Overview
overview
7Static
static
7droidkit-es-setup.exe
windows7-x64
4$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...Vs.dll
windows7-x64
3$PLUGINSDI...ib.dll
windows7-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...up.exe
windows7-x64
7$PLUGINSDI...00.dll
windows7-x64
1$PLUGINSDI...00.dll
windows7-x64
1$PLUGINSDIR/nsDui.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ll.exe
windows7-x64
4$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...ib.dll
windows7-x64
1$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...tn.dll
windows7-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI..._1.dll
windows7-x64
3$PLUGINSDI..._1.dll
windows7-x64
1$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDIR/un.exe
windows7-x64
1Analysis
-
max time kernel
66s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-03-2024 02:01
Behavioral task
behavioral1
Sample
droidkit-es-setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/dotNetFx45_Full_setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/msvcp100.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/msvcr100.dll
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDui.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240220-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/SkinBtn.dll
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/libcrypto-1_1.dll
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/libssl-1_1.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/un.exe
Resource
win7-20240220-en
General
-
Target
droidkit-es-setup.exe
-
Size
19.5MB
-
MD5
9c5c721c156afbcb80dfc81bf5f136eb
-
SHA1
80e3fe09adc550883eea23e415358ac30591fc8d
-
SHA256
b320de1ddb0c255b9374c5a0496ebdfb2ea9f7789b26278bb5bf6b52ce3df8e0
-
SHA512
7c4f25e2096bd227ff6f82e5bf06f14d847942451ad1674d46dd9c6df0bdcf2e95cdc395e3610aa5f94defe63ef1c1538ffe8e2b6984ebcfdf9413b549d5dce9
-
SSDEEP
393216:rFiVQTXypl8pBja9MnNQLvcjjNUIsBwc6XYbTkrXDTNiDRUGJwPAEWXI:rnTC8pBjMM6CzYUX3NiDRUGJ2YY
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.sql droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.logging\ASSEMBLY_EXCEPTION droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\lib\modules droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\DB.DataAccessBase.dll droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\bin\api-ms-win-core-interlocked-l1-1-0.dll droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\SqlSugar.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.security.auth\LICENSE droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\7zxa.dll droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\Core.Google.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.rmi droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\conf\security\java.security droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\Service.Export.dll.config droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\linux-adk.exe droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\DroidKit.exe.config droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.xml\dom.md droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\System.Memory.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\System.ValueTuple.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.scripting\ADDITIONAL_LICENSE_INFO droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.scripting.nashorn\ASSEMBLY_EXCEPTION droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.zipfs\ASSEMBLY_EXCEPTION droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\amd64\libusbK.sys droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\Bypass\install_x86.exe droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\bin\unpack.dll droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\Modules\Module.FeedBack.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\license droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\Bypass\SAMSUNG_Android.inf droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\conf\security\policy\unlimited\default_US_export.policy droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\7za.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\bin\api-ms-win-crt-multibyte-l1-1-0.dll droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.datatransfer\LICENSE droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.se\ASSEMBLY_EXCEPTION droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\iMobieConnector.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\bin\api-ms-win-core-namedpipe-l1-1-0.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\bin\jli.dll droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\bin\jsound.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\Languages\Language.TW.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\UI.Controls.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.base droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.security.jgss\LICENSE droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\adb.exe droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\Service.Android.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.management\LICENSE droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.sctp\ADDITIONAL_LICENSE_INFO droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\ss_conn_usb_driver.cat droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\ADSqliteLibrary.dll droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\Core.Connection.Model.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\DB.ADB.dll droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\bin\api-ms-win-core-rtlsupport-l1-1-0.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\x86\libusb0_x86.dll droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.jdwp.agent\LICENSE droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\lib\tzmappings droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\ssudncm.cat droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\Core.Tracing.GA4.dll droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\bin\jawt.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\Modules\Module.Recover.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\SqliteDAO.dll droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\ssudqcnet.cat droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\ssudrnds.cat droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\i386\ssudobex.sys droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.management.rmi droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.xml droidkit-es-setup.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\lib\fontconfig.bfc droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.scripting.nashorn.shell\ASSEMBLY_EXCEPTION droidkit-es-setup.exe File created C:\Program Files (x86)\iMobie\DroidKit\amd64\libusb0.dll droidkit-es-setup.exe -
Loads dropped DLL 14 IoCs
pid Process 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 droidkit-es-setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier droidkit-es-setup.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 droidkit-es-setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 droidkit-es-setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 droidkit-es-setup.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe 2136 droidkit-es-setup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 droidkit-es-setup.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2568 2136 droidkit-es-setup.exe 28 PID 2136 wrote to memory of 2568 2136 droidkit-es-setup.exe 28 PID 2136 wrote to memory of 2568 2136 droidkit-es-setup.exe 28 PID 2136 wrote to memory of 2568 2136 droidkit-es-setup.exe 28 PID 2136 wrote to memory of 1404 2136 droidkit-es-setup.exe 31 PID 2136 wrote to memory of 1404 2136 droidkit-es-setup.exe 31 PID 2136 wrote to memory of 1404 2136 droidkit-es-setup.exe 31 PID 2136 wrote to memory of 1404 2136 droidkit-es-setup.exe 31 PID 2136 wrote to memory of 1592 2136 droidkit-es-setup.exe 34 PID 2136 wrote to memory of 1592 2136 droidkit-es-setup.exe 34 PID 2136 wrote to memory of 1592 2136 droidkit-es-setup.exe 34 PID 2136 wrote to memory of 1592 2136 droidkit-es-setup.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\droidkit-es-setup.exe"C:\Users\Admin\AppData\Local\Temp\droidkit-es-setup.exe"1⤵
- Drops file in Program Files directory
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"105EE11A\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Launch App\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""2⤵PID:2568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"105EE11A\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Start Download\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""2⤵PID:1404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"105EE11A\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Download Successful\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""2⤵PID:1592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD59e5853a71abfc4c3daa3d264fdcba07c
SHA1a6c712c3a4e4bb0fa947a5938c1165dc381201d5
SHA256febfe6cd9abc52c0d94fa657ac42cb974e53e1cb62c4a6f44b5c72458f1045cc
SHA5124508fa4b6959bdb369df2fa45d1176b584038bc1ee853c8c87a605cc8d5f080a35b723f97ba4e042fd3e51de83a57d33147d96f42a23680f9d106b2b427c4b29
-
Filesize
49B
MD519c9d1d2aad61ce9cb8fb7f20ef1ca98
SHA12db86ab706d9b73feeb51a904be03b63bee92baf
SHA256ebf9777bd307ed789ceabf282a9aca168c391c7f48e15a60939352efb3ea33f9
SHA5127ec63b59d8f87a42689f544c2e8e7700da5d8720b37b41216cbd1372c47b1bc3b892020f0dd3a44a05f2a7c07471ff484e4165427f1a9cad0d2393840cd94e5b
-
Filesize
44B
MD57caf4cdbb99569deb047c20f1aad47c4
SHA124e7497426d27fe3c17774242883ccbed8f54b4d
SHA256b998cda101e5a1ebcfb5ff9cddd76ed43a2f2169676592d428b7c0d780665f2a
SHA512a1435e6f1e4e9285476a0e7bc3b4f645bbafb01b41798a2450390e16b18b242531f346373e01d568f6cc052932a3256e491a65e8b94b118069853f2b0c8cd619
-
Filesize
33B
MD516989bab922811e28b64ac30449a5d05
SHA151ab20e8c19ee570bf6c496ec7346b7cf17bd04a
SHA25686e0516b888276a492b19f9a84f5a866ed36925fae1510b3a94a0b6213e69192
SHA51286571f127a6755a7339a9ed06e458c8dc5898e528de89e369a13c183711831af0646474986bae6573bc5155058d5f38348d6bfdeb3fd9318e98e0bf7916e6608
-
Filesize
166KB
MD53935ec3158d0e488da1929b77edd1633
SHA1bd6d94704b29b6cef3927796bfe22a2d09ee4fe7
SHA25687cbd1f3bf5ab72089a879df110263784602a574c0ae83f428df57ae2f8115db
SHA5125173891b1dfad2298910236a786c7b9bbcfce641491a25f933022088c81465fb93fd2385d270e9a0632f674355538da464d1edacf511140d6f31d91d1afe64fc
-
Filesize
896KB
MD58078de3194d76ad56dcfd01439b2ee2c
SHA1289af053edcf8ac73082b02fcaf5c6b4a33e9ed9
SHA25629ace28d72786e36a32a90f21254925b7591c3359e7b48097795a07d7eff2157
SHA51261d196ae241a8e83b2cdae6bd7c1ea16f4bff5d88c17b9cbdba9e3c5ce70dcfbc0833cbda390eeee87aa9c9902a5152b1a9196836ad2ebd61afead6f5da612c2
-
Filesize
45KB
MD58574627d4a5415c36176bf4ab9058183
SHA1a50ab8e8983ce2afa54cb23e4629c83889cd0c56
SHA2563b8c37db1af7f30a2baff39b587ecf7edd30027ee3e91d5e596e39dd0f0e3908
SHA512ea27c071f047d200f45c5c82943e39df05bf5755aa72c44983ed367fc1d2ba30781cd24a0ff4e4da6224106d9f639f0872848d0fa7058f088467d1b4b5205954
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
7KB
MD562e85098ce43cb3d5c422e49390b7071
SHA1df6722f155ce2a1379eff53a9ad1611ddecbb3bf
SHA256ee7e26894cbf89c93ae4df15bdb12cd9a21f5deacedfa99a01eefe8fa52daec2
SHA512dfe7438c2b46f822e2a810bc355e5226043547608d19d1c70314e4325c06ad9ad63a797905e30d19f5d9a86ee1a6d9c28f525a298731e79dbf6f3d6441179a8e
-
Filesize
36KB
MD5d8fca35ff95fe00a7174177181f8bd13
SHA1fbafea4d2790dd2c0d022dfb08ded91de7f5265e
SHA256ad873f1e51e6d033e5507235ec735957256ebeeb0d3f22aa0b57bb4bd0846e4c
SHA512eb530b10f137cb0cdfdcd2c11fd9f50f774e0ce44e9d2da3e755f6a6df24fe6e7525c27b109e3e68e9d3e49a889937a22f4d9d78703b1055a83b8a58808a58ba
-
Filesize
187KB
MD59ca6d8dcdc3a93521270fcb52c33e491
SHA142da181d0f73676197f50f3a2203708dd2543c0c
SHA2567056eda1128f8a3a0c7217885972359cee99b6a62a62d4bd7bad79b04d7db227
SHA512d28bce4de41036f25493ea28c64e840f8b62325eee6dbad03a4bb32439396aef16cf73eaaa95e975b82786c2aeac4eba86c13a6d703e616ef3ec82f41e463e28
-
Filesize
10.0MB
MD5368841af8b0074e348418f106716e603
SHA175469510665b651b38e3b4fb7c4240722c756126
SHA2563be54dea5aedc0d8d16d6c4bd4e046e2d93bfc550a1a035a94768c2d5901e327
SHA5123804afa3930a90f258a2b4e7106e1d0211e5d4ca6a7f5ba23da11e3908b4e202295ddbcb1ecf1e15215bc9a0aece1a46efad07ad94feddd4f316b0de674c50d5
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
3KB
MD5b36489cb554c11a7bf85cd14c7c1cb84
SHA1c7349c67c34aa9d536dba6c20e5aaa65095db710
SHA25685ced2c6b72c435ca255179c6136c8b25061fe1a6981c9b7fdfd8c7d359955d2
SHA512fd3adc41759e7f789110a8d13a60a5503ea45fccd3fe7d773ad44a284dc3eed89585c76422678051a390266711c11cc5a3bb9aff569f0ddced3bc359b3054922
-
Filesize
2KB
MD533ec04738007e665059cf40bc0f0c22b
SHA14196759a922e333d9b17bda5369f14c33cd5e3bc
SHA25650f735ab8f3473423e6873d628150bbc0777be7b4f6405247cddf22bb00fb6be
SHA5122318b01f0c2f2f021a618ca3e6e5c24a94df5d00154766b77160203b8b0a177c8581c7b688ffe69be93a69bc7fd06b8a589844d42447f5060fb4bcf94d8a9aef
-
Filesize
11KB
MD5ca332bb753b0775d5e806e236ddcec55
SHA1f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
SHA256df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
SHA5122de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00
-
Filesize
593KB
MD5d029339c0f59cf662094eddf8c42b2b5
SHA1a0b6de44255ce7bfade9a5b559dd04f2972bfdc8
SHA256934d882efd3c0f3f1efbc238ef87708f3879f5bb456d30af62f3368d58b6aa4c
SHA512021d9af52e68cb7a3b0042d9ed6c9418552ee16df966f9ccedd458567c47d70471cb8851a69d3982d64571369664faeeae3be90e2e88a909005b9cdb73679c82
-
Filesize
809KB
MD5366fd6f3a451351b5df2d7c4ecf4c73a
SHA150db750522b9630757f91b53df377fd4ed4e2d66
SHA256ae3cb6c6afba9a4aa5c85f66023c35338ca579b30326dd02918f9d55259503d5
SHA5122de764772b68a85204b7435c87e9409d753c2196cf5b2f46e7796c99a33943e167f62a92e8753eaa184cd81fb14361e83228eb1b474e0c3349ed387ec93e6130
-
Filesize
313KB
MD506a47571ac922f82c098622b2f5f6f63
SHA18a581c33b7f2029c41edaad55d024fc0d2d7c427
SHA256e4ab3064f2e094910ae80104ef9d371ccb74ebbeeed592582cf099acd83f5fe9
SHA51204b3d18042f1faa536e1393179f412a5644d2cf691fbc14970f79df5c0594eeedb0826b495807a3243f27aaa0380423c1f975fe857f32e057309bb3f2a529a83