Analysis
-
max time kernel
15s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31/10/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe
Resource
win10v2004-20241007-en
General
-
Target
12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe
-
Size
219KB
-
MD5
b20a6cc6bb92aac556cb1c3f383628d9
-
SHA1
a37727da979560c8c6fb9cd09f3fc33d78643b84
-
SHA256
12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4
-
SHA512
18a2c0b7b533dd6ced92bc8317e62326ff0d31a725705068c37739ffac69b808d695035aad43384af4ad662e4c994d291a63c842df3983426bd224b42f85c0b2
-
SSDEEP
3072:J2RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCoKOhhWK0Ks:J0KgGwHqwOOELha+sm2D2+UhngNQK4dD
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2848 avg_antivirus_free_setup_x64.exe 1216 Process not Found 2756 instup.exe -
Loads dropped DLL 11 IoCs
pid Process 2320 12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe 2320 12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe 1216 Process not Found 2848 avg_antivirus_free_setup_x64.exe 2848 avg_antivirus_free_setup_x64.exe 2848 avg_antivirus_free_setup_x64.exe 2848 avg_antivirus_free_setup_x64.exe 2848 avg_antivirus_free_setup_x64.exe 2848 avg_antivirus_free_setup_x64.exe 2848 avg_antivirus_free_setup_x64.exe 2756 instup.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast avg_antivirus_free_setup_x64.exe Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus instup.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe File opened for modification \??\PhysicalDrive0 avg_antivirus_free_setup_x64.exe File opened for modification \??\PhysicalDrive0 instup.exe -
Embeds OpenSSL 2 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x0005000000019277-54.dat embeds_openssl behavioral1/files/0x0005000000019277-55.dat embeds_openssl -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe -
Checks processor information in registry 2 TTPs 11 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel instup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 avg_antivirus_free_setup_x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature avg_antivirus_free_setup_x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision avg_antivirus_free_setup_x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel avg_antivirus_free_setup_x64.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz instup.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "21" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "28" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "50" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "85" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "100" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "7" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "42" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "78" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "0" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "14" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "71" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "35" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "57" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "64" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "92" avg_antivirus_free_setup_x64.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2848 avg_antivirus_free_setup_x64.exe 2848 avg_antivirus_free_setup_x64.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 32 2848 avg_antivirus_free_setup_x64.exe Token: SeDebugPrivilege 2848 avg_antivirus_free_setup_x64.exe Token: SeDebugPrivilege 2756 instup.exe Token: 32 2756 instup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2848 2320 12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe 28 PID 2320 wrote to memory of 2848 2320 12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe 28 PID 2320 wrote to memory of 2848 2320 12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe 28 PID 2320 wrote to memory of 2848 2320 12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe 28 PID 2848 wrote to memory of 2756 2848 avg_antivirus_free_setup_x64.exe 29 PID 2848 wrote to memory of 2756 2848 avg_antivirus_free_setup_x64.exe 29 PID 2848 wrote to memory of 2756 2848 avg_antivirus_free_setup_x64.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe"C:\Users\Admin\AppData\Local\Temp\12118d48fffbcd5000dcb74258b9200b166b17d56c03c856dad22604c5071bf4.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\Temp\asw.ce3ac533494ee479\avg_antivirus_free_setup_x64.exe"C:\Windows\Temp\asw.ce3ac533494ee479\avg_antivirus_free_setup_x64.exe" /cookie:mmm_bav_998_999_000_m:dlid_FREEGSR-FAD /ga_clientid:191e45a5-c43f-42e8-8c76-c307faa8f2cf /edat_dir:C:\Windows\Temp\asw.ce3ac533494ee4792⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\Temp\asw.538e4f49c3287e54\instup.exe"C:\Windows\Temp\asw.538e4f49c3287e54\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.538e4f49c3287e54 /edition:15 /prod:ais /stub_context:2a3ee586-433b-4ec0-85da-20a9e3d30845:11167936 /guid:4f979405-3cda-41b5-a286-e88d94c622ae /ga_clientid:191e45a5-c43f-42e8-8c76-c307faa8f2cf /no_delayed_installation /cookie:mmm_bav_998_999_000_m:dlid_FREEGSR-FAD /ga_clientid:191e45a5-c43f-42e8-8c76-c307faa8f2cf /edat_dir:C:\Windows\Temp\asw.ce3ac533494ee4793⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51571048721cbdf34def509409dcd8810
SHA189f4cf816663fc11d92cb0017dc507daea67b69e
SHA25648fdec891e4b6d14c16df234a9475aae2fd519445a2b058945ac838b62bee4bf
SHA512572f2c989257bfa40aa591792f2d5fc142060146faac1fb869957a24ae51888d6e1125b4c301c2b654787ae50c4e3a92769402ff122f6a7a5b9693c125305957
-
Filesize
19.6MB
MD5529a538a990d89e144388c76b62fd1cb
SHA1c821696da1747c62f1e3cfdc05859aa3cbf4a1f1
SHA256c390495f9c6379c5b567aae79a55969a4be421d22cb243758ceac1c475f88815
SHA512fc711b4e8e40b98d69e8d5859ced153ea81fde13da06061dde08b7da7330582b551669ada26814cdc5119b79f99a79b4b2c48ade6a5025866aadda8167e221c9
-
Filesize
3.1MB
MD5c545527e69a46359a4a45f58794a0fe5
SHA1e233e5837bfe5d1429300fb33f12f5b54689781b
SHA2568d86976b5ecd432772d4ac5965ff86bff6da04318f231b3e7ea64818de6211f9
SHA512754c891b4f582948ba5dd776a87edba35f96453a540c20c5dd78f2d816bc83161e0d3f8a0f6052b5d0835f5a0b4eeb6d7a871aa611bd74e61ca25ea7046837e0
-
Filesize
4.9MB
MD58655bbfd6f4c8a661f83cdf12ae79824
SHA1a5f4fd61c737825c82dba83ff62c8fd547d63376
SHA2560a7270cc3ed0eb64126302d383e70193b63b70f3a0c550dfcd9b29e5af4f670a
SHA51270b29fd81c90898fa26e4e5e3495ba0b4ab14c14085fa813789bd411fc11f77e7ea7ec65bf71886e84b885f7a855e24ca7aeb3def0168d5e46f7b6bf2bebacd0
-
Filesize
4.9MB
MD5081ce3c98acdb5c4690ae5ed2b9a07c6
SHA17ba9dc179911e3a92f53811027eaa5eb0bc9da93
SHA25692626d7e9cd761fac93d7b027d47dd87258392b39def4ebd1f6a8169360846a2
SHA51209701a9ec5737d142a8e97493cc9f007b872c9fd9502b0c5b29af964a621c74e9d590113ad070fd2316001daa99780c6c0612317c0aa8c55482345338f2b6e8c
-
Filesize
4.5MB
MD5bbb61ad0f20d3fe17a5227c13f09e82d
SHA101700413fc5470aa0ba29aa1a962d7a719a92a82
SHA25639154701a5a844eacf6aa1ccc70297c66bda6e27450fd1043778cead49da859e
SHA512c614246263664268970562908c63e933ddda0a7f1c2f06b63eab9a06a2d8253356636cac948f709c37e66929d5d8b57663bf5f0d34fcf591ac7461c2af5b63e4
-
Filesize
3.8MB
MD50b830444a6ef848fb85bfbb173bb6076
SHA127964cc1673ddb68ca3da8018f0e13e9a141605e
SHA25663f361195a989491b2c10499d626ab3306edc36fbcb21a9cd832c4c4c059bb8f
SHA51231655204bfb16d1902bb70a603a47f6bf111c0f36962fea01e15193d72cc1fffcead1f1a7884d2929ceb77ac47c640ca8039a93b4648747496d462ffe6a05e65
-
Filesize
831KB
MD5ce4d45d0b684f591d5a83fdbd99bd306
SHA1e89637b905c37033950afadaca2161bd5b09fb5e
SHA256907e054fef8297e3cd31d083299ff0ac495775eaa928e3e10e7000fdf6baaed7
SHA512af0aefc20b9c9c91f63f34fcd70c27e9e304073d51cc9ec45113ab360dd5ba4ad104b5c752e022b8b153f435527b56f6bfbb6022dd4bca98f8d1778e2bfc97d1
-
Filesize
689B
MD5e23c342912d5b9266df3634029fcd2ed
SHA155537aab341a1888f4cc70b0a42ea24ee008d8d5
SHA256a45d56771a1bfd798b8f2406c17c00ebdf6c7c979e7c0f1810c505e71e79bb62
SHA512544d93754809e37608b17fbb98e7f08325fa3a27b5ef527b136cdca9cca0c93b2826e9979f8e0010294d895e16d55590ca3c1ce54d6c035cefb545d08298ec83
-
Filesize
4.3MB
MD53d3d1bd8cd13497a935b90f2e52e4dd8
SHA1b1a4ad2ad252b7ab5a1e328811fb8d96549b18b8
SHA256a76814cbbd093860c8807d2deba2b4e6b3fac0f1d1c911c16c15578fb14d40b2
SHA5126217610be96881068a41eb81a8664fb9548d58467dac0a3e597198a0f987263e96bd923c499b1b397e2178f3f5c681a69388ed7db4185c568d3648fa031d11a3
-
Filesize
767KB
MD5f75d663065c0ccd7e63bf2accdafed7a
SHA1daa2d2415cb3d0f27fb4591889d01583c45e5ffd
SHA2560d25e74cf179f4fa2febb01cb647b6ca0e6fa3c6499ed7eee3f1557775e1b6c8
SHA512783a35d57236ec1b5f4d730cf15f201a26356953eeec848beb5125351f3976908495ab6128117f4dae72986480675f880e9268b7ff72b00a1bdcd78042c2ad90
-
Filesize
18KB
MD5b287ff221fcc9ed0834d24809fe35b97
SHA18bc09ba498c1a33f3226e6e55eb769e7d017cf9c
SHA256292369211d5a83d0a54c28afcb396cc6f9a8626e0ad109c8ddac19742deb5aff
SHA5123da3c73c074b417e4478c8a9e52c9f1debcfe4d5fe58467ca07b6c7a362b5705ad707f7af89af1eead8b699454f77cba364eba3d3759fcaa6c03e971b2b7a056
-
Filesize
19KB
MD5c4e13a43440cdb69c2331c7d0df5b949
SHA1ec36a02b918acc80705fd8787f7929e96648915c
SHA25669ad29646e8e5ef45ccee7d759287c31b2b5c588c0302511be908c8719d47e95
SHA512e7a6145e80394f03089a5191e22d24e0ba59b6ab3475d7317130880213aa8daa0375cc9d42d8ddf5f9369d4a3f2e4e79ae7180c7df28b298ded621ea2bab7753
-
Filesize
3.4MB
MD57d61c85e5afdd35cd59b41787c9b5990
SHA10718d05f76d2748f57631ea8a372ae010718b44f
SHA25642691db9b56695929a5c81f7d909cdb2f8f9d1d7d133dcce088948c5f1f6b724
SHA5128874a02aab2b38809b1d3f6135280334aae8ed6520a70830954e31264ccfcfc9e0dbdee34ab469f414bebc3a716bfceef23e8b7cacd6e58577b5e654fe13f8bc
-
Filesize
5KB
MD5d5b798d8816b252e7d718195dfeb8a8c
SHA1860c5807fd491aeeb12d661d8cf2ecca4ca1639b
SHA25675176962c8691f84eb299a555d4c82796b53a12161f1e6616ec50cf97393b499
SHA51216cd2e8f57c05ba2bae79de39867cc35178a6d99cd035d7d20efd8788076360a408affa9b6caf3ea09daf5c32834b995e47b1ab4ec29fcc1fdfddcf0ba96cce5
-
Filesize
570B
MD56c1d9e1205004626b884438704c0631a
SHA100b5fd840f4fdcab41cc89da9fc1141c7594870b
SHA256067a441767c324abf5e72729e70ae1edff257611232c08e5181ccac83f10ebec
SHA512443c896b88520013cd43093ea6f934e179e7a64ce4d3443ab531798ce73298c5eb5dff22a554fbfd1a141daad9344fa69d170e5f727ec61652b3e297a878316e
-
Filesize
343B
MD53db64dd18a9c8b5f30520cb1e4dd1a97
SHA1d52b3cb5111366c8571d545b5c527a0bb339eaf1
SHA2565a6d11525163362dcf13d6557917c4f4af912d9f3de7d9ace9ffa3ca5c01a76b
SHA51292ff3730244782f51fd5ed03534ec87df5c04ccc8d3add3fbb6d30a82898cd69a03cfb628f6f0d210d9d900a7b3a140e4868749ed8270aa35cde52108f6b6077
-
Filesize
27KB
MD5c7e6e4e24e5ab4f8a02a45faa0b0d488
SHA12f07929c3d89cee87b9215b544a853254e0b0954
SHA256f9cb6948ee78d3250299f811168348e554419d70cc33ac0cfd8c7258678fdb7c
SHA512fb988fffa9b8b2c6aab74b605e0d24642042a614094bb35b3a51f80f0dee6bbae365a8fad71af1f004bf405f7ce6396794f9850125ee3a2a293a5e7d9f056a04
-
Filesize
1KB
MD5a5f4c9bc6ea5c71f763b215ded1298d2
SHA187e4f4be5dd37ddb13d220ccef88ae9091d0b452
SHA256057585349fc3568979e1d5ef62c32b801ac23835c2f224464a7300875b9f28c7
SHA51265f625ed27187c68c8d376626b5df38a96869fc1794a956f4fb87b3753dbfd0c1bec9e824a026c363bd0f5f1fbc55dfd37a26dc23f7af17254cf4e4a771f5244
-
Filesize
16KB
MD565102de34e58a65be304b144659b8647
SHA1062183fa6bfc38f64a9ba59ba3c6d642ff19e553
SHA2565b94dc186cb9a01363a4c4220d4ad9940ba5294a354a5013ffb445e94f4eb09d
SHA512b33431c4f0afc0528080505609c5c6efe6b9ac9a71c30380723fec14bcccc56056baede824b105231793e40e0d5342ce8863d4c4d75611cf7ac1b315c534b766
-
Filesize
38B
MD5aaa8f0ca4acc800e63ec0cc3f9598380
SHA1ba82445e4b1eae5bed00d6e5a78411b05700d88d
SHA2569fa614083ebc934b52510cc41eb3246e1b0d199329ab1fd3aea08a5bce62bcdf
SHA512cffec5401f95e8ddfd9edf6c2ea072114d3be913fd48f874938524046f08dea246823ce042fb9d452692c90c50a215c3dcaa19c02270d93534b6ff2da0d88dc0
-
Filesize
4.0MB
MD5b39614a52de7353db442a5e990d8b007
SHA16b9e95a06905267729e721167f99982033a3fa11
SHA25622a35a503c3060365c5107bb0f6b17113cca77f9c76993904140f616858ea10f
SHA5125ad0217ef70eb3baba368ccb5d05c54a479351be706ac95b268ee7dc1aa24ea00674134dc60c143bcbe5cf21d6759c18e965a6bd89bef7d0cc20f77967f56b7c
-
Filesize
17.4MB
MD5c04c263d879f127650be0f2070fab860
SHA149dc2cdd630ffc283d6b45a46159eb9e6266cd74
SHA2569e4be2e96c581b33e6b85f5129821b22039c22e1fedbcce8c7862e981536b2fa
SHA512ba2f42f29319f61276de968431145f2e248e6fc76684ea68bef7b788bb842bcac15d4985d1a8b7f910fb3a3dd824e689f29c66d530f4cefb1d31bfd32f5f3924
-
Filesize
3.7MB
MD5023c18dc05f673644d0b2cce3cd63b8c
SHA1c87b13de1ba7613d5b24dc1b092c810bdb30b608
SHA25666a1b91e2023773c79bd9c3d9d3828b468fcdbc0f3f568619745628ca5a76004
SHA5128229c569e9b909b3e04ce3eab4b3560539df88de6899ec1fc953f1481c25f48f5323aa9ec42e95acc64d9e5a1f09c6514339a654e54c56061e0485664cfdc017
-
Filesize
907KB
MD543dc9e69f1e9db4059cf49a5e825cfda
SHA1519298f8a681b41d2d70db2670cc7543f1ee6da4
SHA25698efeee831a7984d94cf13800aeb1de68e79bea0bb5d95ff7adcbb43b648ed4d
SHA512d0c07cb1e251f2135fdb21893e6ca70efc019a8b759274c87266fb5a2c48ebc0126aecee0020bd48cfd65ef2f794b81b1e417000c91db18e2ac128c86eac4079
-
Filesize
15KB
MD5e38cc92cd980a55d811316ac62883e14
SHA1fa83737abe11ee825c3da6843cc4d8e3b459729a
SHA256be4d8a5dc335ca8446c0dbba4ee4ef07553a5c242bed560f11aaef4793855e87
SHA5121422c8f94556ff0409a3cd1ff581f6c4ea56b01be36ba5b2c0e72465f4dad38391eb85bae28b079aa2f1204615d32a17b7e73e92ffcc9964f39c79626b7afe16
-
Filesize
4.9MB
MD577989c4b64cbf97027a094d4b20921b7
SHA1fcbaff6a4f82f0aa578d6d8e81dade0655eb2d12
SHA2560558dafdbd26ed375d996cd191741ded214910143e134e1349c5d5ed1c9c1de7
SHA5124aac14acc537ccbb184d08b7596a9f3ab694f99b14e4af44bce5a677a869df37511cdc3a961801d60ed8a7eb2e6d838bf96dbd2992530567942aa922560047c4
-
Filesize
5.1MB
MD519d9556c4838564dcc09404968732a63
SHA1612d8259db0e619c4db6fa6b71c073b6d9384d64
SHA2566240c1c0c887d82bb653e1d9a99dcbdc4612d67de185eb62e568ceae51d1922c
SHA51268000dc3ab4c603ffa841a47f4d4dbda02c2e4ea0e45e9c42b05e32f0a957a428826a5a26a18f2e7ce6c662a8c8b818bf39c42d6f441698d85985358cf7ed5af
-
Filesize
29KB
MD55c3a0ff89b572f0a54bdc16bc480527f
SHA1917800855ab584ffe8433dd54d2b4de116d29b2e
SHA256fdb1dc6d11fbe94ccce0efe751db6f034cd20741131572411cffb75d9b1f4b34
SHA5120264af292eca657858a015c5848bbaa831e6b55fcfe2be98a12411511f3a5f8b8071e51ea1f83a800a30349da4e32357374ed0b984ad6fe00e1aaf29540adaf9
-
Filesize
10.7MB
MD567337e485e2bc58d16b78674194ccf5e
SHA1d9d53590ee45868f5e993e28407d11da18915a49
SHA2562f17ecd381dbb368379d274fc0783a912c6d0e1c1870a741f940d2c71e3f6bef
SHA512bd34d0e4bd321256b7923dffd817923584b99a68bb9b69f30d249f991be2fb0bdc637ca747b2b38c439d8e31dd6ea1b8e1dda742c8df55632c5961b7bdfd306f