Overview
overview
10Static
static
3Launcher.dll
windows7-x64
1Launcher.dll
windows10-2004-x64
1Launcher.exe
windows7-x64
10Launcher.exe
windows10-2004-x64
10Launcher.exe.manifest
windows7-x64
3Launcher.exe.manifest
windows10-2004-x64
3data/appIn...er.dll
windows7-x64
1data/appIn...er.dll
windows10-2004-x64
1data/appIn...er.exe
windows7-x64
8data/appIn...er.exe
windows10-2004-x64
8data/appIn...AR.exe
windows7-x64
4data/appIn...AR.exe
windows10-2004-x64
4data/appIn...er.dll
windows7-x64
1data/appIn...er.dll
windows10-2004-x64
1data/appIn...er.exe
windows7-x64
8data/appIn...er.exe
windows10-2004-x64
8Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Launcher.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Launcher.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Launcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Launcher.exe.manifest
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Launcher.exe.manifest
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
data/appInfo/services/Launhcer.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
data/appInfo/services/Launhcer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
data/appInfo/services/Launhcer.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
data/appInfo/services/Launhcer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
data/appInfo/services/WinRAR.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
data/appInfo/services/WinRAR.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
data/appInfo/services/data/Launcher.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
data/appInfo/services/data/Launcher.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
data/appInfo/services/data/Launcher.exe
Resource
win7-20241010-en
General
-
Target
Launcher.exe
-
Size
364KB
-
MD5
93fde4e38a84c83af842f73b176ab8dc
-
SHA1
e8c55cc160a0a94e404f544b22e38511b9d71da8
-
SHA256
fb07af2aead3bdf360f555fc872191e43c2f0acbfc9258435f9a30afe272ba03
-
SHA512
48720aebe2158b8a58fc3431c2e6f68271fbade51303ad9cb5b0493efaec6053ff0c19a898841ef7c57a3c4d042ac8e7157fb3dc79593c1dfcdcf88e1469fdec
-
SSDEEP
6144:MpS9kEFKbITUvR8cy8dzQ7Lcf3Si96sfO+2RZrTql9unNrkYqliwrqH1JWP6f:Mp8KLBzQ7Lcf3SiQs2FTTql9unNrkvT2
Malware Config
Extracted
amadey
5.03
9c0a5d
http://185.208.158.116
http://185.209.162.226
http://zapsnn.com
-
install_dir
cdf9d60151
-
install_file
Gxtuum.exe
-
strings_key
5866d84c2de724a41612b3c391bae33f
-
url_paths
/bVoZEtTa1/index.php
/bVoZEtTa2/index.php
/bVoZEtTa3/index.php
Signatures
-
Amadey family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4016 powershell.exe 1032 powershell.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CrowdstrikeEngine = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\CiscoUpdater0009901.dll,EntryPoint" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CrowdstrikeEngine = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\CiscoUpdater0009901.dll,EntryPoint" reg.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation plugin342 Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Launcher.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Launhcer.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Launcher.exe -
resource yara_rule behavioral4/files/0x0007000000023e1d-91.dat upx behavioral4/memory/728-97-0x0000000000FE0000-0x0000000001967000-memory.dmp upx behavioral4/memory/2500-113-0x0000000000FE0000-0x0000000001967000-memory.dmp upx -
Executes dropped EXE 10 IoCs
pid Process 3392 Launhcer.exe 3580 Launcher.exe 2776 winrar.exe 728 plugin342 532 winrar.exe 2616 2plugin4325 2500 plugin342 1848 plugin342 4068 2plugin4325 2768 plugin342 -
Loads dropped DLL 4 IoCs
pid Process 728 plugin342 2616 2plugin4325 2500 plugin342 4660 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2plugin4325 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plugin342 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2plugin4325 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plugin342 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winrar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winrar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plugin342 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launhcer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plugin342 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD Launcher.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 Launcher.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 Launcher.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1032 powershell.exe 1032 powershell.exe 4016 powershell.exe 4016 powershell.exe 4068 2plugin4325 4068 2plugin4325 4068 2plugin4325 4068 2plugin4325 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1032 powershell.exe Token: SeDebugPrivilege 4016 powershell.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2776 winrar.exe 2776 winrar.exe 532 winrar.exe 532 winrar.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2504 wrote to memory of 3392 2504 Launcher.exe 82 PID 2504 wrote to memory of 3392 2504 Launcher.exe 82 PID 2504 wrote to memory of 3392 2504 Launcher.exe 82 PID 2504 wrote to memory of 3392 2504 Launcher.exe 82 PID 2504 wrote to memory of 3392 2504 Launcher.exe 82 PID 3392 wrote to memory of 1032 3392 Launhcer.exe 83 PID 3392 wrote to memory of 1032 3392 Launhcer.exe 83 PID 3392 wrote to memory of 1032 3392 Launhcer.exe 83 PID 1032 wrote to memory of 3580 1032 powershell.exe 85 PID 1032 wrote to memory of 3580 1032 powershell.exe 85 PID 1032 wrote to memory of 3580 1032 powershell.exe 85 PID 1032 wrote to memory of 3580 1032 powershell.exe 85 PID 1032 wrote to memory of 3580 1032 powershell.exe 85 PID 3580 wrote to memory of 4016 3580 Launcher.exe 86 PID 3580 wrote to memory of 4016 3580 Launcher.exe 86 PID 3580 wrote to memory of 4016 3580 Launcher.exe 86 PID 3580 wrote to memory of 2776 3580 Launcher.exe 88 PID 3580 wrote to memory of 2776 3580 Launcher.exe 88 PID 3580 wrote to memory of 2776 3580 Launcher.exe 88 PID 3580 wrote to memory of 728 3580 Launcher.exe 89 PID 3580 wrote to memory of 728 3580 Launcher.exe 89 PID 3580 wrote to memory of 728 3580 Launcher.exe 89 PID 3580 wrote to memory of 532 3580 Launcher.exe 90 PID 3580 wrote to memory of 532 3580 Launcher.exe 90 PID 3580 wrote to memory of 532 3580 Launcher.exe 90 PID 3580 wrote to memory of 2616 3580 Launcher.exe 94 PID 3580 wrote to memory of 2616 3580 Launcher.exe 94 PID 3580 wrote to memory of 2616 3580 Launcher.exe 94 PID 3580 wrote to memory of 2500 3580 Launcher.exe 95 PID 3580 wrote to memory of 2500 3580 Launcher.exe 95 PID 3580 wrote to memory of 2500 3580 Launcher.exe 95 PID 728 wrote to memory of 1848 728 plugin342 99 PID 728 wrote to memory of 1848 728 plugin342 99 PID 728 wrote to memory of 1848 728 plugin342 99 PID 728 wrote to memory of 1848 728 plugin342 99 PID 728 wrote to memory of 1848 728 plugin342 99 PID 728 wrote to memory of 1044 728 plugin342 100 PID 728 wrote to memory of 1044 728 plugin342 100 PID 728 wrote to memory of 1044 728 plugin342 100 PID 1044 wrote to memory of 2628 1044 cmd.exe 102 PID 1044 wrote to memory of 2628 1044 cmd.exe 102 PID 1044 wrote to memory of 2628 1044 cmd.exe 102 PID 2616 wrote to memory of 4068 2616 2plugin4325 104 PID 2616 wrote to memory of 4068 2616 2plugin4325 104 PID 2616 wrote to memory of 4068 2616 2plugin4325 104 PID 2616 wrote to memory of 4068 2616 2plugin4325 104 PID 2616 wrote to memory of 4068 2616 2plugin4325 104 PID 3580 wrote to memory of 468 3580 Launcher.exe 105 PID 3580 wrote to memory of 468 3580 Launcher.exe 105 PID 3580 wrote to memory of 468 3580 Launcher.exe 105 PID 2500 wrote to memory of 2768 2500 plugin342 107 PID 2500 wrote to memory of 2768 2500 plugin342 107 PID 2500 wrote to memory of 2768 2500 plugin342 107 PID 2500 wrote to memory of 2768 2500 plugin342 107 PID 2500 wrote to memory of 2768 2500 plugin342 107 PID 2500 wrote to memory of 4912 2500 plugin342 108 PID 2500 wrote to memory of 4912 2500 plugin342 108 PID 2500 wrote to memory of 4912 2500 plugin342 108 PID 4912 wrote to memory of 1936 4912 cmd.exe 110 PID 4912 wrote to memory of 1936 4912 cmd.exe 110 PID 4912 wrote to memory of 1936 4912 cmd.exe 110 PID 1848 wrote to memory of 4660 1848 plugin342 112 PID 1848 wrote to memory of 4660 1848 plugin342 112 PID 1848 wrote to memory of 4660 1848 plugin342 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Roaming\services\Launhcer.exe"C:\Users\Admin\AppData\Roaming\services\Launhcer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "$AdminRightsRequired = $true function Get-Win { while ($true) { # if ($AdminRightsRequired) { # try { Start-Process -FilePath '.\data\Launcher.exe' -Verb RunAs -Wait # break } catch { Write-Host 'Error 0xc0000906' } } else { # break } } } Get-Win"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Roaming\services\data\Launcher.exe"C:\Users\Admin\AppData\Roaming\services\data\Launcher.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath $env:ProgramData, $env:AppData, $env:SystemDrive\ "5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Users\Admin\AppData\Roaming\services\winrar.exe"C:\Users\Admin\AppData\Roaming\services\winrar.exe" x -y -pjryj2023 C:\Users\Admin\AppData\Roaming\services\01 C:\Users\Admin\AppData\Roaming\services5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2776
-
-
C:\Users\Admin\AppData\Roaming\services\plugin342C:\Users\Admin\AppData\Roaming\services\plugin3425⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Users\Admin\AppData\Roaming\services\plugin342"C:\Users\Admin\AppData\Roaming\services\plugin342"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\10000030111\f61f12104a.dll, Main7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4660
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "CrowdstrikeEngine" /t REG_SZ /d "rundll32.exe C:\Users\Admin\AppData\Roaming\CiscoUpdater0009901.dll",EntryPoint /f & exit6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "CrowdstrikeEngine" /t REG_SZ /d "rundll32.exe C:\Users\Admin\AppData\Roaming\CiscoUpdater0009901.dll",EntryPoint /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2628
-
-
-
-
C:\Users\Admin\AppData\Roaming\services\winrar.exe"C:\Users\Admin\AppData\Roaming\services\winrar.exe" x -y -pjryj2023 C:\Users\Admin\AppData\Roaming\services\02 C:\Users\Admin\AppData\Roaming\services\data5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:532
-
-
C:\Users\Admin\AppData\Roaming\services\data\2plugin4325C:\Users\Admin\AppData\Roaming\services\data\2plugin43255⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\services\data\2plugin4325"C:\Users\Admin\AppData\Roaming\services\data\2plugin4325"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
-
C:\Users\Admin\AppData\Roaming\services\plugin342C:\Users\Admin\AppData\Roaming\services\plugin3425⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Roaming\services\plugin342"C:\Users\Admin\AppData\Roaming\services\plugin342"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "CrowdstrikeEngine" /t REG_SZ /d "rundll32.exe C:\Users\Admin\AppData\Roaming\CiscoUpdater0009901.dll",EntryPoint /f & exit6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "CrowdstrikeEngine" /t REG_SZ /d "rundll32.exe C:\Users\Admin\AppData\Roaming\CiscoUpdater0009901.dll",EntryPoint /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1936
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /K rd /s /q "C:\Users\Admin\AppData\Roaming\services" & EXIT5⤵
- System Location Discovery: System Language Discovery
PID:468
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.4MB
MD55eaf0609175d5263d5a8ac9b0726f07c
SHA1ae8c1549cb2e52326304986470867050d1831ce8
SHA2561fef98b090448d2c0802e338641225f1d4152b2afb55e79e0b9b879d681369b7
SHA5121495ec27fac6591139d3837f471eed02dfca3baf47c6bc2f4b8b0a12e7fed99bd68c55b5bbd6976a180c39a293780884795946c7d89c4697f654ac4988c470ba
-
Filesize
11.2MB
MD5e33fa209c5cc5d192cfc3a5f8fe1ce05
SHA1b379e280ea40f025c43b824f506078e2a8b4b48e
SHA25669bdc4bd94b7f335225c804b3b3d4ecf05fc08de3e715dbf3e7df98c0364c780
SHA51236561390596040c8029c1b3a01420e286bdef46822d3e7735357604302a5ec9f53fdd51c80e10f7f180ca460f43c318e897125da20cf98ea22ce0fde1c84c518
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
12B
MD5753577647d61ebc426d42fc968598084
SHA1241523c859206527a2490aabe76e26475d2cd6b9
SHA2568c66da9ac4e58e536ab4606c2509efba75f5749d58979600e93c3900ac66f81c
SHA512ee013c2d4afa8e063f352ff5a346758d70de6f3023b9bc00951da8326b1182bd6281b308c1b2854d983bdeff70cc85ec364f258c1f7c2249ca164a84a9d60855
-
Filesize
5.6MB
MD55377db404fce684c13e14f5e22e2ffcb
SHA1f23129fba59eec620cef0b5277dcce066f515ca5
SHA2568abec78570a9d71983a87f8f82e50d9e6a2ccd56e39d144b8eda2ffe09a58e6e
SHA512059dac872c1c8d65842b91359a7b840e85e14061f32aacdba0de3e968945bf5d8a36e7184c7c28f10f5fc5ee9a650ab49e61b9554a211123174401294190e04d
-
Filesize
6.0MB
MD54317da7f0bb34899a708cbe2dcedaa54
SHA1bef4efd6f1576fc08b63faefe3fb8a60ff127aeb
SHA25672651def1eee171810540cc5b44118692849e22f60e46f1eee67e06063af5aff
SHA5122fefb66930e7efdae48cc5b2a3eca53ebac0ef49225fa7265056537624e34aa38e09d01168aa67a92cdbc50f081b35e9240c56169759d13bb545825196a43bd7
-
Filesize
7.1MB
MD57a04dcd7388b330f4745f8de2bf9605f
SHA1ec746c2dc9b9f1c7667585a1fdc5769389d07b8b
SHA2566683f3e6c27fd2c204f5c5d9c9e202a50b226258a00ec0f4ed75b046be1c6110
SHA512104609c6b0a3ae8d12369d3c684d698bb009b3e849081be8d3c137d85993ae686e671abf1fa607cdc0b51fe21362fcf71cc1982eac8de31297561811eb19b37b
-
Filesize
2KB
MD5ab117f05d16af429ceeb2410593d54df
SHA1a962e8bc68293d8759be561eec09de5170148766
SHA2564daf580ce0f912b8a4f5e56e4721880792a8a4dca68495b5f2aafaf5e6ebad6d
SHA51207ac23a0906f544bd298e1931e4c6237082b8c46be987e62b69c3dc2899fbec2a9fb5eefd1a81eee665f65e42d3fe4c4400501edd66518e79d488e4b52d31ee3
-
Filesize
364KB
MD5e5c00b0bc45281666afd14eef04252b2
SHA13b6eecf8250e88169976a5f866d15c60ee66b758
SHA256542e2ebbded3ef0c43551fb56ce44d4dbb36a507c2a801c0815c79d9f5e0f903
SHA5122bacd4e1c584565dfd5e06e492b0122860bfc3b0cc1543e6baded490535309834e0d5bb760f65dbfb19a9bb0beddb27a216c605bbed828810a480c8cd1fba387
-
Filesize
1KB
MD5f0fc065f7fd974b42093594a58a4baef
SHA1dbf28dd15d4aa338014c9e508a880e893c548d00
SHA256d6e1c130f3c31258b4f6ff2e5d67bb838b65281af397a11d7eb35a7313993693
SHA5128bd26de4f9b8e7b6fe9c42f44b548121d033f27272f1da4c340f81aa5642adc17bb9b092ece12bb8515460b9c432bf3b3b7b70f87d4beb6c491d3d0dfb5b71fe
-
Filesize
3.2MB
MD5fd2f2543267e88ee102de87a6385a1b0
SHA11d23637a34ac33c1f842749877acebd18c70f00b
SHA2563e76a6a04eb32e640a4f2873faf2028703307bb8a2620b94d71c2536b0b6c5fe
SHA512acc5f64688a34482fed7e7d133c435c94df37b0097ebb15c5d1a5631f8101e23cc092a9282f4ff84155c7972009b0b77c23eee38386f56de1e404e1d0e2cddc8
-
Filesize
4KB
MD5782da0b6fb776ba2bba525f767b6e078
SHA1548bb11b03a16d6f27daa99f7ff5ef45862f98fb
SHA2560742c6aab43f9be96d9e03fbee99d5f3bf6cdfddccde3726b61db3f0893d6d8a
SHA512466d26a2203035040b3e8f3e7b9406e4392537d5ee323c44f1f74339dbb39258216ee736002186c361358ceeb0503ed0461e41c15eb5b251d38bb24768958237
-
Filesize
364KB
MD593fde4e38a84c83af842f73b176ab8dc
SHA1e8c55cc160a0a94e404f544b22e38511b9d71da8
SHA256fb07af2aead3bdf360f555fc872191e43c2f0acbfc9258435f9a30afe272ba03
SHA51248720aebe2158b8a58fc3431c2e6f68271fbade51303ad9cb5b0493efaec6053ff0c19a898841ef7c57a3c4d042ac8e7157fb3dc79593c1dfcdcf88e1469fdec
-
Filesize
1KB
MD51b6de83d3f1ccabf195a98a2972c366a
SHA109f03658306c4078b75fa648d763df9cddd62f23
SHA256e20486518d09caf6778ed0d60aab51bb3c8b1a498fd4ede3c238ee1823676724
SHA512e171a7f2431cfe0d3dfbd73e6ea0fc9bd3e5efefc1fbdeff517f74b9d78679913c4a60c57dde75e4a605c288bc2b87b9bb54b0532e67758dfb4a2ac8aea440ce
-
Filesize
5.7MB
MD5ce00e40cbce6d3267e210f12e4e87a43
SHA1388d00a34f419646a10de6aa028943892a0461dd
SHA256e2cf5cfcb918abd8a8b65b8e1d6090d975560b81a91dfaac3f8e4d4149caeb06
SHA512874049bcd9af9111111f972018fec5598d1e40bf41d9e4ff491c7b5bd730a25775438038a470655852d1eccf0ec9a1389c46f8c8243aa39edf0947244fdf005e
-
Filesize
2.7MB
MD5a0fab21c52fb92a79bc492d2eb91d1d6
SHA103d14da347c554669916d60e24bee1b540c2822e
SHA256e10f9d22cdbc39874ce875fd8031c3db26f58daf20ee8ae6a82de9ed2dfc7863
SHA512e37d3d09eef103bfe043c74921296c0b8195a3e43a3801340a9953f44f512e81acbc2051f0305a3a3f41bb98cd4587bb65c3b3a96d702b048199d24a120b446e
-
Filesize
2.1MB
MD5f59f4f7bea12dd7c8d44f0a717c21c8e
SHA117629ccb3bd555b72a4432876145707613100b3e
SHA256f150b01c1cbc540c880dc00d812bcca1a8abe1166233227d621408f3e75b57d4
SHA51244811f9a5f2917ccd56a7f894157fa305b749ca04903eeaeca493864742e459e0ce640c01c804c266283ce8c3e147c8e6b6cfd6c5cb717e2a374e92c32a63b2c