Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 17:15
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
General
-
Target
file.exe
-
Size
1.3MB
-
MD5
8f13e73a3c7d22ee7c1730cf8821f7ac
-
SHA1
25858c26c6b10cd55a2f388fcc9325eb8ee75a00
-
SHA256
48ac733e00c61226d506c26f12f6fdec6b67f3dd0a9f3a5dc6720c4096f8c0c8
-
SHA512
6c8e22f964551c80cd812ca58024ed9c3440510cfa5369308c450599feb533fd14a667a872b39b9bfdec3ec69a815ba0998e11c4fbf73edad3d5e938f9388e81
-
SSDEEP
24576:49U8qvoywyFnBcbOag/NDV4poKsYbe8QaqLhc88HbAw5MfPlB4T5N71xwm:4m8qvoypnBcbOag/QoPYbe8Qw8fwGHlk
Malware Config
Extracted
vidar
11
91ac6183dbe67a7c09b11e88fb5493b8
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Signatures
-
Detect Vidar Stealer 7 IoCs
resource yara_rule behavioral1/memory/2972-34-0x00000000036F0000-0x0000000003966000-memory.dmp family_vidar_v7 behavioral1/memory/2972-35-0x00000000036F0000-0x0000000003966000-memory.dmp family_vidar_v7 behavioral1/memory/2972-36-0x00000000036F0000-0x0000000003966000-memory.dmp family_vidar_v7 behavioral1/memory/2972-177-0x00000000036F0000-0x0000000003966000-memory.dmp family_vidar_v7 behavioral1/memory/2972-196-0x00000000036F0000-0x0000000003966000-memory.dmp family_vidar_v7 behavioral1/memory/2972-227-0x00000000036F0000-0x0000000003966000-memory.dmp family_vidar_v7 behavioral1/memory/2972-246-0x00000000036F0000-0x0000000003966000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2972 Caused.pif -
Loads dropped DLL 3 IoCs
pid Process 2788 cmd.exe 2972 Caused.pif 2972 Caused.pif -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2676 tasklist.exe 2856 tasklist.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\LucasDictionary file.exe File opened for modification C:\Windows\TobaccoAud file.exe File opened for modification C:\Windows\UntitledEndorsement file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Caused.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Caused.pif Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Caused.pif -
Delays execution with timeout.exe 1 IoCs
pid Process 2008 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Caused.pif Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Caused.pif Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Caused.pif Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Caused.pif Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Caused.pif -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2676 tasklist.exe Token: SeDebugPrivilege 2856 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2972 Caused.pif 2972 Caused.pif 2972 Caused.pif -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2788 2964 file.exe 30 PID 2964 wrote to memory of 2788 2964 file.exe 30 PID 2964 wrote to memory of 2788 2964 file.exe 30 PID 2964 wrote to memory of 2788 2964 file.exe 30 PID 2788 wrote to memory of 2676 2788 cmd.exe 32 PID 2788 wrote to memory of 2676 2788 cmd.exe 32 PID 2788 wrote to memory of 2676 2788 cmd.exe 32 PID 2788 wrote to memory of 2676 2788 cmd.exe 32 PID 2788 wrote to memory of 2884 2788 cmd.exe 33 PID 2788 wrote to memory of 2884 2788 cmd.exe 33 PID 2788 wrote to memory of 2884 2788 cmd.exe 33 PID 2788 wrote to memory of 2884 2788 cmd.exe 33 PID 2788 wrote to memory of 2856 2788 cmd.exe 35 PID 2788 wrote to memory of 2856 2788 cmd.exe 35 PID 2788 wrote to memory of 2856 2788 cmd.exe 35 PID 2788 wrote to memory of 2856 2788 cmd.exe 35 PID 2788 wrote to memory of 2756 2788 cmd.exe 36 PID 2788 wrote to memory of 2756 2788 cmd.exe 36 PID 2788 wrote to memory of 2756 2788 cmd.exe 36 PID 2788 wrote to memory of 2756 2788 cmd.exe 36 PID 2788 wrote to memory of 2528 2788 cmd.exe 37 PID 2788 wrote to memory of 2528 2788 cmd.exe 37 PID 2788 wrote to memory of 2528 2788 cmd.exe 37 PID 2788 wrote to memory of 2528 2788 cmd.exe 37 PID 2788 wrote to memory of 2596 2788 cmd.exe 38 PID 2788 wrote to memory of 2596 2788 cmd.exe 38 PID 2788 wrote to memory of 2596 2788 cmd.exe 38 PID 2788 wrote to memory of 2596 2788 cmd.exe 38 PID 2788 wrote to memory of 236 2788 cmd.exe 39 PID 2788 wrote to memory of 236 2788 cmd.exe 39 PID 2788 wrote to memory of 236 2788 cmd.exe 39 PID 2788 wrote to memory of 236 2788 cmd.exe 39 PID 2788 wrote to memory of 2972 2788 cmd.exe 40 PID 2788 wrote to memory of 2972 2788 cmd.exe 40 PID 2788 wrote to memory of 2972 2788 cmd.exe 40 PID 2788 wrote to memory of 2972 2788 cmd.exe 40 PID 2788 wrote to memory of 944 2788 cmd.exe 41 PID 2788 wrote to memory of 944 2788 cmd.exe 41 PID 2788 wrote to memory of 944 2788 cmd.exe 41 PID 2788 wrote to memory of 944 2788 cmd.exe 41 PID 2972 wrote to memory of 1104 2972 Caused.pif 43 PID 2972 wrote to memory of 1104 2972 Caused.pif 43 PID 2972 wrote to memory of 1104 2972 Caused.pif 43 PID 2972 wrote to memory of 1104 2972 Caused.pif 43 PID 1104 wrote to memory of 2008 1104 cmd.exe 45 PID 1104 wrote to memory of 2008 1104 cmd.exe 45 PID 1104 wrote to memory of 2008 1104 cmd.exe 45 PID 1104 wrote to memory of 2008 1104 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Older Older.bat & Older.bat2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"3⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"3⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2446443⤵
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "startsvoltruvisible" Vanilla3⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Fx + ..\Sides + ..\Executive + ..\Jc + ..\Door + ..\Pts + ..\Started + ..\Mastercard N3⤵
- System Location Discovery: System Language Discovery
PID:236
-
-
C:\Users\Admin\AppData\Local\Temp\244644\Caused.pifCaused.pif N3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HIDHDAAEHIEH" & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2008
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:944
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
545KB
MD52f9adb1cf6e93e4da3d602c0d48643ef
SHA134f43bb62632452a1de3fd983515f735bcc3c96a
SHA256ccbc6f5ceb4cd4799f7b18d3ddcabcca989518dc1638cdc554527ecb386172ec
SHA5125d8a3ad8df0c67d7a8772c7d5d2e43a303a5ddc10a9a5db9b62422fd2e9a363ee5f1085b6e4d6c58d338036f6395c833a04abe0129619d5dbf72cae2bcb1f40b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
58KB
MD5a83b356cb3091a822ae558503bec0e81
SHA1d22895742f8754ba14e993568e9de6a2d482023d
SHA256e65e3c0954be3035581254959c1ed778179d03cd34e6ad55a0f548b4c3b75aea
SHA512b77696c7bbd1fd7a3b05b2da008040ae997ff16021f39bdd292aad11d7fdcdde86de7c8b6fabf8e72a82a20189b868d638d8f39f91d9b57f197de9836d0e9311
-
Filesize
87KB
MD57196bd557f712406896af3a294854ec7
SHA1a02abc5c3195a66d55d55edfa5e65e96d7ba4dea
SHA256b516639ecf4b1442552857afff153e161d11c58220090496dc55f823695e1651
SHA51244e41c9bedd2e5cdb3f09c0757546dc4a5e71b4aee21f4deba24593ae4d5f490a0b11261f162074f105826b19c86639a35f8700c41acb3bb63d782196e84e26c
-
Filesize
84KB
MD54c11277283eff4e61ebe7c3c0c9b7932
SHA13a322ad2cd458ad75bf41466a4c0c79090b12c9c
SHA2562fd771e75ed3075d6d0c4c58670fe557bcc844e3ef3d8751e0a68306186f6e55
SHA5128ee744f807c03ae6c01394654cb42ab8f023dbd23abf36253e2d6eb5da336da900e4abe74ad5c725567090410a5337074bd67c511b6222eb22f4f54fed8c265c
-
Filesize
865KB
MD560330a0c955c3d7909c6397557dc11f4
SHA11666b670a6c5a6713753f48f03da8b66747bd9f8
SHA256f8cabdf37c7566d3e0c6cf011ba968da0fb779c270241e2719dcf5ff1122dab9
SHA51216debffa5080b95ba5f037565678db6a2eeeb0b5fa7ce84a4fac1e839f559fc7a13e01828db2f5227b8723ec6aa9b5fdf43e2c39f2591e27cad5825aca84fe76
-
Filesize
66KB
MD50aaa7223fca864daa48039c5a7a70b27
SHA18d6ed70ec5eec87231a8121fddb731c105be4d22
SHA25699ef2cb58432d21e2f406c9e4e2a3436a14102ef4a7a45bec4c9fed191e6302c
SHA5129ca7f42911175619dae94c6e492ba1241239cfba41d666b1e9c3bffe30f83275679f6d67ba8e7fcd8bec3ac06b898e4797797a9e65261df78253c22f58f1c9b8
-
Filesize
40KB
MD525f854a3b28adf8e8b37c4d3951797c6
SHA164675978a35669a4ce06e9f273e5fdf5c3a49322
SHA2567aa8cf51ae643db5cf02b08662a7e0afeec273645c887f2f484b11fa91e055bd
SHA51286dc5a8af320733e934fc1ed06db52389d6e1f82f4958201c68e7bc685c51ae3eb55508809c03870a0f6ff40b5ef01ef6d6ad5cbe9c692b91c50c2f98d918484
-
Filesize
20KB
MD5d10dbebda909afbfa6ffc40a44acc62d
SHA1a2becc064d4ddcc82520ab09b8b4583b346f93c9
SHA2561fa255357ad948b071e3a605ee4158c8ae5ea9adc1c4e6c94a8ea875481e96eb
SHA51229200341e3490dba217ea39b6e373960028e82e94bb9a8cb0a9f7e9452abf0544a75110a0822fce1c76a30d82719b3addf64a52adaa32d1d0782a6beb61d2fdf
-
Filesize
56KB
MD51edf95a608f35b125a2a9c29f290be47
SHA15be8f957392bf583b1852fa164d34a47c6f610b7
SHA256718e9e97d32df03fcc4e055418b8023c2e6ccfb3402cc5e63d34baaa4dbaace6
SHA51297fab27b50ee445b9a69e4f9d72ad9bb6664cdb4ecfbff558dce1519df6fe401225d535f9934060b0edf225418f983329b1f0d1fbe11cdabfb0ee9fdcc64e6f8
-
Filesize
76KB
MD593a4a8b90f4c995291f4adb787282970
SHA19122a34f131c168ade197279169f625f7ca59f83
SHA256117d0ccc3325686395f029a4579a5c29e3867a27b9e01139757212d425013106
SHA5124bc7e28a89066b20414d83511deb40c3f734cb7bd07863ae6ce31368bc103812ff84cdfc5ba11b9171d357706d29db0afb8a94089246dc682366395527cd0aed
-
Filesize
78KB
MD5fb83cd37486912dc467f78cf5ae252fb
SHA18928e18f47f0aadd42144fddd0abd0cb1ea63955
SHA256500d2c2b0ef4896710b96299c2ccd7eff7e6b6d14f2e8b01d43ef5b9c5034177
SHA5125ac7c08595777a1ea36797227732b573bb55f8cedb1b21ceb81b17c393f1b16470ed96cb8d7ff5a838fa751ff354c028ccb63538589dfa5167358f1a7d701b2a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
7KB
MD51f6e1d942f7115c326067899f9721c13
SHA1a6b8b6c1cdd21562c0e76ef08aecfc7c927d9cee
SHA25620c4c1a15cbfc9168c797ac279475f88e2041f67a459471fddc3c947b4c7229e
SHA512b9c913a3c5ee8315c4d978cb97e4545cf12d88f93bbe0bd2692c020461356fb2756588c8cf5a5c6b58ef1510d2436626ecd3b5b48ce1a83417705e3f70022abe
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558