Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2024, 03:31
Static task
static1
Behavioral task
behavioral1
Sample
4e5fcc788287580ed19402eadaab8c69ca5f0a904ead605153feb534bbe87002.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4e5fcc788287580ed19402eadaab8c69ca5f0a904ead605153feb534bbe87002.exe
Resource
win10v2004-20240226-en
Errors
General
-
Target
4e5fcc788287580ed19402eadaab8c69ca5f0a904ead605153feb534bbe87002.exe
-
Size
5.3MB
-
MD5
b59631e064541c8651576128708e50f9
-
SHA1
7aae996d4990f37a48288fa5f15a7889c3ff49b3
-
SHA256
4e5fcc788287580ed19402eadaab8c69ca5f0a904ead605153feb534bbe87002
-
SHA512
571a06f0ec88fe3697388195dd0a7f7e8d63945748855d928fb5005b51fd2c2baea1a63bd871ed0cfade5eabb879f577b7b04f9cd4d1222de52da641feee1f92
-
SSDEEP
98304:69w8PMOW9ZI6aO7sd/mzt5mAiN1vw+/YR8ov/bkMJmJZNOnTdjyip:ndIV0G/mzsN1vl/YRV4MY9OnTdjy
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts Miner.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 4e5fcc788287580ed19402eadaab8c69ca5f0a904ead605153feb534bbe87002.exe -
Executes dropped EXE 3 IoCs
pid Process 2420 Miner.exe 4000 Shortcutter.exe 2492 whrbuflqwhah.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 23 raw.githubusercontent.com 24 raw.githubusercontent.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe Miner.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2420 set thread context of 2892 2420 Miner.exe 520 -
Launches sc.exe 9 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 332 sc.exe 5072 sc.exe 1652 sc.exe 4992 sc.exe 3732 sc.exe 1236 sc.exe 4596 sc.exe 1088 sc.exe 3876 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 700 powershell.exe 700 powershell.exe 700 powershell.exe 2420 Miner.exe 5004 powershell.exe 5004 powershell.exe 5004 powershell.exe 2420 Miner.exe 2420 Miner.exe 2420 Miner.exe 2420 Miner.exe 2420 Miner.exe 2420 Miner.exe 2420 Miner.exe 2420 Miner.exe 2892 dialer.exe 2892 dialer.exe 2420 Miner.exe 2420 Miner.exe 2420 Miner.exe 2420 Miner.exe 2492 whrbuflqwhah.exe 2892 dialer.exe 2892 dialer.exe 3536 powershell.exe 3536 powershell.exe 3536 powershell.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 744 Process not Found 2252 Process not Found 4652 Process not Found 4312 Process not Found 2180 Process not Found 2672 Process not Found 3348 Process not Found 2596 Process not Found 1144 Process not Found 3600 Process not Found 1740 Process not Found 3608 Process not Found 2204 Process not Found 2996 Process not Found 1268 Process not Found 1644 Process not Found 1044 Process not Found 1616 Process not Found 4356 Process not Found 3748 Process not Found 4292 Process not Found 4708 Process not Found 3612 Process not Found 3008 Process not Found 3116 Process not Found 2028 Process not Found 4548 Process not Found 3720 Process not Found 3432 Process not Found 3364 Process not Found 3752 Process not Found 3764 Process not Found 3828 Process not Found 4184 Process not Found 3424 Process not Found 4528 Process not Found 4500 Process not Found 3272 Process not Found 3576 Process not Found 4884 Process not Found 5000 Process not Found 4828 Process not Found 4752 Process not Found 2572 Process not Found 2728 Process not Found 2820 Process not Found 2848 Process not Found 2772 Process not Found 2564 Process not Found 440 Process not Found 4020 Process not Found 4648 Process not Found 2064 Process not Found 4948 Process not Found 3524 Process not Found 3900 Process not Found 2448 Process not Found 3584 Process not Found 4196 Process not Found 2652 Process not Found 2480 Process not Found 3396 Process not Found 4892 Process not Found 2864 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4000 Shortcutter.exe Token: SeDebugPrivilege 700 powershell.exe Token: SeDebugPrivilege 5004 powershell.exe Token: SeDebugPrivilege 2892 dialer.exe Token: SeShutdownPrivilege 388 dwm.exe Token: SeCreatePagefilePrivilege 388 dwm.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1456 wrote to memory of 700 1456 4e5fcc788287580ed19402eadaab8c69ca5f0a904ead605153feb534bbe87002.exe 100 PID 1456 wrote to memory of 700 1456 4e5fcc788287580ed19402eadaab8c69ca5f0a904ead605153feb534bbe87002.exe 100 PID 1456 wrote to memory of 700 1456 4e5fcc788287580ed19402eadaab8c69ca5f0a904ead605153feb534bbe87002.exe 100 PID 1456 wrote to memory of 2420 1456 4e5fcc788287580ed19402eadaab8c69ca5f0a904ead605153feb534bbe87002.exe 102 PID 1456 wrote to memory of 2420 1456 4e5fcc788287580ed19402eadaab8c69ca5f0a904ead605153feb534bbe87002.exe 102 PID 1456 wrote to memory of 4000 1456 4e5fcc788287580ed19402eadaab8c69ca5f0a904ead605153feb534bbe87002.exe 103 PID 1456 wrote to memory of 4000 1456 4e5fcc788287580ed19402eadaab8c69ca5f0a904ead605153feb534bbe87002.exe 103 PID 1144 wrote to memory of 1392 1144 cmd.exe 423 PID 1144 wrote to memory of 1392 1144 cmd.exe 423 PID 2420 wrote to memory of 2892 2420 Miner.exe 520 PID 2420 wrote to memory of 2892 2420 Miner.exe 520 PID 2420 wrote to memory of 2892 2420 Miner.exe 520 PID 2420 wrote to memory of 2892 2420 Miner.exe 520 PID 2420 wrote to memory of 2892 2420 Miner.exe 520 PID 2420 wrote to memory of 2892 2420 Miner.exe 520 PID 2420 wrote to memory of 2892 2420 Miner.exe 520 PID 4740 wrote to memory of 4372 4740 cmd.exe 136 PID 4740 wrote to memory of 4372 4740 cmd.exe 136 PID 2892 wrote to memory of 632 2892 dialer.exe 378 PID 2892 wrote to memory of 688 2892 dialer.exe 7 PID 2892 wrote to memory of 968 2892 dialer.exe 12 PID 688 wrote to memory of 2776 688 lsass.exe 50 PID 2892 wrote to memory of 388 2892 dialer.exe 13 PID 2892 wrote to memory of 528 2892 dialer.exe 14 PID 2892 wrote to memory of 392 2892 dialer.exe 17 PID 2892 wrote to memory of 1032 2892 dialer.exe 18
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:968
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:528
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:392
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1032
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\4e5fcc788287580ed19402eadaab8c69ca5f0a904ead605153feb534bbe87002.exe"C:\Users\Admin\AppData\Local\Temp\4e5fcc788287580ed19402eadaab8c69ca5f0a904ead605153feb534bbe87002.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAZQBzACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGoAcQBoACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGYAZwBmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHkAaABlACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-
C:\Users\Admin\AppData\Roaming\Miner.exe"C:\Users\Admin\AppData\Roaming\Miner.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:1392
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:1236
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:332
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:5072
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:4596
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:1088
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "RYVSUJUA"3⤵
- Launches sc.exe
PID:3876
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "RYVSUJUA" binpath= "C:\ProgramData\trmrjvadsnmf\whrbuflqwhah.exe" start= "auto"3⤵
- Launches sc.exe
PID:3732
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:4992
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "RYVSUJUA"3⤵
- Launches sc.exe
PID:1652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Roaming\Miner.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:4372
-
-
-
-
C:\Users\Admin\AppData\Roaming\Shortcutter.exe"C:\Users\Admin\AppData\Roaming\Shortcutter.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\ProgramData\trmrjvadsnmf\whrbuflqwhah.exeC:\ProgramData\trmrjvadsnmf\whrbuflqwhah.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2492 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4020 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:2908
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:708
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3636
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4592
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1300
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4276
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3304
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000f4 000000841⤵PID:632
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000dc 000000841⤵PID:1392
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000c8 000000841⤵PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD55e4618aa614515ef71397d0032e5c3db
SHA1318692bed43c2876260a43c23a3dfa570cf9be69
SHA25616e51eb2b0380f88d59ddbe83da66dafb50951498b283717708273a535c81e92
SHA512c7f8ac6ae27f8f53cd54cc680f4644e0c1ece392e8177ed0b2365dbf35e67787dca8134eb22c98a780f14c780233e2e93bf833b44e261aa5e46b13d5d0433bd6
-
Filesize
1.8MB
MD5e89371f755b748bdd303134b0eaf8ea9
SHA1ede64fa99dea78ca56d6b7995892d6c1f0116f2a
SHA256ca5f6dff3e541dbebc198ceb1db70ea9241e0733b305cb8f6825f65e4582b9c4
SHA5125261230f56d7e9d56506dbc7f8f6f96a9317d8583eb052bb94ac3d05765b27a6c3efeae3958f4da25ecea83183593321fc0b38e23ec85d52f08574b468bf7d2a
-
Filesize
18KB
MD5951d11675a25d5cbe4d460bf9269e6d6
SHA14e6e95fda7cd5e8cd947505d55bbbbe702a84fa1
SHA25647695dd3514cc863f4a6e598649e9a75179aa2c7e5d50e547e4eab4b36ce3c64
SHA5122e25d4009581f9e01e9481567b0dfd6da4b511c703a7a7f39a04856ddf38e5ad17f6e2c12d611c84e12283ec53cd7410559ccd5630510dd962abcf8b1c192ef1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.0MB
MD5dfd54d06b95a37bc065cc8332a7a1120
SHA1a9089a44c8ef4ced5baf20647f7f7948a56f11bf
SHA2561887aac5ad32583da835905ea60cab8c68727eebbfd6633ab1ad9d304df8271b
SHA512be35f74a8f26db0d5e9eb83688abcf74377b1c463230dc8ca89fd91bea08506b77173ae9d6915c126dd95de5d5b6258c311c5fe164bcf2accbea3c3837682a5b
-
Filesize
3.9MB
MD54c32e6a6948ebe144d8533ad6859f335
SHA12a7262c7b5b7a421b574005de28efc35bee8fa69
SHA2562601c4d117a89e6bc867a66a184b79f6f2919827bd56ef2119a4bf18cdfefe91
SHA51234e76ecc992729b7614eb9c9c0a2a4528cce7337d89c4bcd59c5c8932f86eb2cc430e42e6e3cdc6df07d2f6a4bbc345beac0842bcb2d9779b063254dbbfc4751
-
Filesize
3.4MB
MD52f3ec4f9298b428a81bd2831b4ebb94f
SHA1f690c634efacda87e25b3cad1ebc3372721e5d46
SHA256a8f2eac77fc10d3460b51f40100a1cef0465a6ec8cccc77b3ac4a613a6ecdd1b
SHA512b64ed4e9a6a023e1dd0ce6999001b9a15b731f224ab67264e464abb283d59531b7b265af0d59792c0561066faf6343cb034ffa2c7885b3604e68e295901d1dc0
-
Filesize
50KB
MD54ce8fc5016e97f84dadaf983cca845f2
SHA10d6fb5a16442cf393d5658a9f40d2501d8fd725c
SHA256f4da7f22e8eb28cfd8ecb0c3fdc8923b2ba5c5e96b917cbcf53b6bbed1c22551
SHA5124adeb4774ca136a085bc92cf6f02aa340f927ae12e1db90e8a2be69ef045611d333904ef5714c876ab03f8bcc52ee0140e724bd1659b9cf9eacf0a7d6a7bdd46
-
Filesize
19KB
MD544a203acf78db40991cdc253ae1b9ed8
SHA19654680d9e8fb51c1ddf77e2762b9418d467ce83
SHA2565447a277e0672043936132b60b3d1730c9274f00253268ac0e63a581aa54be07
SHA51272eab58b481fbdfafb25ed33ec97ffd3cb226bc77b82dbe1b3e31ba359d1ec73c9dbafc8f5f128b3514ad9055b3c38656772c632cf5d496943d7c5320700fe8d