Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-02-2024 12:33
Static task
static1
Behavioral task
behavioral1
Sample
a9296af40e2b6c379587350610af1e29.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9296af40e2b6c379587350610af1e29.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240221-en
General
-
Target
setup_installer.exe
-
Size
3.3MB
-
MD5
05d543376b2739fe3daafaf2a6cb5bf7
-
SHA1
0891ee47920780b13920ce41e0fa87f544de53a3
-
SHA256
53b55897c12afc0c1f45b292ad8f2d9712705fea7fd487f9e649c49e77ce4b50
-
SHA512
8a75ff2b2d19a4e3cfefd14d05b3acc487b6235d2fb665c8d80648bf06260babdc91d5248447891b2101c8d2fe5693397bb21195362360dbd0e264a924712bfa
-
SSDEEP
98304:xXCvLUBsgZqdf3m3YMqrwYs/HcJLjfnuJqJCvnw:xULUCgZObMbYhuJoC/w
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 3 IoCs
resource yara_rule behavioral3/memory/2744-155-0x0000000004570000-0x000000000460D000-memory.dmp family_vidar behavioral3/memory/2744-157-0x0000000000400000-0x0000000002D17000-memory.dmp family_vidar behavioral3/memory/2744-284-0x0000000000400000-0x0000000002D17000-memory.dmp family_vidar -
resource yara_rule behavioral3/files/0x002200000001559a-42.dat aspack_v212_v242 behavioral3/files/0x0009000000012272-45.dat aspack_v212_v242 behavioral3/files/0x0007000000015c29-48.dat aspack_v212_v242 -
Executes dropped EXE 11 IoCs
pid Process 2284 setup_install.exe 576 Thu18573f94dd.exe 1052 Thu189295986a7df934.exe 1308 Thu18fd253544aed.exe 2744 Thu185cfab8a1.exe 2788 Thu18373e6fac988e1fd.exe 2772 Thu18ede124d8468708.exe 1592 Thu18ff146cab.exe 2044 Thu18f42bf0e3dedd8c.exe 1724 Thu18573f94dd.exe 1084 Thu18ede124d8468708.exe -
Loads dropped DLL 43 IoCs
pid Process 2212 setup_installer.exe 2212 setup_installer.exe 2212 setup_installer.exe 2284 setup_install.exe 2284 setup_install.exe 2284 setup_install.exe 2284 setup_install.exe 2284 setup_install.exe 2284 setup_install.exe 2284 setup_install.exe 2284 setup_install.exe 3000 cmd.exe 268 cmd.exe 3000 cmd.exe 2404 cmd.exe 2404 cmd.exe 580 cmd.exe 2164 cmd.exe 2164 cmd.exe 2744 Thu185cfab8a1.exe 2744 Thu185cfab8a1.exe 576 Thu18573f94dd.exe 576 Thu18573f94dd.exe 2788 Thu18373e6fac988e1fd.exe 2788 Thu18373e6fac988e1fd.exe 1620 cmd.exe 520 cmd.exe 576 Thu18573f94dd.exe 2044 Thu18f42bf0e3dedd8c.exe 2044 Thu18f42bf0e3dedd8c.exe 1724 Thu18573f94dd.exe 1724 Thu18573f94dd.exe 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe 752 WerFault.exe 752 WerFault.exe 752 WerFault.exe 752 WerFault.exe 752 WerFault.exe 752 WerFault.exe 752 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2092 2284 WerFault.exe 28 752 2744 WerFault.exe 41 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Thu18373e6fac988e1fd.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Thu18373e6fac988e1fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Thu18373e6fac988e1fd.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Thu185cfab8a1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Thu185cfab8a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 Thu189295986a7df934.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 Thu189295986a7df934.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Thu185cfab8a1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2788 Thu18373e6fac988e1fd.exe 2788 Thu18373e6fac988e1fd.exe 1364 powershell.exe 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2788 Thu18373e6fac988e1fd.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1308 Thu18fd253544aed.exe Token: SeDebugPrivilege 1592 Thu18ff146cab.exe Token: SeDebugPrivilege 1052 Thu189295986a7df934.exe Token: SeDebugPrivilege 1364 powershell.exe Token: SeShutdownPrivilege 1368 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2284 2212 setup_installer.exe 28 PID 2212 wrote to memory of 2284 2212 setup_installer.exe 28 PID 2212 wrote to memory of 2284 2212 setup_installer.exe 28 PID 2212 wrote to memory of 2284 2212 setup_installer.exe 28 PID 2212 wrote to memory of 2284 2212 setup_installer.exe 28 PID 2212 wrote to memory of 2284 2212 setup_installer.exe 28 PID 2212 wrote to memory of 2284 2212 setup_installer.exe 28 PID 2284 wrote to memory of 2964 2284 setup_install.exe 30 PID 2284 wrote to memory of 2964 2284 setup_install.exe 30 PID 2284 wrote to memory of 2964 2284 setup_install.exe 30 PID 2284 wrote to memory of 2964 2284 setup_install.exe 30 PID 2284 wrote to memory of 2964 2284 setup_install.exe 30 PID 2284 wrote to memory of 2964 2284 setup_install.exe 30 PID 2284 wrote to memory of 2964 2284 setup_install.exe 30 PID 2284 wrote to memory of 3000 2284 setup_install.exe 34 PID 2284 wrote to memory of 3000 2284 setup_install.exe 34 PID 2284 wrote to memory of 3000 2284 setup_install.exe 34 PID 2284 wrote to memory of 3000 2284 setup_install.exe 34 PID 2284 wrote to memory of 3000 2284 setup_install.exe 34 PID 2284 wrote to memory of 3000 2284 setup_install.exe 34 PID 2284 wrote to memory of 3000 2284 setup_install.exe 34 PID 2284 wrote to memory of 2164 2284 setup_install.exe 33 PID 2284 wrote to memory of 2164 2284 setup_install.exe 33 PID 2284 wrote to memory of 2164 2284 setup_install.exe 33 PID 2284 wrote to memory of 2164 2284 setup_install.exe 33 PID 2284 wrote to memory of 2164 2284 setup_install.exe 33 PID 2284 wrote to memory of 2164 2284 setup_install.exe 33 PID 2284 wrote to memory of 2164 2284 setup_install.exe 33 PID 2284 wrote to memory of 2124 2284 setup_install.exe 32 PID 2284 wrote to memory of 2124 2284 setup_install.exe 32 PID 2284 wrote to memory of 2124 2284 setup_install.exe 32 PID 2284 wrote to memory of 2124 2284 setup_install.exe 32 PID 2284 wrote to memory of 2124 2284 setup_install.exe 32 PID 2284 wrote to memory of 2124 2284 setup_install.exe 32 PID 2284 wrote to memory of 2124 2284 setup_install.exe 32 PID 2284 wrote to memory of 2404 2284 setup_install.exe 31 PID 2284 wrote to memory of 2404 2284 setup_install.exe 31 PID 2284 wrote to memory of 2404 2284 setup_install.exe 31 PID 2284 wrote to memory of 2404 2284 setup_install.exe 31 PID 2284 wrote to memory of 2404 2284 setup_install.exe 31 PID 2284 wrote to memory of 2404 2284 setup_install.exe 31 PID 2284 wrote to memory of 2404 2284 setup_install.exe 31 PID 2284 wrote to memory of 1620 2284 setup_install.exe 38 PID 2284 wrote to memory of 1620 2284 setup_install.exe 38 PID 2284 wrote to memory of 1620 2284 setup_install.exe 38 PID 2284 wrote to memory of 1620 2284 setup_install.exe 38 PID 2284 wrote to memory of 1620 2284 setup_install.exe 38 PID 2284 wrote to memory of 1620 2284 setup_install.exe 38 PID 2284 wrote to memory of 1620 2284 setup_install.exe 38 PID 2284 wrote to memory of 520 2284 setup_install.exe 37 PID 2284 wrote to memory of 520 2284 setup_install.exe 37 PID 2284 wrote to memory of 520 2284 setup_install.exe 37 PID 2284 wrote to memory of 520 2284 setup_install.exe 37 PID 2284 wrote to memory of 520 2284 setup_install.exe 37 PID 2284 wrote to memory of 520 2284 setup_install.exe 37 PID 2284 wrote to memory of 520 2284 setup_install.exe 37 PID 2284 wrote to memory of 580 2284 setup_install.exe 36 PID 2284 wrote to memory of 580 2284 setup_install.exe 36 PID 2284 wrote to memory of 580 2284 setup_install.exe 36 PID 2284 wrote to memory of 580 2284 setup_install.exe 36 PID 2284 wrote to memory of 580 2284 setup_install.exe 36 PID 2284 wrote to memory of 580 2284 setup_install.exe 36 PID 2284 wrote to memory of 580 2284 setup_install.exe 36 PID 2284 wrote to memory of 268 2284 setup_install.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\7zS4A84FB76\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4A84FB76\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵PID:2964
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu185cfab8a1.exe3⤵
- Loads dropped DLL
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\7zS4A84FB76\Thu185cfab8a1.exeThu185cfab8a1.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:2744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 9805⤵
- Loads dropped DLL
- Program crash
PID:752
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu18ede124d8468708.exe3⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\7zS4A84FB76\Thu18ede124d8468708.exeThu18ede124d8468708.exe4⤵
- Executes dropped EXE
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4A84FB76\Thu18ede124d8468708.exe"C:\Users\Admin\AppData\Local\Temp\7zS4A84FB76\Thu18ede124d8468708.exe"4⤵
- Executes dropped EXE
PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu18373e6fac988e1fd.exe3⤵
- Loads dropped DLL
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\7zS4A84FB76\Thu18373e6fac988e1fd.exeThu18373e6fac988e1fd.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu18573f94dd.exe3⤵
- Loads dropped DLL
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\7zS4A84FB76\Thu18573f94dd.exeThu18573f94dd.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:576 -
C:\Users\Admin\AppData\Local\Temp\7zS4A84FB76\Thu18573f94dd.exe"C:\Users\Admin\AppData\Local\Temp\7zS4A84FB76\Thu18573f94dd.exe" -a5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu189295986a7df934.exe3⤵
- Loads dropped DLL
PID:268 -
C:\Users\Admin\AppData\Local\Temp\7zS4A84FB76\Thu189295986a7df934.exeThu189295986a7df934.exe4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu18fd253544aed.exe3⤵
- Loads dropped DLL
PID:580 -
C:\Users\Admin\AppData\Local\Temp\7zS4A84FB76\Thu18fd253544aed.exeThu18fd253544aed.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu18f42bf0e3dedd8c.exe3⤵
- Loads dropped DLL
PID:520 -
C:\Users\Admin\AppData\Local\Temp\7zS4A84FB76\Thu18f42bf0e3dedd8c.exeThu18f42bf0e3dedd8c.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu18ff146cab.exe3⤵
- Loads dropped DLL
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\7zS4A84FB76\Thu18ff146cab.exeThu18ff146cab.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 4243⤵
- Loads dropped DLL
- Program crash
PID:2092
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5681c7b528953743d967a7c3fd3ca8f1e
SHA13d82b701982c2ac5f640729632df3c0e7c047415
SHA256cee04e1b286af23c334831ec202d321b62e51616bae78fb59f67ee66464d8824
SHA51271bd98eff334c6edb8046800078fef524c041b93eb8d23e3f15b7e6e23826164652dc95606b72073d25e84a8d28300dacc0494f8af6a5a8e82177f167be4a55f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d44ffd0b8c893f1a9c41d761fa12d073
SHA1d65db958d6e45cc4ca08350b5fb5159227c3e33d
SHA2568c4b5b524ab12b7379e89f3bc8298ed911647562029ba962554e6399591093d1
SHA51289b4d52e625babaa3fdac6ba337ff5de107f615fd3aaf1c7e07e14928e1b5792df458fdbfd55a605de1e9d962e43c4fea63108c904964d5e5d3468cb85b2c828
-
Filesize
172KB
MD55f0707404c2cbb84dfed31d716934010
SHA1b143d1bb5a1d28fec5decae7152bc4195d452782
SHA256477f0af44e919e1d977f127a7c9fc63bdf6f2bbc46423611ac6c41688c299acf
SHA512a7dd5c3d6c00e9b52699cd358a266d0e08aaa8ea71947bfcccb2ee4c554f26216807e0a685881a8b17d5a4f15366f5bb129e944714f20d7669bd12a79a60128a
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
539KB
MD5b1a437a7d8cb5e0df6593590465b95de
SHA1982dd75cff6fd982f70e8af880deff24b32a62a7
SHA256aad9cc26769586cfc75fda04e348a51310c9aefc78fb3e0fb663ef872d53052e
SHA51261ab228bfca510344a409ecc1bdac4b89a7037d5f85fb24c706f1fd61a552ac7dd776a185dc13dadb89248e7586eb643182acc6d12383232d481bddffd72d1c8
-
Filesize
8KB
MD5de595e972bd04cf93648de130f5fb50d
SHA14c05d7c87aa6f95a95709e633f97c715962a52c4
SHA256ed6d502c7c263fd9bd28324f68b287aea158203d0c5154ca07a9bcd059aa2980
SHA5121f4b6c60c78fe9e4a616d6d1a71a9870905ef1aadebd26cf35eac87e10be79db5f7cecdef9d835639b50f7394b6fce9285ff39a8d239768532ba7ed6c7cfdb99
-
Filesize
453KB
MD5f743faebd3b562936129cd1f932144df
SHA13a694fd732c15f988840da58967231278fbc901d
SHA25675df909bf664a1efe278a019a128919490925deb6f6609a700b91699461d7e5c
SHA512700f4f4f660bab1926aada0ea6d65a92882c4ab92ad45b4c8e40fc90631334e4b3fe1c505719cb22b0c85fe3cc1cbf1c745172d1d3fb276e4d634e2d7e4fabbe
-
Filesize
900KB
MD50a0d22f1c9179a67d04166de0db02dbb
SHA1106e55bd898b5574f9bd33dac9f3c0b95cecd90d
SHA256a59457fbfaf3d1b2e17463d0ffd50680313b1905aff69f13694cfc3fffd5a4ac
SHA5128abf8dc0da25c0fdbaa1ca39db057db80b9a135728fed9cd0f45b0f06d5652cee8d309b92e7cb953c0c4e8b38ffa2427c33f4865f1eb985a621316f9eb187b8b
-
Filesize
1.7MB
MD505a0baf55450d99cb0fa0ee652e2cd0c
SHA1e7334de04c18c241a091c3327cdcd56e85cc6baf
SHA2564cfbdd8acdc923beeca12d94f06d2f1632765434a2087df7ac803c254a0adf9c
SHA512b6d1fc00d7b076068b0879fa4d29b68d3054b5fca24edd5852077bf34d37c43e79cb74fda9c45014610b317d57d70369a3e197784c04bc3c6eac5e1ea9a64fff
-
Filesize
154KB
MD5f994e0fe5d9442bb6acc18855fea2f32
SHA1dd5e4830a6c9e67f23c818baadade7ee18e0c72c
SHA2561f415ba6299b928a8c28e3223b4376f9d06673b65f0921edb23c1b63e5518bf4
SHA51238a8af841dbd97c2138c5200d656b25b5eed8738049a7c92f745a810bb15f21f8d3d50c68fe18a9562bb7b0cb81da1d71310c7513eb9de9a7c2f63fb8e9f51c3
-
Filesize
8KB
MD5951aaadbe4e0e39a7ab8f703694e887c
SHA1c555b3a6701ada68cfd6d02c4bf0bc08ff73810e
SHA2565a2934ac710f5995c112da4a32fde9d3de7d9ed3ea0ac5b18a22423d280b5c6d
SHA51256a605bf8a2f2d1a5068f238578f991f44497755297a44e4fc4dad78c2c7d49e52d43979fb0f28a9af0513292da4a747beeb337edd156139a97f597ce23666d9
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
2.0MB
MD5d1cd5c7174e5741c7c74cc9ab5216453
SHA17488c79ff9d8e21850071a509a16ceec081b8f83
SHA25650b9d8ba265d3b4f32ace03676cc3b927ff238a8b97c2e2b6c5d081af41024e8
SHA512cae0825dea4be1fdd49da52643781c1a9c2fc779bbbe9a214a63935e6b299f23d2bd506ee72c0fcb5e5f28afa68d9541c31892e79c82d22fd08442b277834f1a
-
Filesize
918KB
MD52fa60d3d361007719b8a046d14dfb87c
SHA1ca6545858a9bb179f02a2d1533bc72bef08f4a02
SHA256842eeab83ba921274f67994d412b7f3e953bbeefa1a4a993bf21236c295caf71
SHA51282fe3080675cfb6e1f1c380a77fc58f5e078662149e7e2d333fa4262bd47201e304b7e53be1a9135522e629d593b2280d3cc1c8cf28596073e5fc005ac70a282
-
Filesize
42KB
MD5d3a607f8729de4cd44ba46508502a074
SHA151a1c210a2f51f45e9bc8074e105ae797d626f9e
SHA256b4022fcb0c72f6d1e8bf92c3f6ae188433cad6a9dad95ba8ffe701f5ed8c9edb
SHA5123e297977a1cdb701c8bd3d92fd3f8e9b2085b9a405119930fb26b0c378a9f8038c48ff96a7da418350ddd3c2b9fbc52865e24d159daadb4e167860c5401975e2
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
1.8MB
MD56e2757c40ab78d3977643b0d5aaadea5
SHA154b52fbc2453545751d01c33266231ea2c0a33df
SHA256ca011fa20de129b17ca5f7faae0368372d06f900d7786f7b6cfd6aea728a3143
SHA5122621c12feef18a4bb6c2a2977f83f490e356ad277200d8f51d1a473f7701a7b3ac4b45a8b9376cc98262bbb091bb0bdcf8b1b4a8c1f0e69235dc39560f63b244
-
Filesize
1.8MB
MD5e5c43b042e49a46a21215e15c545fb2e
SHA1ea4f2ff8d02699d5f0517ac6e1536926fe1e2bfa
SHA25660d535bdc6b02a29f599c5c2865f42807e894877539799d9bc3b8a199464dce1
SHA51295f7e351c45be98c3411b67ad5ad0075b7d49df6a35008b6c8272151bfde43b5aa6a66b2534bd2e46dd607c01623afdddd491e9610d37764de5c050c30b1f1f9
-
Filesize
2.1MB
MD54aa835f8927dbf4544dbc38295d54266
SHA198a8e4dacb725820d5c65cdf83990aabf8da9024
SHA25628b70d0cab3e1121eb047989b7501a21ea5c37f5f009baaaf3b3adf59cb37b63
SHA512e9d140a6686115315dbf5e914b2c335cf5ca1f11aa7b9b2633763b16be8f30e9eec09cf7c793dd2611282350a4dffa5637d134ef646222df5ea3ad1632ba4b4a