Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 22:01
Behavioral task
behavioral1
Sample
261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe
Resource
win10v2004-20240802-en
General
-
Target
261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe
-
Size
2.9MB
-
MD5
9db52b386b9f24c7568b215b9b55c71e
-
SHA1
bf9f202831a0a6feb10f03c69ae5f9aee8d4f4fc
-
SHA256
261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f
-
SHA512
1c48a414bccbe6d101d61e5ffec30740d35737981e171ba313e8b2e0b145a20e7fafe4b3db07f35e5bcc75a975b49cb32822219bfc6586a62e0d9b6b80225292
-
SSDEEP
49152:RTznnirmSfkIopz4aJanP0xIKYE00AaISNn1+/JT5xk+xFwUa8Fn6q1lCr1:RnnirHspz4aJGPpKZ9AaI7vFwZBq1w1
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2348-101-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat behavioral1/memory/2436-118-0x0000000002E90000-0x0000000002FEC000-memory.dmp fatalrat -
Processes:
resource yara_rule behavioral1/files/0x000700000001722b-30.dat aspack_v212_v242 -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 3064 cmd.exe -
Executes dropped EXE 6 IoCs
Processes:
sg.tmpugg.exeQTalk.exespolsvt.exespolsvt.exesvcoth.exepid Process 2640 sg.tmp 2760 ugg.exe 1100 QTalk.exe 1420 spolsvt.exe 2348 spolsvt.exe 2688 svcoth.exe -
Loads dropped DLL 9 IoCs
Processes:
261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exeugg.exeQTalk.exespolsvt.exepid Process 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 2760 ugg.exe 1100 QTalk.exe 1100 QTalk.exe 1420 spolsvt.exe 1420 spolsvt.exe 1420 spolsvt.exe 1420 spolsvt.exe -
Processes:
resource yara_rule behavioral1/memory/2436-0-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral1/memory/2992-8-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral1/memory/2992-11-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral1/memory/2944-121-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral1/memory/2436-119-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral1/memory/2436-120-0x0000000000400000-0x000000000055C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ugg.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Çý¶¯ÈËÉú = "C:\\Users\\Public\\Documents\\sougou\\PTvrst.exe" ugg.exe -
Processes:
ugg.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ugg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
QTalk.exespolsvt.exedescription pid Process procid_target PID 1100 set thread context of 1420 1100 QTalk.exe 39 PID 1420 set thread context of 2348 1420 spolsvt.exe 40 PID 1420 set thread context of 2688 1420 spolsvt.exe 44 -
Drops file in Program Files directory 4 IoCs
Processes:
sg.tmpdescription ioc Process File created C:\Program Files (x86)\ChromeSetup.exe sg.tmp File opened for modification C:\Program Files (x86)\ChromeSetup.exe sg.tmp File created C:\Program Files (x86)\ugg.exe sg.tmp File opened for modification C:\Program Files (x86)\ugg.exe sg.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ugg.exeQTalk.exespolsvt.exespolsvt.exe261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exesvcoth.exe261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ugg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QTalk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spolsvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spolsvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcoth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exesg.tmpspolsvt.exe261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exedescription pid Process Token: SeBackupPrivilege 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeRestorePrivilege 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: 33 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeIncBasePriorityPrivilege 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeCreateGlobalPrivilege 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: 33 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeIncBasePriorityPrivilege 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: 33 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeIncBasePriorityPrivilege 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeBackupPrivilege 2992 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeRestorePrivilege 2992 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: 33 2992 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeIncBasePriorityPrivilege 2992 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: 33 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeIncBasePriorityPrivilege 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeRestorePrivilege 2640 sg.tmp Token: 35 2640 sg.tmp Token: SeSecurityPrivilege 2640 sg.tmp Token: SeSecurityPrivilege 2640 sg.tmp Token: 33 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeIncBasePriorityPrivilege 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeDebugPrivilege 2348 spolsvt.exe Token: 33 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeIncBasePriorityPrivilege 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeBackupPrivilege 2944 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeRestorePrivilege 2944 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: 33 2944 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe Token: SeIncBasePriorityPrivilege 2944 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
ugg.exeQTalk.exepid Process 2760 ugg.exe 2760 ugg.exe 1100 QTalk.exe 1100 QTalk.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exeugg.exeQTalk.exespolsvt.exe261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exedescription pid Process procid_target PID 2436 wrote to memory of 2328 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 30 PID 2436 wrote to memory of 2328 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 30 PID 2436 wrote to memory of 2328 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 30 PID 2436 wrote to memory of 2328 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 30 PID 2436 wrote to memory of 2992 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 32 PID 2436 wrote to memory of 2992 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 32 PID 2436 wrote to memory of 2992 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 32 PID 2436 wrote to memory of 2992 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 32 PID 2436 wrote to memory of 2992 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 32 PID 2436 wrote to memory of 2992 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 32 PID 2436 wrote to memory of 2992 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 32 PID 2436 wrote to memory of 2640 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 33 PID 2436 wrote to memory of 2640 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 33 PID 2436 wrote to memory of 2640 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 33 PID 2436 wrote to memory of 2640 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 33 PID 2436 wrote to memory of 2760 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 35 PID 2436 wrote to memory of 2760 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 35 PID 2436 wrote to memory of 2760 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 35 PID 2436 wrote to memory of 2760 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 35 PID 2760 wrote to memory of 1100 2760 ugg.exe 38 PID 2760 wrote to memory of 1100 2760 ugg.exe 38 PID 2760 wrote to memory of 1100 2760 ugg.exe 38 PID 2760 wrote to memory of 1100 2760 ugg.exe 38 PID 1100 wrote to memory of 1420 1100 QTalk.exe 39 PID 1100 wrote to memory of 1420 1100 QTalk.exe 39 PID 1100 wrote to memory of 1420 1100 QTalk.exe 39 PID 1100 wrote to memory of 1420 1100 QTalk.exe 39 PID 1100 wrote to memory of 1420 1100 QTalk.exe 39 PID 1100 wrote to memory of 1420 1100 QTalk.exe 39 PID 1100 wrote to memory of 1420 1100 QTalk.exe 39 PID 1100 wrote to memory of 1420 1100 QTalk.exe 39 PID 1100 wrote to memory of 1420 1100 QTalk.exe 39 PID 1420 wrote to memory of 2348 1420 spolsvt.exe 40 PID 1420 wrote to memory of 2348 1420 spolsvt.exe 40 PID 1420 wrote to memory of 2348 1420 spolsvt.exe 40 PID 1420 wrote to memory of 2348 1420 spolsvt.exe 40 PID 1420 wrote to memory of 2348 1420 spolsvt.exe 40 PID 1420 wrote to memory of 2348 1420 spolsvt.exe 40 PID 1420 wrote to memory of 2348 1420 spolsvt.exe 40 PID 1420 wrote to memory of 2348 1420 spolsvt.exe 40 PID 1420 wrote to memory of 2348 1420 spolsvt.exe 40 PID 2436 wrote to memory of 2944 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 41 PID 2436 wrote to memory of 2944 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 41 PID 2436 wrote to memory of 2944 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 41 PID 2436 wrote to memory of 2944 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 41 PID 2436 wrote to memory of 2944 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 41 PID 2436 wrote to memory of 2944 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 41 PID 2436 wrote to memory of 2944 2436 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 41 PID 2944 wrote to memory of 3064 2944 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 42 PID 2944 wrote to memory of 3064 2944 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 42 PID 2944 wrote to memory of 3064 2944 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 42 PID 2944 wrote to memory of 3064 2944 261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe 42 PID 1420 wrote to memory of 2688 1420 spolsvt.exe 44 PID 1420 wrote to memory of 2688 1420 spolsvt.exe 44 PID 1420 wrote to memory of 2688 1420 spolsvt.exe 44 PID 1420 wrote to memory of 2688 1420 spolsvt.exe 44 PID 1420 wrote to memory of 2688 1420 spolsvt.exe 44 PID 1420 wrote to memory of 2688 1420 spolsvt.exe 44 PID 1420 wrote to memory of 2688 1420 spolsvt.exe 44 PID 1420 wrote to memory of 2688 1420 spolsvt.exe 44 PID 1420 wrote to memory of 2688 1420 spolsvt.exe 44 PID 1420 wrote to memory of 2688 1420 spolsvt.exe 44 PID 1420 wrote to memory of 2688 1420 spolsvt.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe"C:\Users\Admin\AppData\Local\Temp\261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\system32\cmd.execmd.exe /c set2⤵PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exePECMD**pecmd-cmd* PUTF -dd -skipb=946176 -len=2045509 "C:\Users\Admin\AppData\Local\Temp\~1033313061269621346.tmp",,C:\Users\Admin\AppData\Local\Temp\261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\~2992171800725171528~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\~1033313061269621346.tmp" -y -aoa -o"C:\Program Files (x86)\"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Program Files (x86)\ugg.exe"C:\Program Files (x86)\\ugg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Public\Documents\sougou\V4.6.80\Bin\QTalk.exeC:\Users\Public\Documents\sougou\V4.6.80\Bin\QTalk.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Public\Documents\sougou\spolsvt.exeC:\Users\Public\Documents\sougou\spolsvt.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Public\Documents\dd\spolsvt.exeC:\Users\Public\Documents\dd\spolsvt.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Users\Public\Documents\uu\svcoth.exeC:\Users\Public\Documents\uu\svcoth.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\261ccf6127419071501f01090e7443779ae9a84e47abc03c38cd652c24d2a51f.exePECMD**pecmd-cmd* EXEC -wd:C: -hide cmd /c "C:\Users\Admin\AppData\Local\Temp\~1663124183249574265.cmd"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\~1663124183249574265.cmd"3⤵
- Deletes itself
PID:3064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD52b4fb46f2c28ed16e6ef82101780491c
SHA146d8191ab7c89cbebe36b3bf8f9d457fa0751716
SHA25641d006fbc03a5fb95bfc2d2a87459902890b469c1bd85d9ff4e8a4d1bf3b99dd
SHA5129c6412f6edbf98b8f7b52366463e01c28149ac19f94c297892f9fb7aafef41ab16f5e6ea036f5056dd422e402b15e283955b165c284d38264dc662c1a9a968d5
-
Filesize
2.0MB
MD5d248eb4f4ab9e5515aa6a0a9df65c1dc
SHA174a026cf8877fa20d9f80bef37ff4101b5f2d345
SHA2569d5901dcb20509c8e097c626b7da78203a881d96e05d6170002739d67aa280ab
SHA512954f5e6f442287d9a5e763a32546c374bda9fddf8192130a5a9b6589395acd9a471117ad8c5d9f945a00007b3eaa8bcd526e8467f2b179ba8e384bfbb2837e18
-
Filesize
521B
MD5093f15de9bfbb1af4763993effd21571
SHA120ada276f16c00b4eca5ac8b008e9428dbb2980d
SHA2562d19df8b2f86592bcc86fcdb4d1483803f3afb2ae1e6080510f1dd59176780e7
SHA5122115f185d438b5403712d70c00a9f7b2e88204e630dcabec5bb0a4f16fedd7e1d5c9c60974dcaba4d4e158a376cfede39465557cdcfce7277995a79d0a912089
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
196KB
MD51785c2aeecf8e19603872c8b73681cba
SHA1efad939c6eeb68858ba4105b82d33ac65deaef01
SHA256a60033b945c83d22846c9c2be31f8561b14c4ffceddd41be62014e03d4632eef
SHA5128937de98663dea4862a574238786783c203d61927d031c811973bcf56014364ef84bff7bb17dc90dc840f5055dddd593eee69e597673de58a5325c5af4ff32b3
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
761KB
MD580c469aef3c93b7062ee21d4dbd1f43f
SHA1df5ddf2d4257e89941c57e4d935da424dfd839a7
SHA2562ca06c6d19785bd5b9e8f05da99311fcaafd64384df164c1f06a33622aaa397b
SHA512e868d2a4d54ee4e16e8fce35447029eb0317dd8da961cf6b44ac13504b1b9fa8046faaaca9d432cd132ef928c247de7a588d9f30fabb3fd8a61a2ee5475006d4
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516