Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2024 06:47
Behavioral task
behavioral1
Sample
48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe
Resource
win7-20240708-en
General
-
Target
48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe
-
Size
3.1MB
-
MD5
5286bdb9041867beb47e916e4f69b1b5
-
SHA1
4d4ecbb6f3f0fc305660caca7a57decd156a5fc9
-
SHA256
48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54
-
SHA512
61932b014263fcddd5e42061fc3ca7a4074b552d9775bd080bd1e3102738fef6d3db654d8c14c6b638d706fed8183b67a9cc47afb239afe028b536dfafadb514
-
SSDEEP
49152:RCwsbCANnKXferL7Vwe/Gg0P+WhjtDsLnsHyjtk2MYC5GDe/Q:cws2ANnKXOaeOgmh6Lnsmtk2aRQ
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
resource yara_rule behavioral2/memory/3112-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3112-23-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3112-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2692-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2692-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/864-40-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/864-42-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/864-45-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral2/files/0x000d000000023b6f-5.dat family_gh0strat behavioral2/memory/3112-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3112-23-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3112-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2692-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2692-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/864-40-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/864-42-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/864-45-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Xred family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\240614937.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 9 IoCs
pid Process 4408 R.exe 3112 N.exe 2692 TXPlatfor.exe 864 TXPlatfor.exe 4068 HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 2952 ._cache_HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 3588 Synaptics.exe 3576 ._cache_Synaptics.exe 4976 Remote Data.exe -
Loads dropped DLL 3 IoCs
pid Process 4408 R.exe 2320 svchost.exe 4976 Remote Data.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe File created C:\Windows\SysWOW64\240614937.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe -
resource yara_rule behavioral2/memory/3112-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3112-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3112-23-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3112-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2692-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2692-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2692-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/864-40-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/864-42-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/864-45-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatfor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Remote Data.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1372 PING.EXE 3056 cmd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1372 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4560 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4988 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 4988 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 2952 ._cache_HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 2952 ._cache_HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 3576 ._cache_Synaptics.exe 3576 ._cache_Synaptics.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 864 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3112 N.exe Token: SeLoadDriverPrivilege 864 TXPlatfor.exe Token: 33 920 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 920 AUDIODG.EXE Token: 33 864 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 864 TXPlatfor.exe Token: 33 864 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 864 TXPlatfor.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4988 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 4988 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 4560 EXCEL.EXE 4560 EXCEL.EXE 4560 EXCEL.EXE 4560 EXCEL.EXE 4560 EXCEL.EXE 4560 EXCEL.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4408 4988 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 82 PID 4988 wrote to memory of 4408 4988 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 82 PID 4988 wrote to memory of 4408 4988 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 82 PID 4988 wrote to memory of 3112 4988 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 85 PID 4988 wrote to memory of 3112 4988 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 85 PID 4988 wrote to memory of 3112 4988 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 85 PID 3112 wrote to memory of 3056 3112 N.exe 87 PID 3112 wrote to memory of 3056 3112 N.exe 87 PID 3112 wrote to memory of 3056 3112 N.exe 87 PID 2692 wrote to memory of 864 2692 TXPlatfor.exe 89 PID 2692 wrote to memory of 864 2692 TXPlatfor.exe 89 PID 2692 wrote to memory of 864 2692 TXPlatfor.exe 89 PID 4988 wrote to memory of 4068 4988 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 88 PID 4988 wrote to memory of 4068 4988 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 88 PID 4988 wrote to memory of 4068 4988 48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 88 PID 3056 wrote to memory of 1372 3056 cmd.exe 91 PID 3056 wrote to memory of 1372 3056 cmd.exe 91 PID 3056 wrote to memory of 1372 3056 cmd.exe 91 PID 4068 wrote to memory of 2952 4068 HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 92 PID 4068 wrote to memory of 2952 4068 HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 92 PID 4068 wrote to memory of 2952 4068 HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 92 PID 4068 wrote to memory of 3588 4068 HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 94 PID 4068 wrote to memory of 3588 4068 HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 94 PID 4068 wrote to memory of 3588 4068 HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe 94 PID 3588 wrote to memory of 3576 3588 Synaptics.exe 96 PID 3588 wrote to memory of 3576 3588 Synaptics.exe 96 PID 3588 wrote to memory of 3576 3588 Synaptics.exe 96 PID 2320 wrote to memory of 4976 2320 svchost.exe 105 PID 2320 wrote to memory of 4976 2320 svchost.exe 105 PID 2320 wrote to memory of 4976 2320 svchost.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe"C:\Users\Admin\AppData\Local\Temp\48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exeC:\Users\Admin\AppData\Local\Temp\HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:3908
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\240614937.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4976
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3ec 0x4e81⤵
- Suspicious use of AdjustPrivilegeToken
PID:920
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4560
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe
Filesize27KB
MD5953e9a0a96753d35e10fb466cf4387a5
SHA1a85cbd2b507b19b6b546c92d505c3df46a464453
SHA25675ace23350072600b50db92bd03fa26a3ee3d53aa50a7a93bee4f2346bf60fd3
SHA5124bb518bc8d75dc8f402d3ae0093e0b39a82e0a1664d066739857eab1369fa93d44985f43baf75e303b915016a6550ebe226dc5c3545516bddaf4ac52dbffe633
-
Filesize
27KB
MD56d1d48a2f817397abf78a9ae6c34ebe5
SHA1420860c98701a527ff504e587cebcfbf88816f4f
SHA256e6b5654b97d9a5f256021d83c1adc778e47b9211e09b297ee55064a143831909
SHA5128b30561c71df0757ab10ea7f923014eefbc8c89db1690a9c738953fdcd14cf29af57b7210d07658ac068ebc4d050674d802bb34e7eab5b860fa31409ba1c400b
-
C:\Users\Admin\AppData\Local\Temp\HD_48262173c477c0f240e198121b73381fdecf29968b1d33f8fea32dae9d09cd54.exe
Filesize780KB
MD581ee1e4e5c7ba69b8aea91fe4f12173c
SHA1bae1f4d7cf67666e9d3e52f6b107ec3e7873d0b2
SHA256d65bc856c5d9ed02b20ad7a7671beef5414e69839dbcfa2f8e7230fcaca439f3
SHA5121d7419205aa40306e2cdf0d0680be30e9d5244278f5a537df895cbafbf3b09a344fcf967460ae2b498c8e5bed15be6fb87b2da99238209482131b6602847d787
-
Filesize
2.3MB
MD50445d52b514f03eec8e7305e86ba08ec
SHA1e2f8da8a0e68e9b409289dba3993ba9823d27ba6
SHA25612fde7642f171352ea88427887f8ea5cbdc75a4e69a281715feb03e1cd978fab
SHA5122e2e0e2e850abde574e7b35c5d7879847fa3d16d3e2c15d5233027172945b486863adfc61d1709d30b372f88709836b58589ca9338e1de56d39cee85a7c568dd
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
899KB
MD5ee891a88e64f067b5acf5bdbf59c87d5
SHA1c4e9a12d68518167740b56509c2dc784a41d90b9
SHA2560a8132346967e0e819ec8565d4c5cd802bd3c3efc789071ac5cb7489138b74fb
SHA5123d92a2edb516e5677f94763bd9a20dde665af00046f8731be788e5bb3cac4060aa7ce74036d330db52684fb844b738465166f5541c783c06f00817461ddeb09c
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641