Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 19:12
Static task
static1
Behavioral task
behavioral1
Sample
8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe
Resource
win7-20240221-en
General
-
Target
8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe
-
Size
10.8MB
-
MD5
dd69cce4a6817cf93960675148c35dfd
-
SHA1
b0bb7338492678de3e96f1c11337591f0d9d392c
-
SHA256
8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b
-
SHA512
be5bd8a923fd4791cff81862ee788067a546cf88d55ccac6c170eee6f1999698e8cf2ec531c3c92f009c0c0f34c332f6c7327a74b3fdf1d74ddbdc47015927e7
-
SSDEEP
196608:8KXbeO7gmK+/eQ0VydJYvvCJc6SLK0zyx2QHPMFLOyomFHKnP:97gaDdJYiEmTHPMF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1676-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1676-18-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1676-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3432-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3432-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3888-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3888-42-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3888-45-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral2/files/0x0008000000023253-5.dat family_gh0strat behavioral2/memory/1676-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1676-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1676-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3432-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3432-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3888-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3888-42-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3888-45-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\240657125.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 6 IoCs
pid Process 5008 R.exe 1676 N.exe 3432 TXPlatfor.exe 3888 TXPlatfor.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2984 Remote Data.exe -
Loads dropped DLL 3 IoCs
pid Process 5008 R.exe 4856 svchost.exe 2984 Remote Data.exe -
resource yara_rule behavioral2/memory/1676-12-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1676-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1676-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1676-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3432-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3432-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3432-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3888-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3888-42-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3888-45-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\240657125.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4564 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3176 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 3176 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3888 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1676 N.exe Token: SeLoadDriverPrivilege 3888 TXPlatfor.exe Token: 33 3888 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 3888 TXPlatfor.exe Token: 33 3888 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 3888 TXPlatfor.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3176 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 3176 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 760 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3176 wrote to memory of 5008 3176 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 92 PID 3176 wrote to memory of 5008 3176 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 92 PID 3176 wrote to memory of 5008 3176 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 92 PID 3176 wrote to memory of 1676 3176 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 93 PID 3176 wrote to memory of 1676 3176 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 93 PID 3176 wrote to memory of 1676 3176 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 93 PID 1676 wrote to memory of 2260 1676 N.exe 97 PID 1676 wrote to memory of 2260 1676 N.exe 97 PID 1676 wrote to memory of 2260 1676 N.exe 97 PID 3432 wrote to memory of 3888 3432 TXPlatfor.exe 99 PID 3432 wrote to memory of 3888 3432 TXPlatfor.exe 99 PID 3432 wrote to memory of 3888 3432 TXPlatfor.exe 99 PID 3176 wrote to memory of 760 3176 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 101 PID 3176 wrote to memory of 760 3176 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 101 PID 3176 wrote to memory of 760 3176 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 101 PID 2260 wrote to memory of 4564 2260 cmd.exe 100 PID 2260 wrote to memory of 4564 2260 cmd.exe 100 PID 2260 wrote to memory of 4564 2260 cmd.exe 100 PID 4856 wrote to memory of 2984 4856 svchost.exe 102 PID 4856 wrote to memory of 2984 4856 svchost.exe 102 PID 4856 wrote to memory of 2984 4856 svchost.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe"C:\Users\Admin\AppData\Local\Temp\8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:4564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exeC:\Users\Admin\AppData\Local\Temp\HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:760
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:4644
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\240657125.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2984
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3696 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe
Filesize8.3MB
MD59f4a4411eb827de1050f23d56f5d30e3
SHA1907c58d78025730f35269033b3dba380c37997ad
SHA256754f57935d2ff76e6393ef12b63ec36461ded4d939a80420037227cb0b282530
SHA5125aac63a5915e5fe25fe83ba07741518d13167bb9397c6535ce0819bc98d10b513a1fe244b2a4b3328248d1f94ca021a20c4d80be41475e256e13369e97a75208
-
Filesize
2.5MB
MD5915748cafcd3e84806cbdc33611cd17d
SHA1b933028e5c844e7e14338ac92a96abda3a7e3d45
SHA256c82085f33554116cfbb9470ae76b1eb98cf6a3bfbaf6702317ce0b70043fdcb7
SHA51202cde5f98224e4eefb204b16f086c57e30beb64afe3586bc2023b839f4897ff57a3ffe28e4ad6478b0ebc1dd4cb14297255c689a5d8fe1e5152840021072fdd4
-
Filesize
2.5MB
MD5547fa6fb30f6f84982bcfcf304508b7f
SHA1b734f469c8749269585b52dad279b4120b0f9e2e
SHA2564188dcae900b4ee7b554af1542e7e128bb0f45e78763be9a36f4eaff39bde07e
SHA5123f50d28a4ff8125b5b786709627c6c872e89c313b7e64eb2347f58ed1e76d8d70daecedf0b04787f8019b0685124092ede028ed5899cabe7f6d5f4167813bf33
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
10KB
MD5de81b1868885c6215568da56aed41d71
SHA177489958ff7f60280fe78eaa2dae4474a2dced37
SHA256f78bcb7803997cb8d4fcfe034104da012b1f72d0d89fda4584737aad4f99b1b8
SHA512ca3d847cb67923955047189f798f4533c16ed7629e8de84242727af78ea454dd7409e4464b44049de46fdb8ec221b0fd0e9016a4d28154df99ad6a10301bca75
-
Filesize
69KB
MD5e33fb6d686b1a8b171349572c5a33f67
SHA129f24fe536adf799b69b63c83efadc1bce457a54
SHA256020c8e0963f89f4b14538b7d69e83c6fec44a29bbbd52fbb6deb2be5c697f450
SHA512cf1f1d6a9efe53f84e5b4a8246b87c0b96496716605d1b00352d9aae30e664d3d2cbadebf598b4e690a9feef0b5785887a4e643cc5f68938ca744af1d3539e55
-
Filesize
1KB
MD54c40b4d5b1ff494ba3209647afec1082
SHA11617871083590acb7eed99650e1bb2dd44803194
SHA256097fb02903e7812a440e8b2ea32a2fa9572747c9f4590664231dc000bf6fef10
SHA512251f0784478cca37709e4482a5bb167cad8b859c890d55be247493a5820a7109ff8a5ab4edcb742238b612cbe66b41be01e63c770a2f41cb0a23193144e73eba
-
Filesize
899KB
MD5a8f92bdd47a942b5aabf1ac28b921423
SHA11ff72b0389c8ac0c895e427abde962b3c9ba1128
SHA2565714e6d583d5047170658756b5a80953a705c2818752cd7be745ae0d12f941b0
SHA512dc73d17d416c14bb1aa8a5c00f608b20c860c559b5a89f96c5b4bd642f465204cce54ae480e4415d30a16da63a3f3539d72c91e4c42d654e4294036e2eeaa612
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641