fe5c723f8474627907ae27941262943aa9a594cf6bc2c24c1aef06bf0fc1
-
Filesize
783KB
MD56b412214281455b69019d28a22ab93ef
SHA1b4e1fe2b84e96fa795204112dde84b3f2abc0824
SHA256cb73d1630941c63fb095c27e5e4a5545631cb9cf495133787fcec7aff9cb5c43
SHA5129ce7bdaf4a1ef779cc1e6522c1a745d69a31a19bb45572d9864078c687bb363fd1f71a6dfaaa5feb308a14bc2f031925066c2dd86a468a5f60de5fc41837c021
-
Filesize
329KB
MD5119ea50f11e52a23cc2216196bac84ba
SHA1912427c5af2477d1b45724a276e184d574a625aa
SHA2560e2401b21be51df3a3b91de885ecab70f685a9c99779043038ebaab700eb38d5
SHA51281043b1ff9d9ab65dbd0779870d77ce8c07121f4af382a02be880baf68659491b20714cd9fc7749cac534406709057b3d5fb50cb10a4ef804f6c8e1dc974ad21
-
Filesize
159KB
MD59fb6fc690f138575b1c7a553ad6cb1aa
SHA1cc84b1cc4473bf564b0ee086c4e9953b57aa83de
SHA256b60e27a9832b29ebee07109af605d919a19b19dc43f5135d503031ae952a75fc
SHA512edf1724890aab06ca8031847b6317d0f6cfb77bf0f63f87150a8e552f7099ffc072d45f162cd3008fcb8a99285dff9536005220357f654938085072608445732