Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2024 13:49
Static task
static1
Behavioral task
behavioral1
Sample
down.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
down.exe
Resource
win10v2004-20241007-en
General
-
Target
down.exe
-
Size
1.3MB
-
MD5
13476835b5465cf91e4dd7e60e110e56
-
SHA1
38af4e6440237a3f0f7eb8378a9f82ea473fc9a4
-
SHA256
e84f3f36aa22f8b7f7399ce57c68014ea23140e88755516db02b5e056d18dad6
-
SHA512
90635bef1cfd86608c757270f45658b9aacf582afa249a58b046f533c00925851dc9e6cbd04cf54b7ae55965cc25dd94eac90a7b78b7a4a6da32ad5bbc74f74b
-
SSDEEP
24576:CMF7WKYDIOMJRvFadXXUfTwrlWB4Zsasxb3+PcRmJDh/:evDIOMJG9kil7bsxZIJDh/
Malware Config
Extracted
vidar
11
744fd163d6d4e0ac37e4032bcbfbb6af
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Signatures
-
Detect Vidar Stealer 15 IoCs
resource yara_rule behavioral2/memory/4912-38-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 behavioral2/memory/4912-39-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 behavioral2/memory/4912-40-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 behavioral2/memory/4912-51-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 behavioral2/memory/4912-52-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 behavioral2/memory/4912-60-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 behavioral2/memory/4912-61-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 behavioral2/memory/4912-69-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 behavioral2/memory/4912-70-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 behavioral2/memory/4912-86-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 behavioral2/memory/4912-87-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 behavioral2/memory/4912-109-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 behavioral2/memory/4912-110-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 behavioral2/memory/4912-120-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 behavioral2/memory/4912-121-0x00000000075C0000-0x0000000007836000-memory.dmp family_vidar_v7 -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 4912 created 3560 4912 Kim.pif 56 PID 4912 created 3560 4912 Kim.pif 56 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation down.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Kim.pif -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SyncWave.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SyncWave.url cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 4912 Kim.pif -
Loads dropped DLL 2 IoCs
pid Process 4912 Kim.pif 4912 Kim.pif -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1212 tasklist.exe 100 tasklist.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\OrchestraOut down.exe File opened for modification C:\Windows\SureRow down.exe File opened for modification C:\Windows\CountedSexo down.exe File opened for modification C:\Windows\FortDesigns down.exe File opened for modification C:\Windows\BiteBoulevard down.exe File opened for modification C:\Windows\PicturesFuck down.exe File opened for modification C:\Windows\VitaminUw down.exe File opened for modification C:\Windows\MotherboardWash down.exe File opened for modification C:\Windows\GoodsReturned down.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kim.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language down.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Kim.pif Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Kim.pif -
Delays execution with timeout.exe 1 IoCs
pid Process 4044 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2928 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1212 tasklist.exe Token: SeDebugPrivilege 100 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4912 Kim.pif 4912 Kim.pif 4912 Kim.pif -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2524 wrote to memory of 1172 2524 down.exe 84 PID 2524 wrote to memory of 1172 2524 down.exe 84 PID 2524 wrote to memory of 1172 2524 down.exe 84 PID 1172 wrote to memory of 1212 1172 cmd.exe 86 PID 1172 wrote to memory of 1212 1172 cmd.exe 86 PID 1172 wrote to memory of 1212 1172 cmd.exe 86 PID 1172 wrote to memory of 2024 1172 cmd.exe 87 PID 1172 wrote to memory of 2024 1172 cmd.exe 87 PID 1172 wrote to memory of 2024 1172 cmd.exe 87 PID 1172 wrote to memory of 100 1172 cmd.exe 89 PID 1172 wrote to memory of 100 1172 cmd.exe 89 PID 1172 wrote to memory of 100 1172 cmd.exe 89 PID 1172 wrote to memory of 2020 1172 cmd.exe 90 PID 1172 wrote to memory of 2020 1172 cmd.exe 90 PID 1172 wrote to memory of 2020 1172 cmd.exe 90 PID 1172 wrote to memory of 4856 1172 cmd.exe 91 PID 1172 wrote to memory of 4856 1172 cmd.exe 91 PID 1172 wrote to memory of 4856 1172 cmd.exe 91 PID 1172 wrote to memory of 732 1172 cmd.exe 92 PID 1172 wrote to memory of 732 1172 cmd.exe 92 PID 1172 wrote to memory of 732 1172 cmd.exe 92 PID 1172 wrote to memory of 1732 1172 cmd.exe 93 PID 1172 wrote to memory of 1732 1172 cmd.exe 93 PID 1172 wrote to memory of 1732 1172 cmd.exe 93 PID 1172 wrote to memory of 4912 1172 cmd.exe 94 PID 1172 wrote to memory of 4912 1172 cmd.exe 94 PID 1172 wrote to memory of 4912 1172 cmd.exe 94 PID 1172 wrote to memory of 2436 1172 cmd.exe 95 PID 1172 wrote to memory of 2436 1172 cmd.exe 95 PID 1172 wrote to memory of 2436 1172 cmd.exe 95 PID 4912 wrote to memory of 4760 4912 Kim.pif 96 PID 4912 wrote to memory of 4760 4912 Kim.pif 96 PID 4912 wrote to memory of 4760 4912 Kim.pif 96 PID 4760 wrote to memory of 2928 4760 cmd.exe 98 PID 4760 wrote to memory of 2928 4760 cmd.exe 98 PID 4760 wrote to memory of 2928 4760 cmd.exe 98 PID 4912 wrote to memory of 2588 4912 Kim.pif 99 PID 4912 wrote to memory of 2588 4912 Kim.pif 99 PID 4912 wrote to memory of 2588 4912 Kim.pif 99 PID 4912 wrote to memory of 1144 4912 Kim.pif 103 PID 4912 wrote to memory of 1144 4912 Kim.pif 103 PID 4912 wrote to memory of 1144 4912 Kim.pif 103 PID 1144 wrote to memory of 4044 1144 cmd.exe 105 PID 1144 wrote to memory of 4044 1144 cmd.exe 105 PID 1144 wrote to memory of 4044 1144 cmd.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\down.exe"C:\Users\Admin\AppData\Local\Temp\down.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Devil Devil.bat & Devil.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"4⤵
- System Location Discovery: System Language Discovery
PID:2024
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:100
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"4⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2852044⤵
- System Location Discovery: System Language Discovery
PID:4856
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "AugQualificationDepthWidth" Course4⤵
- System Location Discovery: System Language Discovery
PID:732
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Hb + ..\Rapid + ..\London + ..\Royal + ..\Charter + ..\Deck + ..\Pichunter + ..\Killing N4⤵
- System Location Discovery: System Language Discovery
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\285204\Kim.pifKim.pif N4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HIDGCFBFBFBK" & exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4044
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:2436
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Practices" /tr "wscript //B 'C:\Users\Admin\AppData\Local\DataWave Sphere Co\SyncWave.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Practices" /tr "wscript //B 'C:\Users\Admin\AppData\Local\DataWave Sphere Co\SyncWave.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SyncWave.url" & echo URL="C:\Users\Admin\AppData\Local\DataWave Sphere Co\SyncWave.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SyncWave.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
570KB
MD52fa0ad6b54cc96a82097293820a6c8f8
SHA1cc691ac7cb82d6ef144c59b6ad0944bd57813c38
SHA25662834a6dad4f88b12d055896e14ed6638acdc2399a35b96a5df66c6f7ed72fef
SHA512c1d6dedfc71aba9d84832f2b4235d5ce2ddb4b79cce6991c1416ba0b6ebf4227010ea71cc9e846a6d3a8d445a1ff1b03af0f8b7143fa767fe73f4b9074c38539
-
Filesize
89KB
MD5ec287f03de31d75d7b65333ad856d57d
SHA165b43b521b8afba6d9d3c325f71ef104ba1212f8
SHA2564781b721205bcc4a912534f0f006acc8f49f220909b45c82e5d70ca718e80b84
SHA5127e560fd33df0f4d8a1c9f954447dd29a8311a9dad6ef3ca3984c102b9a01952028ba146729e080f0de8bf3287f05d510af684000d3f6bfdfe921ee9b6b2629d0
-
Filesize
6KB
MD56da24f141475e1c94d0baa534671730e
SHA1699de571854c9eab964ddde0c12f07818259017e
SHA25671ac8f4534eb924876822260553e2c5fdfee7fc9a50790ffd3842339d8a33e35
SHA51249cd5899f209632ac7ef1fd89b5190afa7cccbd78bf87036de2fa8c384d33e9296e9a66476c14c18f9a4ed4cf14cbba8942ddc5c4af90396a494c581195df95f
-
Filesize
95KB
MD55bdef9e70fa8aac0118e96d47f1e1dbc
SHA10989482c6280bf460219d35a1824d760cd9ed3e0
SHA25675f00c8c8a5841c48d383384ed01d0d9fea056fc8bb6b7e275e3a29edf37fa7b
SHA51283c8fb674878a41fb47ceaa999672910e02e1be6c1c0cdfbd89cb0252a7758b3f7c9620d85e749b57ff7589b5d4d5a8fb4a7f9830add8d4406f65aa4ea0cbd17
-
Filesize
24KB
MD597d7d087cf461ff97c4a4438102c1016
SHA18b06c86ad5643e7f2a7300a0823711e9ba436963
SHA256d97e4faaa2b3f23b147a2a626634794e9e853a3e661472502d6d786edb1c6c7a
SHA51216c2ae7de0fbba2b2b6f0e5073d4bccd998cc972052f85fbfa70f448aa43634d51b50bffcfdd155bfad0111035067385414b7f94722eb3ae0c5939f934e864f0
-
Filesize
69KB
MD5ef5519b0e3d69ac10317974081e12222
SHA149ed090bb19c951090b1633e2fd843c949951f07
SHA2563c4f40140a71ecfde55326f84ca878e5c1a101d457107da13017f5670c6a5bb4
SHA5120cb1cde599e6a93fe2ff68309086fd82c5ccd6cac966504ade451026a8da2f0442ee80fd873fbffdaecf18d8ab729317bdc017dd3744fbd744fa5b892b70951c
-
Filesize
866KB
MD5352d59010c3a1ad07c6cc631429c3898
SHA1d84012a103d428bda710012a40b5acd5aa2e8f05
SHA256f9d2fe0dff05d8485cc1104e64940673055bd2ee3ff90297dad183fb6356eae3
SHA512cfa507f35ab27e942e756c1d60599926706730bf207b5ebeb46702e52ce67428f16a22c4e7565d66992b69b26f76f651dda2bf17b6ef36592aff57e0587e343d
-
Filesize
13KB
MD5a3dbd9ae326c770abcc54b0fdd7a22eb
SHA197d0e17dc71226a7816e1cbb3e070fa8a4872ff6
SHA256f63d2eb292cab30f8e1ab7d9e2ed7b3b19b2be588da4fed455265ea9a6264a11
SHA5125adda01b4500af1f5c09f0a78db320cf7611e6b595d2d9ebc907b5f70dcd4277d11d0056e4ac66fc72f3347088f14650635ba6a7ab8c8438772a52e3966fca71
-
Filesize
75KB
MD5463606075e8bc9b04f96c6f893469f91
SHA14fe270343a5a65b1357a0ff96f1d474cfd97bbea
SHA256af8444e8ee47f86fb80bcca4b65c0e2db813240a6479a44ed7c0d4ad310d43e2
SHA5120a440cc3052460b32ff289a897eb641568811572376d466cbdba786c02c585e25c2699aef7860ffcb460933f62d120255bbdfe6926135a5c5fe56b3a910e550d
-
Filesize
91KB
MD59b7919ea2318bec3ef9666c982b77119
SHA155e2940fc3dc8f377b16ee06c58ee066e7e766f0
SHA25602f813b83cd0126e876f387ac82b51289a9888e7b142fe41a543aaf57e91d225
SHA512e5619ba41d1380d853fcb519dd7acaea1d9946a5f336241a0f396c75c20499a8da72487b6fb0713edf923ba79580425211d0f00e1ff650486d43f16c2e18c2af
-
Filesize
68KB
MD578a2388d3143b203f0d68eda1962fd9c
SHA1743bc34a72ed75189c491f5c14dcfe3ce3f4f434
SHA2563739a2c7bf513612f2d616bb10b0221512fa4cce0222441d7ba96ffdfb553387
SHA512e9dc06b5bdef912d33b129fad85561083ee8e56052929e5fe4dde9ed02d65fa6d2c3218ff045abbe7770a662959af00dff6a56b84f684cc0f00451b77e764255
-
Filesize
70KB
MD5f81ed71b4707976f2074491adb2e4f3c
SHA13bc06f946916884ddc04bf534deb823ac94e34e8
SHA256207eb1026caac4ee644f3b7e1be0d455ac93298b07e329371e1bbd81cc6dc50e
SHA51228eb57f3a5bbb52a865744c999a11345360a2332d1e5a52b70db58b410944f387c4ba3d5a0bcded792909848d7693f898cb66900d0e94c74994bf1a1d71648e2
-
Filesize
1023KB
MD5a0e79c5fd0c77e82df1f6ffdc96e5c93
SHA16dd0894badf7992982f385f11e2896f1a1d6fd85
SHA2568b215bed267f27b72618d7b16aa37c074818b3bdc0050236df6bc8a0fd4f3a42
SHA51270acb14156871ee3f631da18c96911eeb110eae979838f590bb810f7ba014ae6cdb1314ab371247f79025332f8dea09416f10df27210de6fe9065a148137cbf1