Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
Brata Rat.sfx.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Brata Rat.sfx.exe
Resource
win10v2004-20240802-en
General
-
Target
Brata Rat.sfx.exe
-
Size
45.1MB
-
MD5
6373037910f5df47c38e8671d27f2e3c
-
SHA1
287a00b868cd946f6851f829e85af79e567090e1
-
SHA256
06f27d84a8d9425ad4d17077bb862a66e1bce1fabeb1fedca5c7cf9bc18b413e
-
SHA512
018ee4fb840f8baec93552666e101b85bd434c8288eaecf04b9e71aaf542b06bafb07aba102af502376dd7f3aee6cb5e777e7d89b32c7097416e9377eb5c4bf4
-
SSDEEP
786432:xo1bjQXs38U5el5DrZqchSEkxE2k3A2Q3DeyVQNX7RaDU5aW1+GrD0iVqlUSJb5B:21AQ8PrTSEOE2FzZQNXwSge0i0zJb3fX
Malware Config
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 1096 Explorer.exe 2812 Explorer.exe 2988 Runtime Broker.exe 2912 888_RAT_1.0.8_O_Cracked by Artist.exe 2780 Explorer.exe 2224 Explorer.exe 2144 888_RAT_1.0.8_O_Cracked by Artist.exe 1868 Runtime Broker.exe 1200 Explorer.exe 1576 Explorer.exe 1100 Runtime Broker.exe 1804 888_RAT_1.0.8_O_Cracked by Artist.exe -
Loads dropped DLL 16 IoCs
pid Process 2404 Brata Rat.sfx.exe 1096 Explorer.exe 2812 Explorer.exe 2404 Brata Rat.sfx.exe 2372 Process not Found 2912 888_RAT_1.0.8_O_Cracked by Artist.exe 2780 Explorer.exe 2224 Explorer.exe 2912 888_RAT_1.0.8_O_Cracked by Artist.exe 768 Process not Found 2144 888_RAT_1.0.8_O_Cracked by Artist.exe 1200 Explorer.exe 1576 Explorer.exe 2144 888_RAT_1.0.8_O_Cracked by Artist.exe 2908 Process not Found 1804 888_RAT_1.0.8_O_Cracked by Artist.exe -
resource yara_rule behavioral1/files/0x000500000001923a-35.dat upx behavioral1/memory/2812-37-0x000007FEF2280000-0x000007FEF2945000-memory.dmp upx behavioral1/memory/2224-81-0x000007FEEE400000-0x000007FEEEAC5000-memory.dmp upx behavioral1/memory/1576-117-0x000007FEF1A80000-0x000007FEF2145000-memory.dmp upx behavioral1/memory/2588-152-0x000007FEEDD30000-0x000007FEEE3F5000-memory.dmp upx behavioral1/files/0x000500000001a523-161.dat upx behavioral1/files/0x000500000001a54b-162.dat upx behavioral1/files/0x000500000001c775-171.dat upx behavioral1/files/0x000500000001c832-178.dat upx behavioral1/files/0x000500000001c852-182.dat upx behavioral1/files/0x000500000001c845-181.dat upx behavioral1/files/0x000500000001c843-180.dat upx behavioral1/files/0x000500000001c827-177.dat upx behavioral1/files/0x000500000001c821-176.dat upx behavioral1/files/0x000500000001c811-175.dat upx behavioral1/files/0x000500000001c7f3-173.dat upx behavioral1/files/0x000500000001c7e4-172.dat upx behavioral1/files/0x000500000001c75d-170.dat upx behavioral1/files/0x000500000001c75b-169.dat upx behavioral1/files/0x000500000001c745-168.dat upx behavioral1/files/0x000500000001beee-167.dat upx behavioral1/files/0x000500000001adc6-166.dat upx behavioral1/files/0x000500000001ad8e-165.dat upx behavioral1/files/0x000500000001a9f9-164.dat upx behavioral1/files/0x000500000001a93e-163.dat upx behavioral1/memory/2588-192-0x000007FEEDD30000-0x000007FEEE3F5000-memory.dmp upx -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012029-6.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1096 2404 Brata Rat.sfx.exe 30 PID 2404 wrote to memory of 1096 2404 Brata Rat.sfx.exe 30 PID 2404 wrote to memory of 1096 2404 Brata Rat.sfx.exe 30 PID 1096 wrote to memory of 2812 1096 Explorer.exe 31 PID 1096 wrote to memory of 2812 1096 Explorer.exe 31 PID 1096 wrote to memory of 2812 1096 Explorer.exe 31 PID 2404 wrote to memory of 2988 2404 Brata Rat.sfx.exe 32 PID 2404 wrote to memory of 2988 2404 Brata Rat.sfx.exe 32 PID 2404 wrote to memory of 2988 2404 Brata Rat.sfx.exe 32 PID 2404 wrote to memory of 2912 2404 Brata Rat.sfx.exe 34 PID 2404 wrote to memory of 2912 2404 Brata Rat.sfx.exe 34 PID 2404 wrote to memory of 2912 2404 Brata Rat.sfx.exe 34 PID 2912 wrote to memory of 2780 2912 888_RAT_1.0.8_O_Cracked by Artist.exe 36 PID 2912 wrote to memory of 2780 2912 888_RAT_1.0.8_O_Cracked by Artist.exe 36 PID 2912 wrote to memory of 2780 2912 888_RAT_1.0.8_O_Cracked by Artist.exe 36 PID 2780 wrote to memory of 2224 2780 Explorer.exe 37 PID 2780 wrote to memory of 2224 2780 Explorer.exe 37 PID 2780 wrote to memory of 2224 2780 Explorer.exe 37 PID 2912 wrote to memory of 1868 2912 888_RAT_1.0.8_O_Cracked by Artist.exe 38 PID 2912 wrote to memory of 1868 2912 888_RAT_1.0.8_O_Cracked by Artist.exe 38 PID 2912 wrote to memory of 1868 2912 888_RAT_1.0.8_O_Cracked by Artist.exe 38 PID 2912 wrote to memory of 2144 2912 888_RAT_1.0.8_O_Cracked by Artist.exe 39 PID 2912 wrote to memory of 2144 2912 888_RAT_1.0.8_O_Cracked by Artist.exe 39 PID 2912 wrote to memory of 2144 2912 888_RAT_1.0.8_O_Cracked by Artist.exe 39 PID 2144 wrote to memory of 1200 2144 888_RAT_1.0.8_O_Cracked by Artist.exe 41 PID 2144 wrote to memory of 1200 2144 888_RAT_1.0.8_O_Cracked by Artist.exe 41 PID 2144 wrote to memory of 1200 2144 888_RAT_1.0.8_O_Cracked by Artist.exe 41 PID 1200 wrote to memory of 1576 1200 Explorer.exe 42 PID 1200 wrote to memory of 1576 1200 Explorer.exe 42 PID 1200 wrote to memory of 1576 1200 Explorer.exe 42 PID 2144 wrote to memory of 1100 2144 888_RAT_1.0.8_O_Cracked by Artist.exe 43 PID 2144 wrote to memory of 1100 2144 888_RAT_1.0.8_O_Cracked by Artist.exe 43 PID 2144 wrote to memory of 1100 2144 888_RAT_1.0.8_O_Cracked by Artist.exe 43 PID 2144 wrote to memory of 1804 2144 888_RAT_1.0.8_O_Cracked by Artist.exe 45 PID 2144 wrote to memory of 1804 2144 888_RAT_1.0.8_O_Cracked by Artist.exe 45 PID 2144 wrote to memory of 1804 2144 888_RAT_1.0.8_O_Cracked by Artist.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\Brata Rat.sfx.exe"C:\Users\Admin\AppData\Local\Temp\Brata Rat.sfx.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Explorer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Explorer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"2⤵
- Executes dropped EXE
PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\888_RAT_1.0.8_O_Cracked by Artist.exe"C:\Users\Admin\AppData\Local\Temp\888_RAT_1.0.8_O_Cracked by Artist.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Explorer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Explorer.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"3⤵
- Executes dropped EXE
PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\888_RAT_1.0.8_O_Cracked by Artist.exe"C:\Users\Admin\AppData\Local\Temp\888_RAT_1.0.8_O_Cracked by Artist.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Explorer.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Explorer.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"4⤵
- Executes dropped EXE
PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\888_RAT_1.0.8_O_Cracked by Artist.exe"C:\Users\Admin\AppData\Local\Temp\888_RAT_1.0.8_O_Cracked by Artist.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Explorer.exe"5⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Explorer.exe"6⤵PID:2588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"5⤵PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\888_RAT_1.0.8_O_Cracked by Artist.exe"C:\Users\Admin\AppData\Local\Temp\888_RAT_1.0.8_O_Cracked by Artist.exe"5⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Explorer.exe"6⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Explorer.exe"7⤵PID:1932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"6⤵PID:1784
-
-
C:\Users\Admin\AppData\Local\Temp\888_RAT_1.0.8_O_Cracked by Artist.exe"C:\Users\Admin\AppData\Local\Temp\888_RAT_1.0.8_O_Cracked by Artist.exe"6⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Explorer.exe"7⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Explorer.exe"8⤵PID:2396
-
-
-
C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"7⤵PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\888_RAT_1.0.8_O_Cracked by Artist.exe"C:\Users\Admin\AppData\Local\Temp\888_RAT_1.0.8_O_Cracked by Artist.exe"7⤵PID:3024
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.6MB
MD58fb28f601cb49dfe171bd629f34e05e6
SHA14aa3ed1cac2dcfcddd5e14d084853083775f0276
SHA256535878dc2e0b53211ae2d002dc241864e831e4d11c29077d8f4c99478c6f4637
SHA5123a40aa73d5035b5e450e59bb1e17fdc42742f4b84b683bdda6c80067787a0d8849b0aaacbb1d63016d99b05af56535e6b558d24d669c4c8616f8d4855dcca621
-
Filesize
9.1MB
MD5df039bd2c14d9058e12e5ef237212b6c
SHA12b21ce94bf9bdada5b78b028184633b3cd729f85
SHA256399609a59498339a76e74b6e31496e14d2d2ca1d707d9bdc031e91eb8aac2566
SHA5124ac152b5a712abd533f893e48971b4853663c2293543b166a54aa3f41c08820e803479959366c47ba05e3807c686bd27e3261417ff4b52071878c5abc5dc0d31
-
Filesize
22.7MB
MD5fe76221925e9943a207521902ef129a2
SHA1af39e5aacac1b5e1f66b42a30d83079f73e6b2c8
SHA256245b1a488fb2fb0444851443520b5e00ac53b9089f7d5188f454e8c417631f65
SHA512760a1643667926165e0696479565910b65ff3a8638e8aab20a6aa98a8bed2302cd4509699c01fb33029a8205db5c1e0d99d7bc108e769137ea0c8a5c90951d36
-
Filesize
7.7MB
MD5c043607e213d94c20ba751a3497e7906
SHA112f8554600a5aa4db60881d3ffadb99ab4c2730f
SHA2568ab39a05e397f5fc957af8bc692c37c7d6d314b207e2a0c63ba3017515a7a28f
SHA512e4082ad4c03d177041e9ba5c796622de661a2491b87c2305521706776fe6632b505e0285e42360201ee169cea067516f80bb01afec695d266e84c5a4a748120f
-
Filesize
25.3MB
MD54bddc9a10a133fcb52079101716cd163
SHA12b66888721ae3b5993e96b7aa3230fc02c42285b
SHA256e7498b37d49540b7853a1a71d089b3ab55d6871700db29c931912b59c1d718ab
SHA512817a809ab1fcccc19ac4eda1133b3b65ec24d6dd54a2a4d327f99728c6b2357ca231fdac0406bb5bba2b774d57fb68a8ad34d630e98225f9a8576441a2e70059
-
Filesize
1.8MB
MD57f18c29878bde5fbcf3f098554ddd902
SHA14be1fbef1c74a592ff6119821177e9e2fe45202f
SHA2560bee8347af907b01d91109d1480b5f309a4b430e1c8187a4ba08ca0d18861620
SHA512209cffa0eed68e4defb6ee82515f245b9f1bee99b1820eadf1f1bc43c83e459ac1760716138dc7dd027b42476f254487475af1f95fe45ba68c5c1c86389ec7be
-
Filesize
1.7MB
MD5a1fc58bf14a5b32f33eca65c39062982
SHA1bc43d006e6b1ded79014eeed54df2506b024c54b
SHA25614a71a46e03608c35701ebb1ae87f90eda6746d49ba9fb07d9841c88ff9ad167
SHA512de8f6ccbeab088856db0e5a5c191940697d25614a1e28ca42f88119f1d296c7b8d67a8a8ce6980e296106c01431fc6915ce3374b8809de7deaf6668ed29167bc
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
48KB
MD5f8dfa78045620cf8a732e67d1b1eb53d
SHA1ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371
-
Filesize
37KB
MD575166fa56af8704f72207218cf119680
SHA1603ebeb5b2d990f70a71bf8a39413d819a16dba5
SHA256f8a86ac326c8a61215e8004dc5ce5d2a6b2b772142bd8caf77466ac318859077
SHA512c37a5de6e0fd6c3a5c3895bf4227fdc7aeb876067ae4738638f1c1a62393d1dc226a653b291e71531d1aca043cb4079d203c50b9e0f58232f1b3b81c1ce03d5d
-
Filesize
48KB
MD5a4a6016a2e9814b924c8b6170fc9ad11
SHA123a7284eb681e645c724d2c04047f10fb380b446
SHA256521ae17194d78f96499e79f954f214aa9fc7f643b8df112359c465c1ec5f51c0
SHA512c193888843b47861d81a1ead576bc8e0830e91d9fa9fd23c9f2ff66cf56d63647b79aa7dc0efca5d1b4f7aa970c2741f7f98fa72681de90e7d28f7a75bec46a5
-
Filesize
59KB
MD507618b847893948457c898ec0031584d
SHA1f32c384d0d230af275881ea628464977963f743a
SHA256856d252b11441794aadfda4fca43e55eec33768116358e33c9ffec76aab42cae
SHA512675adf685ddb2cf84987534553cf651baf6f0552dab0f4845d38e9a743a0365eee9d0f6db6696b4738fc60b4b38dfd077b0250787a331736b9648dba47d69e78
-
Filesize
107KB
MD58ef99e2d776f05e55741b3f45609828f
SHA1eca19b53ed2c67d68b413951db170d333dcb57f2
SHA2567a09b01c2b642c787c6d8cffff8f0cc2dca56243cfcca95bdb064623a77f18dd
SHA51205087e6c94191a8dc7709da5b9a0b4e34e155b44e44c629601b6f92e0d60d14933d4adb295036610a4fd5c10eb3f4fba663a86a25286f521d8f3173ebe7feca3
-
Filesize
35KB
MD5159186e9311e5e10f4f5da681aca44c2
SHA1f5cc126cfe71b47988fd9c27b5fdcbfcd590085a
SHA256edfbebafcf209eb3efca31f713ad5361604e3572b28ef9cdc990dbf384a28cdc
SHA5128b8221c829aaa336b2f3022b6178d6dc5e3119dc93d3185ac63107e93063d5611eadfd24427933ed0e04898ced66df8c6baea74f9f36a1883cc5285e79b87a2f
-
Filesize
86KB
MD595539b2ba96cb61c36f960a0172ad0a0
SHA1c80dcb0a8d68dc62c78f8c0ad54b838160bd9993
SHA256d4daefa20f4cd3ac9ba8c3f44140bf9e602277a8557230b71cbf2cabb2922fe1
SHA5121130b90881ae8c700090d392fca4f5c78699201b4da338a61f3040ee6a09eedefca595e3a31ccaeaf412ab6e0d22cbfeda256a8a3c336cdea014a48c2002cd60
-
Filesize
27KB
MD591a2e920fde757fd30d4610fdf4ba49d
SHA1a6e3b029917ccd4c6cc9cece0a451c7cc764e230
SHA256f05eb3ce9f483421aabe2dbd50e4791f076be5d6ef5f12207cfae8c1cec6d767
SHA512419f142951f3cd939354840a12e9b2c5e63bb113c35f106f00bfcd34d6fc8b528f5772f6b03d72e7234172567b39bed5c060a5d5c9cbc4ad5c5e0de05feafd08
-
Filesize
33KB
MD587a8356265ffe404bd1c511ca0dd9c37
SHA15c44819a19b4d1fe2c8f9ac1a0586601643d4d96
SHA2562ebdc423752cc46d20ed57f725cb1bf2d2f110bc23cb4db73e45f7ed1c663302
SHA51242f5323406638403588ad0cc820062ea3a655f6a184f8b99fdaa9e5dbf490f608cc12ac04916cdbbb9f2e8b4f8842b30eb6f3247338348efe26c517a75193f99
-
Filesize
26KB
MD516e1189b19ec76c8b08eec82b59e98b2
SHA17c587f121ba298537adb5bd761e0c9d6d030294f
SHA25682b6fbd111fd8b94817c999fbdfb855e59e08794f8e024fee7e303e49fe412e3
SHA512abe89dce3350a1f304c49a4371e5c25ed8d363d018db60fd0e1f4bf418d9f5682ac16b82f318828353efca4de1d64a398a56eb2276239d43be332492623c8ffb
-
Filesize
44KB
MD5f9421dbcc2ca3c68eb1a27d4d03cf0b5
SHA16f2f16eda0b500d8a8007713a03f5c2626a3dc95
SHA2565cdf3a8144d3a302f31b7d828611913d7e159752de9e7717ea8d7b6c668bdb6f
SHA512db6b994edb120c48e31860613d87282e6d5358ad322a8742fd0f26af9040de0108487a8f3f4a30b9365cfa9210c1a4a8e9d5f9e8e45522b7d750c12719df5165
-
Filesize
57KB
MD5079c5f285cd47e1374da42f5597e026e
SHA16e0cb69c2738564c32449801f8178657ac7bb49e
SHA256727e3eebd9af88a8f217192180199580fa3930f7a005caacac4df1a0b38a551d
SHA512d14908b1bf42d38a86019258f92837e5e8e822cd2bc8de85d863327567a2f5ac220ce855384b1b3deeb56adedfbe0ad1d21986e8543e8edbc3e34232f9483173
-
Filesize
66KB
MD50f32ce8b42194785945a81024c1e319a
SHA152443af72772c8c10e0d8fdaaa4ec2b545fabd14
SHA256ff96328907bcf586f43a3608a6fa7fcb4eb84db4e9c0a8ad316b3d15b12d4192
SHA5126ba368d28685ea929f2a2bc9b69944480aae0e72c3c2d65970da4cb56331fbaa9163be2835c939af7baeb630b23d4e490ec5d206993acf68810a74122346c1d0
-
Filesize
28KB
MD512ab241c190bbbf5eed795e6f5e4c857
SHA16e56c9f9fb51f46a61bfa97228402a775488cd15
SHA2566eeef822e9e3293ded88dc29959628205bc3958143cd8ec9075d39d3f69cf7b0
SHA51228326d0c104473a9774341ff1a5b64e90843a11011e01d4a46f16c07521d0e1f68ea87d7364a3f27685e0e1d6adc5130947a4f54a499e59c8e475e58f415f5cb
-
Filesize
1.3MB
MD548ba559bf70c3ef963f86633530667d6
SHA1e3319e3a70590767ad00290230d77158f8f8307e
SHA256f8377aa03b7036e7735e2814452c1759ab7ceec3f8f8a202b697b4132809ce5e
SHA512567a7bef4a7c7ff0890708c0e62d2af748b645c8b9071953873b0dd5aa789c42796860896a6b5e539651de9a2243338e2a5fb47743c30dfcde59b1787c4c1871
-
Filesize
1.6MB
MD5443fd07a22ff1a688a3505d35f3c3dd1
SHA1ab9f501aa1d3d523b45f8170e53981672cd69131
SHA256f9c87ec6401039fd03b7c6732c74d1abfdb7c07c8e9803d00effe4c610baa9ee
SHA5121de390d5d9872c9876662f89c57173391ecd300cabde69c655b2ade7eea56e67376839607cac52572111b88a025797060653dc8bb987c6a165f535b245309844
-
Filesize
29KB
MD50d1c6b92d091cef3142e32ac4e0cc12e
SHA1440dad5af38035cb0984a973e1f266deff2bd7fc
SHA25611ee9c7fb70c3756c0392843245935517171b95cc5ba0d696b2c1742c8d46fb6
SHA5125d514ecab93941e83c008f0e9749f99e330949580884bf4850b11cac08fe1ac4ac50033e8888045fe4a9d8b4d2e3ea667b39be18f77266d00f8d7d6797260233
-
Filesize
222KB
MD5364a71831c9bd0a09eeeceb6980c58c7
SHA19d084ccb83e12ddccd17250a009362d720e6271c
SHA2563b20fb46f41234f8f7bbe342cfebfbbce5708d963cf5c7792d1237a1bc7b2676
SHA5125abe19130f9306fd6fc3644412ef6c8c5b7da970cfaed69657a6cb62d431abfbba64fefcbfa82910d17d744e299e3ba5036bd490223b2bf28689cf2e70633dce
-
Filesize
88KB
MD52370f440798a32f805baa7dd40cf4910
SHA136da66fea719a1982c5eafd19a45e02148688fc0
SHA2560a1b8fe8c161a8b12ce3b888b7e3a2a09ec66caa32a2b691ae34a12589d8e078
SHA5127936712d3890e8776e98f5b428583b69b53eadfa2f933efc888fb4eccfb8bfdceb1a92d6661054c3cfd7d9ffb2c37bd39a5da5547f840294a367ca68f86cb31f
-
Filesize
25KB
MD5c9eaca946a53d0f8966577d320c29b28
SHA137232e5e8e734c7d3f3bd94164d2e4d1fc16a14a
SHA2562d1e5a2e8e08ccf35551ea5684fb8478b0b0179656e915f8a52f0a07b55251d1
SHA512afea16e5166a6333f012b61b95c0340a7ef060d2bfdeafa2f07f635d36b944b6306f255d99ef459bbdb531b75f3d30690650263dd717fc3a89d395fe3fa69379
-
Filesize
644KB
MD5846f9958890690b59a2c9f00579c2ab4
SHA1ca6ee4c9e02ce4e9d72600337143deb85b005d87
SHA2568a202460591448759b314f6ac408f6f500007166221b5807f4b0a439aaf87a7e
SHA512eb6959892eb1051d261009aa9a13a921ee0c56a599612b89ebcb6ada3274cefe9959a1b30e8697aac665297ec4ab8b0908556f24ad86cb50bb52dbc81873bc5e
-
Filesize
296KB
MD578d950dbe932d3e2ccdba0e400819849
SHA15d7947dacbdf39f87f8cccfb724bfcd3c84c6a35
SHA2568166bed9eb396a5a7fa7edfc4b928c5839923edd08da2a33fa46c86968383d6f
SHA512052f4beda3dd89d36d93734cb95768317af86a1c23eb4074e859e18f4f8d44ede42d77977204d93f81b4106989687aaf7010b9e7a79ee8b65b185d541857e234
-
Filesize
33.4MB
MD53faf437db8f49c7ea685dec55221471d
SHA1ea9d83da5d0393f155ba4367415a34f3ce234062
SHA256788d9602ab5a72bc76a7d3c605026c3dd8f990c3d9c7103ac92cdd714c3d92d8
SHA512554ad806f143cd4ff71aa6ecde48759bb93999f1e4ea47e0a8e73b66b43c7512b1f3bbf7dbf46278e891903709a1651a287250e75f338f35d0ea5382fb2e1651
-
Filesize
26.6MB
MD5fb5fd6e9fd0de5aa0093bc78b8e2860e
SHA1d12f6981930f0fe8fed6e1252fea6d70c38e937d
SHA2562aa0cb31e506545527f850657e2be16f7f2ed390738994b4f80a030b561d57e6
SHA5122b998d2a17b2527c9b7ccbbf763264f7f98dc8c22e948f48c76e01501b680f8ba663258e65eed47b4224f81362815e371eb8eb33db4f9955f3bfcbb1b673a179
-
Filesize
7.8MB
MD537b05096ace96dccea30aec4f60defe5
SHA19c5d9aba742c3264db2271e7c2d5f19fef51773f
SHA256f6654539553fb7aea5e49724333518a216c53927ab2c7b2f19cbd0ad07da6204
SHA512441c6874d04022e83fcb5c996bc01fb44e0d1e91ba14f50d37917692828ddc57131a514ae075b269f7708db1ef41ad44b15f626c3446c48f0139a789a43aa888
-
Filesize
7.1MB
MD55e49b372598942a5d3b3ec5f70eaa9f7
SHA1caed812b1c1a95aa476537a9be692230b1fbc13c
SHA2569f02f5f264a0791aa323c85b36bf19c332e9a3cbf900e4aa6a31d9a3825a96eb
SHA5124aeadfb033b8651640f9e33714e0a2ca27266d6c2cad0c42f11f416ca0e7a64ddc399ba668011353c03565af320326ff4baa83d91a6d9d096360fa5f81cf8818
-
Filesize
41.1MB
MD51d40fbb0c57fa001e6d87be3afa42dd1
SHA144d5677586070643e445bb2ee82355d1b76f4e63
SHA256ab0f16280eed4027d0cda37163bdf374c4147550b913264029429f503e2ffa73
SHA512a1dd940539fe45bbe5ee8dc339ed61a0dcce7e0fb8964f564809c4394bda167f1983452b4dcdbef42a57975717eeca0181b82fee0f274dba803058d7c8a0bc12