Analysis
-
max time kernel
134s -
max time network
287s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
11/07/2024, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
ec86bd905bd5524841fccc2c895e99d587ddeeced4ffa439d962e05e77c02e2b.exe
Resource
win7-20240704-en
General
-
Target
ec86bd905bd5524841fccc2c895e99d587ddeeced4ffa439d962e05e77c02e2b.exe
-
Size
908KB
-
MD5
bf74f5b3149cb45d8a0efdfeaca50c98
-
SHA1
0bfe3661e7821586fbe8e569ffc48fa1a71d995d
-
SHA256
ec86bd905bd5524841fccc2c895e99d587ddeeced4ffa439d962e05e77c02e2b
-
SHA512
7ed7068b0816c547f45acf634f77377703d16ce183f488579e55a4d070d6d00bd0b337d12fc92457ba58fd66a2bfa744ad7e43af77e03361654746a979c1c31a
-
SSDEEP
24576:Am9C2jncX0aBNt11yY65swIcU5KDoM1m96siDDyQQNDZ:oWOD18Y6WwIN5YI6xDyJDZ
Malware Config
Extracted
vidar
https://t.me/bu77un
https://steamcommunity.com/profiles/76561199730044335
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1
Signatures
-
Detect Vidar Stealer 4 IoCs
resource yara_rule behavioral2/memory/4908-375-0x0000000004130000-0x0000000004378000-memory.dmp family_vidar_v7 behavioral2/memory/4908-376-0x0000000004130000-0x0000000004378000-memory.dmp family_vidar_v7 behavioral2/memory/4908-390-0x0000000004130000-0x0000000004378000-memory.dmp family_vidar_v7 behavioral2/memory/4908-391-0x0000000004130000-0x0000000004378000-memory.dmp family_vidar_v7 -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4908 created 3344 4908 Happening.pif 54 -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TechHarbor.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TechHarbor.url cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 4908 Happening.pif -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Happening.pif Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Happening.pif -
Delays execution with timeout.exe 2 IoCs
pid Process 3568 timeout.exe 4480 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 4676 tasklist.exe 3532 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4676 tasklist.exe Token: SeDebugPrivilege 3532 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4908 Happening.pif 4908 Happening.pif 4908 Happening.pif -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2668 1580 ec86bd905bd5524841fccc2c895e99d587ddeeced4ffa439d962e05e77c02e2b.exe 72 PID 1580 wrote to memory of 2668 1580 ec86bd905bd5524841fccc2c895e99d587ddeeced4ffa439d962e05e77c02e2b.exe 72 PID 1580 wrote to memory of 2668 1580 ec86bd905bd5524841fccc2c895e99d587ddeeced4ffa439d962e05e77c02e2b.exe 72 PID 2668 wrote to memory of 4676 2668 cmd.exe 74 PID 2668 wrote to memory of 4676 2668 cmd.exe 74 PID 2668 wrote to memory of 4676 2668 cmd.exe 74 PID 2668 wrote to memory of 520 2668 cmd.exe 75 PID 2668 wrote to memory of 520 2668 cmd.exe 75 PID 2668 wrote to memory of 520 2668 cmd.exe 75 PID 2668 wrote to memory of 3532 2668 cmd.exe 77 PID 2668 wrote to memory of 3532 2668 cmd.exe 77 PID 2668 wrote to memory of 3532 2668 cmd.exe 77 PID 2668 wrote to memory of 500 2668 cmd.exe 78 PID 2668 wrote to memory of 500 2668 cmd.exe 78 PID 2668 wrote to memory of 500 2668 cmd.exe 78 PID 2668 wrote to memory of 2076 2668 cmd.exe 79 PID 2668 wrote to memory of 2076 2668 cmd.exe 79 PID 2668 wrote to memory of 2076 2668 cmd.exe 79 PID 2668 wrote to memory of 4128 2668 cmd.exe 80 PID 2668 wrote to memory of 4128 2668 cmd.exe 80 PID 2668 wrote to memory of 4128 2668 cmd.exe 80 PID 2668 wrote to memory of 4896 2668 cmd.exe 81 PID 2668 wrote to memory of 4896 2668 cmd.exe 81 PID 2668 wrote to memory of 4896 2668 cmd.exe 81 PID 2668 wrote to memory of 4908 2668 cmd.exe 82 PID 2668 wrote to memory of 4908 2668 cmd.exe 82 PID 2668 wrote to memory of 4908 2668 cmd.exe 82 PID 2668 wrote to memory of 3568 2668 cmd.exe 83 PID 2668 wrote to memory of 3568 2668 cmd.exe 83 PID 2668 wrote to memory of 3568 2668 cmd.exe 83 PID 4908 wrote to memory of 4184 4908 Happening.pif 84 PID 4908 wrote to memory of 4184 4908 Happening.pif 84 PID 4908 wrote to memory of 4184 4908 Happening.pif 84 PID 4908 wrote to memory of 648 4908 Happening.pif 87 PID 4908 wrote to memory of 648 4908 Happening.pif 87 PID 4908 wrote to memory of 648 4908 Happening.pif 87 PID 648 wrote to memory of 4480 648 cmd.exe 89 PID 648 wrote to memory of 4480 648 cmd.exe 89 PID 648 wrote to memory of 4480 648 cmd.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\ec86bd905bd5524841fccc2c895e99d587ddeeced4ffa439d962e05e77c02e2b.exe"C:\Users\Admin\AppData\Local\Temp\ec86bd905bd5524841fccc2c895e99d587ddeeced4ffa439d962e05e77c02e2b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k copy Painted Painted.cmd & Painted.cmd & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵PID:520
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"4⤵PID:500
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1400274⤵PID:2076
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "ongoingdarknessheardfundamentals" Dicke4⤵PID:4128
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Coordinator + Hold + Rhythm 140027\H4⤵PID:4896
-
-
C:\Users\Admin\AppData\Local\Temp\140027\Happening.pif140027\Happening.pif 140027\H4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\140027\Happening.pif" & rd /s /q "C:\ProgramData\GIEHJKEBAAEB" & exit5⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- Delays execution with timeout.exe
PID:4480
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 54⤵
- Delays execution with timeout.exe
PID:3568
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TechHarbor.url" & echo URL="C:\Users\Admin\AppData\Local\MaritimeTech Dynamics\TechHarbor.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TechHarbor.url" & exit2⤵
- Drops startup file
PID:4184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346KB
MD588f9e51b8d309d3dac18a189584ab1d3
SHA1f34dff401f7064d055d837c9b5d884ed75a40609
SHA256322f275e5b893b8da1f2ffde8ec3472d9356aeebd3f8e1203fd500a9534c4cdb
SHA5120cdf2268ded838ba84df02bc22cb6646c23f02a3634e2b67b343f0fbbef2b08bc1bf26f4cef8823fd81698e7031a785749c78f6c802035b945ce28998bbf65a8
-
Filesize
915KB
MD5b06e67f9767e5023892d9698703ad098
SHA1acc07666f4c1d4461d3e1c263cf6a194a8dd1544
SHA2568498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb
SHA5127972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943
-
Filesize
10KB
MD52df4a1a59802d59d69ca80e122d32bd4
SHA1c7f3c71c22ad384ccb7317abe2e984ea6e257c75
SHA256f2ff747cfdfcf13d007609405f56fd6250135b50885dfd66ae217c3e8f0e0ac2
SHA512a3db36f488a2f7ad86b165d0e70a714f6aa9eadb3203534e597a5939994c253941e0b58f3700de09e637192ccd7ef685e619fbfd78e29bf7e3956049a095cbea
-
Filesize
5KB
MD5d4c95b67feb441bbd00b05fe3668062f
SHA1dcbc29c3a13f95bfbec93625a50118627005132b
SHA256d24410b87bd280e0a239c08af3f911f39022414c978f60f79dfbc17611fea3b0
SHA51262e9f49d77122c8b1a5131b3abfb4b89a5f974f1a2f330879ec3b095f4934d314fb976a39204e563e49f1fef54dc78e9417f7a6c2a4db71e77b16c66b03e956e
-
Filesize
124KB
MD597395d29e3a083f1abab5579268f4c77
SHA1b45448e4c8f4c16b22e761abeec6ac13c1525d15
SHA256ec9d3b36f7410b6356ae9b53bf8d49534ca5493c6c866958d997025e958b29a9
SHA512495a762cbe1fe81a1ccd966ca045ed61b11068018b484ec442fe3e2b61b5bd2909e8c72ab2fd64339c13072cdbbc6f6b2d30c7ae63a4a59fff5c26535565e3c9
-
Filesize
64KB
MD55a2ee96b158f710ff95f804af7b750b4
SHA1cb3a2e352fcec54db3213b02992193e8e1259660
SHA25617bdd0a593c3a70c920d3dc4e758a8f7a5676cc17b2cd920cfccebf076e42851
SHA512eca622a80d1faae52e3a7d36c7acfbc5973cce968a9446955dcf455e5d0158adad1c41513e557b9bef4bfe43a55f42dab1311dcb136d5d822c70b577a00fce3b
-
Filesize
157B
MD5359fa6e177dd14d0ded68c7dec672f19
SHA1e2d60d5540a9eef584719a06cbba1083d6c17146
SHA2569c635ba52246dfb81225a539bddf62a323ec25391d9e52181be88f6cb443c788
SHA5121cdb0a5c706f184b9300853fd69cc025dc7fd37b61beb6e8dd4233d37528da9b7a04fee445ca07413d5bdccec8594dbcd02a416ab5503624f51aa2ad9eda91f6
-
Filesize
69KB
MD52cbaa3baf5f04a4abca66cac2c7b7499
SHA103c26c4a11ec938200918dbf943ec40842014e50
SHA256748d1be0ef94c8823c148e69b8d81377385a4aa4afc005c67c6466f188c2afce
SHA512b0e57c21e4cfd3fde7dd863e52bacdeab53d1c1550680609fbd44e032084875d440b101e8e144c0b9fd7e28e34ae5580857d3021ea2717abcec8fb677df3fec4
-
Filesize
46KB
MD51c75ac78fe98752e9aa204e4b7314e04
SHA1d49cb4863074180413739ecc71a92ad02dc57291
SHA256ac5ab3ead6322e91733e3a3e0b294b9830c6148f345ec21d22bf92d6b8ca5f71
SHA5123edde1a9fe99e2a809b1b35afcfb8adeb35315fc86e3328211f0be18db62ca583b6ffd5575700ceab17247718db1c458bc84c27404d810902e0588d8ba746181
-
Filesize
61KB
MD52266822d6fe3eae517eec05f881ac1c2
SHA1b7f4e29a975ccabb699b9fa4b0289118b47048fc
SHA2566ca3abd72183df349cfcc3cc866e65854c3b409cd0e3c780b4819c2672fc481b
SHA512d2828171c9c795d8fb7fa72715daf0fec291c49e30d0580ccca7ff31c000954502e2606e802367144d93d9fec5d150d44c6e3191c92ce1c6a0f42baee1fdac37
-
Filesize
64KB
MD5efd1a7956d6ca50fe7affefecc45a610
SHA17c473b33c4b79e531ddc99d65774c7c4e3611675
SHA256db51d1ee61e70191fe40633d121a4660b047a9a820fa37a1d84673947cc8bd7b
SHA5127aece4b0e7bb95bb9f6a8c22e081a9babee4f78f964571a72e3e6836e351c0be9a18a92a45f232f173ae7f292e5f558d837a6c4d917341ec48d20442c2a0649b
-
Filesize
64KB
MD5939798cbe2711d9ee4b46b829240b198
SHA1ca04be6fef2d26eb09d74882744ff111d927e83e
SHA2565980acaf95da28c5eff0770cc7779c2551dd44d95fdb2ac415b7f6f400150c94
SHA5120a523d941de49823528c45678e8bc3fe872d4d9e7fc8cbeb3fb5c7dc4ef3920bd12e9bc85f7f0c88251fb2c7072ebecc112046e536daed837e4d0119dd805b99
-
Filesize
26KB
MD53e2dc01cbd7defd58b7d9a2e7fa5a947
SHA1c6369f1ad3d076c3555d74060a6946d45c4753a5
SHA25672634f99a6f4b4d3d7194e191a9e62957648faa8bd5d429d537d500414da8056
SHA5129cbd9ddc89b0eeeebd6313a9ec9dc36dd7b7c3729615c3bd3e168b5fb6f98a9974eb4c89fc1692aaa5e2f2cd90588f0ba248760ba9ae0f45a6117c6329e45c2b
-
Filesize
6KB
MD5de13f6966bff7073e99d19df22b70347
SHA1e6aa2f4bc4e1c49e5fd33a14445f4fcb694c7231
SHA256ceaff2127fba389db5a434eaffff6dd9a5ea5fb59d389b9514e5df2c682e6946
SHA5122463940e5be0c09b373833e59bc0ddc9c6ddb27ba7ed6d1115603ce45c1cf98f67ad8793562596638ba22b56844378954b0423401aad27c64a6e55eba94c5fc7
-
Filesize
179KB
MD589298b3f9140206de17b99593c32a300
SHA1abd9f2163ab22289d0c8d6f21c12cd273c11032f
SHA256925f257a91f4651a975b9dc8d9c971a5f5ec97ce31f1cf9ae9b06c45cbd9f773
SHA5127221def959bfbaf2bef608c993a47198349c7a237a00697c8965471a7652471b98cf51cdab0dd1c8eb7e1e2f34787d3a48988650317c2d0986fa3f998a4d554f
-
Filesize
27KB
MD5d675ed631ebc15ef59476d485062157a
SHA1f61f737ae894ab9fb569a4c90c43d8019610299f
SHA2568cca4052b5e7a9c9c730c0486716bfdd1cc12d167a4c485aae81c506b6717347
SHA512b09e22d043324d80ff513b12410aad09e52f163747eb2cf7070e6463590f3f5a9fff3d764183cbbf3f2072f3f4f50120899a45babfc35c73e8e1755482263cdf
-
Filesize
13KB
MD5193a3d556bc1eacd55efa5d8db3c9c9a
SHA141268345311bfb644b63292d83801f1ea06f07e3
SHA256a7a4281bb0ede83cb54f185872226e0f634ac87d3ea56a9ebe4cb1fda852f7f7
SHA5129a492e843654b835bc23df90a88c5e0bb93ecf8eef19a94db1225de34d1769d4fc6cf3859fb40049283cf9d61b08e4d7ae74942652305c814807f713268de3c9
-
Filesize
27KB
MD5109790f77e7569651334f1b7287d80c3
SHA143d20f33383ee50a6225deec6ba650e32f2340fa
SHA256bd8eaea46a1be8740accf43d12d7b73e0113ec33ff0a5e07d070289278f5562c
SHA512c95e168961c6d9892217fa8784d238b1b380aef344a8d9e28091cff67ddee983dc20f779915779c54cae81c1bcc597e3ba7b6e280cd36ef196baec7a89be1da7
-
Filesize
66KB
MD5dd650c832370c19f4ec4ccaa7d92fa7b
SHA170b3466e12242d76ca2cf89ef8302ed41fefe57a
SHA25662b70c044cbd870b07ff67aaa9c5a4a64a99e2f683911e134436c2f08b530dba
SHA512f352c29745bbb48b2bbe3f5df6aac80c9a383dba5625c8e9949130f86d4b5e42708ac09059d2f09cc9bdad1e51376b74e38c1b1b17a8ac214327ef8f6f3bb477
-
Filesize
56KB
MD5009d0f9d2383a2cb8bbcd0e778c1f132
SHA108e0943fcbe12d1537ae7e614f573374db8fad71
SHA2561160a3c21164a6fb1f2a6f7f67cf7cfe7c1726717f631119224ca1f72034403b
SHA51226beadd124aea4dd37036821e441a6d87b157cf730b21f86f062652437c701785d1657cb717c85ed4cb03fddcbbd06906be7db2ab8e3e1c077a2eefc43af0523
-
Filesize
43KB
MD5aefca217c8935f69889d1dba95dfc289
SHA15fffc9c4184f5ceacc77ba62497a3f8645408012
SHA2560683228c1fd52868ac49e3c3fcb9a266e94ffb86812c3aaf58d497da771e631d
SHA51232c45647cc4647fac8f3b6215b9c3b307ba8eda622ce6ce87f36197d5103aa781394796bb473bcf43d2511a706dc3a4b7d5b2a1da07ce5c85feeb24d51fcee85
-
Filesize
24KB
MD5d93fb8a2a986b3e625943949f2c4f2c6
SHA15e1f0e4c3534668f4885e5551e418b4256a99c37
SHA256485191b6c573d26c287bbcdd3d38ee571f01ae81e21461220d294529d3afc5e1
SHA512454c2d6ea0ca61fda2757c8d2b6bbc8189de33bb9e7e504f67b223c089bf9d238b564151432981645edcbdafdcadd2f37f1cacf2f7fb5d5dab7877cac289410c
-
Filesize
52KB
MD52fe49400991a9c288e5e52341d85acb9
SHA14792eebb6bd294fc2661d45f24491b6b15cb22bc
SHA25684802ff0309f059530939690ffeefc77f31c6ffde9842adae9f3861b6b015172
SHA5126cc420d55f2d8969aff6d51d114a9971d8b9528eca8242f55db5e4293d073a15b50a8f45523f61ff6a280dc44a3eb7795cad6df34c5096a1698437c1f8cdb400
-
Filesize
10KB
MD50a2fa399ef0664d11854b817ac4ffc32
SHA18411236c5bef9592f0ced381604b286a19e83e0e
SHA25606bcb3b0b85bf13c9be9928392e9f8de08390f33989b10705b1ac978de19f473
SHA512d7673a4755c12b72c12480f4774007200eeb35232c3d18a1228e10fa9920956c04d79b07af9b176e43cbe8161ec613445dc8224da983a867f4840fb1c5229b65
-
Filesize
33KB
MD5957ff114f22139cb41626606d57c828d
SHA1a5392c9af1e78bff2c389cf2f43a6345e2fa34b7
SHA2567ded30fe0e555dbe4d0494de71b14befe89ef9ee2aee9ba1715ab45a01bd108d
SHA5128c20a3d6f6f92a4900e11357718d4de5ac3f3405c44752ad8dbb882a89b0ebf13d4bf201ba376053b88c44117365fb84054b594395d5175deca280a016b9e975
-
Filesize
6KB
MD5515f100ba7bc7a24ab66f0f072ad1865
SHA165fb9bdb3ead40f926022ae04768b16f885e75cf
SHA256e1d1f95b7eddd8aa99ec1dba8b65b16eee4be311fabee439c8f1050035ada7aa
SHA512fc38504e22721793335deaf22686f44d556bcc9c217409a38f0758058532cfa8f288a6419187146657c18a0fbddebaa176bce6ad1865d214b703856c46b62a58
-
Filesize
49KB
MD5574b5f8ed8cc16fb8d3baca4c02c6511
SHA1b6636f45f63e048a551cf29158acecde147ac4e5
SHA25611df0e68b617f574d910fc02f79346a510458f5176cbdeeec06dcc1bcff9c5e4
SHA51271c2a4625b362a3df427341f9cea61d3c5c11ecc456b2a0254d6aafc938f701a10ccea623356f6315e403cc1464838232fac4243dca1187afba265e83f0dfd93
-
Filesize
59KB
MD5bc8f40032ab1d6bfa1c3a92ea6b8f978
SHA12a979964f0cf45d0e917cfea2cd8f15b95564e28
SHA25651bf8ceffc6128f75f39a61c2ff59f0c0ba3c90f772e607cac730c16a83d6b47
SHA5123c11f2340e066325335660c0ff63ba014dfbb4a545f96bbbede10ae75e22954d204cf32636c74fc24b35ad1cd800b81d30bc6b8c22000384ef4e5e67d233b983
-
Filesize
43KB
MD58ed7db674778dbd0de5031ad40c1d526
SHA1aada9a2e00b3b70924cd027a2b8d39a323f0266a
SHA256587d7fad1949d722ba304c591514cc677d41d8aa1da83d640899be79f32d8966
SHA5123840c2a6bddeb6722bcd257e015c887038150a2fb3184c680fb098748ed2b083e0f0b77d811d383f70b38fb34f9cc436d36ce3075e2457effc6fa4c14362f058
-
Filesize
48KB
MD5de040c7a8973668b178554ca50721483
SHA1144175aebaf0c0499afb4281061600b6cc7596ec
SHA256455a1cff615cb851e99c3a7d2f419cc072ff61636f8c19e3b27a64ae9d89434d
SHA512d0c37fc7820cf53ddabf9d27e26cb1c313498d53de1466913ddf3a00a4ff0204056f82a87c71dc4ff509c751858bd61036e43e9243f61f821adfda55eee5fc27