Resubmissions
05-01-2025 19:04
250105-xqxrvavngm 1005-01-2025 18:50
250105-xhbveaspat 1005-01-2025 18:38
250105-xaa8xasmby 1004-01-2025 19:18
250104-xzzb2avmfq 1002-01-2025 17:37
250102-v7bjtssnej 1011-12-2024 17:42
241211-v97eaaspes 1011-12-2024 17:40
241211-v9bbvaxleq 1001-10-2024 21:39
241001-1h1ejs1hkq 1029-08-2024 12:54
240829-p5n49avaqp 10Analysis
-
max time kernel
30s -
max time network
365s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 17:42
Static task
static1
Behavioral task
behavioral1
Sample
66bddfcb52736_vidar.exe
Resource
win7-20240704-en
General
-
Target
66bddfcb52736_vidar.exe
-
Size
190KB
-
MD5
fedb687ed23f77925b35623027f799bb
-
SHA1
7f27d0290ecc2c81bf2b2d0fa1026f54fd687c81
-
SHA256
325396d5ffca8546730b9a56c2d0ed99238d48b5e1c3c49e7d027505ea13b8d1
-
SHA512
6d1fa39560f4d7ca57905bc57d615acf96b1ef69ca2a4d7c0353278e8d4466298ed87f514463c49d671cb0e3b6a269a78636a10a1e463dba5c83fe067dc5df18
-
SSDEEP
3072:XqsEJybpRHuJKKBardRei4UGvI96/ZO6RAkeOCeP9sZy28se:XqsMyNRHuKikUi42KZO6PffmZy2d
Malware Config
Extracted
vidar
https://steamcommunity.com/profiles/76561199751190313
https://t.me/pech0nk
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
Extracted
lumma
https://consciousourwi.shop/api
https://potentioallykeos.shop/api
https://interactiedovspm.shop/api
https://charecteristicdxp.shop/api
https://cagedwifedsozm.shop/api
https://deicedosmzj.shop/api
https://southedhiscuso.shop/api
https://weiggheticulop.shop/api
Signatures
-
Detect Vidar Stealer 18 IoCs
resource yara_rule behavioral1/memory/2680-20-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2680-14-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2680-11-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2680-10-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2680-9-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2680-17-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2680-160-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2680-179-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2680-209-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2680-228-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2680-359-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2680-378-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2368-464-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/1816-453-0x0000000002180000-0x0000000004180000-memory.dmp family_vidar_v7 behavioral1/memory/2680-545-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2680-564-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2368-690-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2368-968-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1816 CBGCBGCAFI.exe 404 KKKJEHCGCG.exe -
Loads dropped DLL 10 IoCs
pid Process 2680 RegAsm.exe 2680 RegAsm.exe 2680 RegAsm.exe 2680 RegAsm.exe 2680 RegAsm.exe 2680 RegAsm.exe 2680 RegAsm.exe 2680 RegAsm.exe 2680 RegAsm.exe 2680 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2972 set thread context of 2680 2972 66bddfcb52736_vidar.exe 31 PID 1816 set thread context of 2368 1816 CBGCBGCAFI.exe 35 PID 404 set thread context of 2516 404 KKKJEHCGCG.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CBGCBGCAFI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KKKJEHCGCG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66bddfcb52736_vidar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2692 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2680 RegAsm.exe 2680 RegAsm.exe 2680 RegAsm.exe 2680 RegAsm.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2680 2972 66bddfcb52736_vidar.exe 31 PID 2972 wrote to memory of 2680 2972 66bddfcb52736_vidar.exe 31 PID 2972 wrote to memory of 2680 2972 66bddfcb52736_vidar.exe 31 PID 2972 wrote to memory of 2680 2972 66bddfcb52736_vidar.exe 31 PID 2972 wrote to memory of 2680 2972 66bddfcb52736_vidar.exe 31 PID 2972 wrote to memory of 2680 2972 66bddfcb52736_vidar.exe 31 PID 2972 wrote to memory of 2680 2972 66bddfcb52736_vidar.exe 31 PID 2972 wrote to memory of 2680 2972 66bddfcb52736_vidar.exe 31 PID 2972 wrote to memory of 2680 2972 66bddfcb52736_vidar.exe 31 PID 2972 wrote to memory of 2680 2972 66bddfcb52736_vidar.exe 31 PID 2972 wrote to memory of 2680 2972 66bddfcb52736_vidar.exe 31 PID 2972 wrote to memory of 2680 2972 66bddfcb52736_vidar.exe 31 PID 2972 wrote to memory of 2680 2972 66bddfcb52736_vidar.exe 31 PID 2972 wrote to memory of 2680 2972 66bddfcb52736_vidar.exe 31 PID 2680 wrote to memory of 1816 2680 RegAsm.exe 34 PID 2680 wrote to memory of 1816 2680 RegAsm.exe 34 PID 2680 wrote to memory of 1816 2680 RegAsm.exe 34 PID 2680 wrote to memory of 1816 2680 RegAsm.exe 34 PID 1816 wrote to memory of 2368 1816 CBGCBGCAFI.exe 35 PID 1816 wrote to memory of 2368 1816 CBGCBGCAFI.exe 35 PID 1816 wrote to memory of 2368 1816 CBGCBGCAFI.exe 35 PID 1816 wrote to memory of 2368 1816 CBGCBGCAFI.exe 35 PID 1816 wrote to memory of 2368 1816 CBGCBGCAFI.exe 35 PID 1816 wrote to memory of 2368 1816 CBGCBGCAFI.exe 35 PID 1816 wrote to memory of 2368 1816 CBGCBGCAFI.exe 35 PID 1816 wrote to memory of 2368 1816 CBGCBGCAFI.exe 35 PID 1816 wrote to memory of 2368 1816 CBGCBGCAFI.exe 35 PID 1816 wrote to memory of 2368 1816 CBGCBGCAFI.exe 35 PID 1816 wrote to memory of 2368 1816 CBGCBGCAFI.exe 35 PID 1816 wrote to memory of 2368 1816 CBGCBGCAFI.exe 35 PID 1816 wrote to memory of 2368 1816 CBGCBGCAFI.exe 35 PID 1816 wrote to memory of 2368 1816 CBGCBGCAFI.exe 35 PID 2680 wrote to memory of 404 2680 RegAsm.exe 36 PID 2680 wrote to memory of 404 2680 RegAsm.exe 36 PID 2680 wrote to memory of 404 2680 RegAsm.exe 36 PID 2680 wrote to memory of 404 2680 RegAsm.exe 36 PID 404 wrote to memory of 1312 404 KKKJEHCGCG.exe 37 PID 404 wrote to memory of 1312 404 KKKJEHCGCG.exe 37 PID 404 wrote to memory of 1312 404 KKKJEHCGCG.exe 37 PID 404 wrote to memory of 1312 404 KKKJEHCGCG.exe 37 PID 404 wrote to memory of 1312 404 KKKJEHCGCG.exe 37 PID 404 wrote to memory of 1312 404 KKKJEHCGCG.exe 37 PID 404 wrote to memory of 1312 404 KKKJEHCGCG.exe 37 PID 404 wrote to memory of 2516 404 KKKJEHCGCG.exe 38 PID 404 wrote to memory of 2516 404 KKKJEHCGCG.exe 38 PID 404 wrote to memory of 2516 404 KKKJEHCGCG.exe 38 PID 404 wrote to memory of 2516 404 KKKJEHCGCG.exe 38 PID 404 wrote to memory of 2516 404 KKKJEHCGCG.exe 38 PID 404 wrote to memory of 2516 404 KKKJEHCGCG.exe 38 PID 404 wrote to memory of 2516 404 KKKJEHCGCG.exe 38 PID 404 wrote to memory of 2516 404 KKKJEHCGCG.exe 38 PID 404 wrote to memory of 2516 404 KKKJEHCGCG.exe 38 PID 404 wrote to memory of 2516 404 KKKJEHCGCG.exe 38 PID 404 wrote to memory of 2516 404 KKKJEHCGCG.exe 38 PID 404 wrote to memory of 2516 404 KKKJEHCGCG.exe 38 PID 404 wrote to memory of 2516 404 KKKJEHCGCG.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\ProgramData\CBGCBGCAFI.exe"C:\ProgramData\CBGCBGCAFI.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
-
C:\ProgramData\KKKJEHCGCG.exe"C:\ProgramData\KKKJEHCGCG.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:1312
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2516
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\CAKKKJEHDBGI" & exit3⤵PID:2304
-
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:2692
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5df8f707fde4a4e68ffee7c48f6a9b7db
SHA16852a7a4c463c3853643439794ed130a41d0c90b
SHA256dc4e84de932df42fc1d78aa17751a6e21e723ae60796cd400e0b01c26d1b0449
SHA5129c99fb4dc2c7727a75a632e28d3d18b6b4736f4484720788f9410a4567bf4aa4ed74fc6448a6a7d7cdff7bb4787e906a0f1c4e05c41ba02473e900f6aee9b7ba
-
Filesize
6KB
MD585a6f11f244dad0677a0834f97c49d49
SHA141f36e1785b3b75d6572384319d83dff0f9b9b59
SHA2568f567864ddeeed2605755edccf7d25c30a3aeebfc86a064c0b58e8ef48397d92
SHA5128155711b15132543a222b19c6802ac12a9fcc04b467ce7d3c8ee3896ec9723bee5ff735bb2e906abf6c27e375049ffe165f29731368e8b5a61efea2ec56091e9
-
Filesize
669KB
MD5550686c0ee48c386dfcb40199bd076ac
SHA1ee5134da4d3efcb466081fb6197be5e12a5b22ab
SHA256edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa
SHA5120b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e
-
Filesize
439KB
MD55ff1fca37c466d6723ec67be93b51442
SHA134cc4e158092083b13d67d6d2bc9e57b798a303b
SHA2565136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA5124802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546
-
Filesize
251KB
MD54e52d739c324db8225bd9ab2695f262f
SHA171c3da43dc5a0d2a1941e874a6d015a071783889
SHA25674ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a
SHA5122d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5208bd86bb6aa80651f355b60e12b247f
SHA12be5bad235cd7fc6596aad38fda9a5de3c70c4a1
SHA2562b9c653c4f2f45084e7a1ce489c0fffc87295e0116fb1fba3350a1ea4c017898
SHA5128b6296d893dfe62489d684e8632167ac821cc29c98e9a5974144416ca057197e60d823524d7a24ed6de4d23d80ca43df216704292d94ecfc65c9d6b1ef2f40df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD559df0a24382eb344347170ae21ab1f6a
SHA115d5d81f2ae877adc8af984ec2fae4b883017e94
SHA256375df0fef2808b4f6b42149ab861ad6b2e9156f9c5c6d20ae3877deec21f6116
SHA5129e50c8a2790f421982f5bfe1ed0acf878a361b43eb2df59d7c3509024b760db8d066f5cf850511bfc35fe71c949f1aaa92c5f77ee4638a172aad18a8a9bdc9b5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\76561199751190313[1].htm
Filesize33KB
MD5d8938fd9d2e2d273f69974e6087425aa
SHA17448a663c09f639bfd9b588309540edca5edbcdc
SHA2566aa4a2d2cfbf78a727c603678ee98d31869ad85a4a069311a33e27f7b586fb17
SHA512f235ef785206f73e56f5d2ae32c6a12bf701b0579ebe25b6c8139712eaae91697efcba37389401bbec933406aa08746b1ff2907f41687a6109158ec318d4d232
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
190KB
MD5fedb687ed23f77925b35623027f799bb
SHA17f27d0290ecc2c81bf2b2d0fa1026f54fd687c81
SHA256325396d5ffca8546730b9a56c2d0ed99238d48b5e1c3c49e7d027505ea13b8d1
SHA5126d1fa39560f4d7ca57905bc57d615acf96b1ef69ca2a4d7c0353278e8d4466298ed87f514463c49d671cb0e3b6a269a78636a10a1e463dba5c83fe067dc5df18
-
Filesize
276KB
MD5a2fb40daa2aae2b589e7338057471282
SHA18b10a7281f347aa862f365b5bca41c87a8be472c
SHA256409f89268972ae1bff240cc395cc31a3b3876b96f4d6e56fcc5fef74001fcf27
SHA51248daa8f783b24451082c4c339e9f3f704037f89632b55ebf3b6d5b13a85f077785a8ff60f5d35eed8e03fc90543ec5df1b3a1e0dcdf60b7de5a0dc704ffac22a
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571