Resubmissions
17-01-2025 15:11
250117-sk4kzssrhv 1017-01-2025 15:09
250117-sjgd3asrbs 1017-01-2025 15:07
250117-shlbmasqgv 1017-01-2025 14:27
250117-rsndas1pgx 1016-01-2025 17:37
250116-v7e71s1ncy 1016-01-2025 17:30
250116-v27eba1lew 1016-01-2025 17:29
250116-v232ws1let 316-01-2025 17:29
250116-v21lrs1ldz 316-01-2025 17:27
250116-v1g32a1qfk 1016-01-2025 09:47
250116-lsajjsvrgn 10Analysis
-
max time kernel
60s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 12:40
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
4363463463464363463463463.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
quasar
1.4.1
Office04
104.251.123.245:23600
4119a2e0-4ae4-4843-8534-99af91a2475d
-
encryption_key
DF6316067206E09C1F85138FCEBD56F5D94BF6AE
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Startup
-
subdirectory
SubDir
Extracted
metasploit
windows/shell_reverse_tcp
127.0.0.1:443
Extracted
quasar
1.4.1
RAT 5 (EPIC VERISON)
serveo.net:11453
7a1301f7-dc6f-4847-a8ee-ca627a9efa0f
-
encryption_key
3B793156AD6D884F51309D0E992DAA75D03D2783
-
install_name
Application Frame Host.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft
-
subdirectory
SubDir
Extracted
asyncrat
Default
forums-appliances.gl.at.ply.gg:1962
-
delay
1
-
install
true
-
install_file
windows.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Quasar family
-
Quasar payload 6 IoCs
resource yara_rule behavioral1/files/0x000c00000001958e-114.dat family_quasar behavioral1/memory/2676-128-0x0000000000B10000-0x0000000000E38000-memory.dmp family_quasar behavioral1/files/0x000c000000019604-133.dat family_quasar behavioral1/memory/2280-135-0x0000000000EF0000-0x0000000001214000-memory.dmp family_quasar behavioral1/memory/2468-140-0x00000000013A0000-0x00000000016C8000-memory.dmp family_quasar behavioral1/memory/2416-146-0x00000000000A0000-0x00000000003C4000-memory.dmp family_quasar -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x001a00000001a4b9-467.dat family_asyncrat -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 2676 Money.exe 1952 script.exe 2280 Client-built.exe 2468 Client.exe 2416 Application Frame Host.exe 1872 wmfdist.exe 2976 aidans.dont.run.exe 1596 windows.exe -
Loads dropped DLL 6 IoCs
pid Process 2720 4363463463464363463463463.exe 2720 4363463463464363463463463.exe 2720 4363463463464363463463463.exe 2720 4363463463464363463463463.exe 2720 4363463463464363463463463.exe 2720 4363463463464363463463463.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft = "\"C:\\Users\\Admin\\AppData\\Roaming\\SubDir\\Application Frame Host.exe\"" Application Frame Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft = "\"C:\\Users\\Admin\\AppData\\Roaming\\SubDir\\Application Frame Host.exe\"" Client-built.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 raw.githubusercontent.com 11 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language script.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmfdist.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1812 timeout.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 4363463463464363463463463.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 4363463463464363463463463.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1416 schtasks.exe 2348 schtasks.exe 2300 schtasks.exe 2088 schtasks.exe 1444 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2976 aidans.dont.run.exe 2976 aidans.dont.run.exe 2976 aidans.dont.run.exe 2976 aidans.dont.run.exe 2976 aidans.dont.run.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2720 4363463463464363463463463.exe Token: SeDebugPrivilege 2676 Money.exe Token: SeDebugPrivilege 2280 Client-built.exe Token: SeDebugPrivilege 2468 Client.exe Token: SeDebugPrivilege 2416 Application Frame Host.exe Token: SeDebugPrivilege 2976 aidans.dont.run.exe Token: SeDebugPrivilege 2976 aidans.dont.run.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 Client.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2468 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2468 Client.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2676 2720 4363463463464363463463463.exe 31 PID 2720 wrote to memory of 2676 2720 4363463463464363463463463.exe 31 PID 2720 wrote to memory of 2676 2720 4363463463464363463463463.exe 31 PID 2720 wrote to memory of 2676 2720 4363463463464363463463463.exe 31 PID 2720 wrote to memory of 1952 2720 4363463463464363463463463.exe 32 PID 2720 wrote to memory of 1952 2720 4363463463464363463463463.exe 32 PID 2720 wrote to memory of 1952 2720 4363463463464363463463463.exe 32 PID 2720 wrote to memory of 1952 2720 4363463463464363463463463.exe 32 PID 2720 wrote to memory of 2280 2720 4363463463464363463463463.exe 33 PID 2720 wrote to memory of 2280 2720 4363463463464363463463463.exe 33 PID 2720 wrote to memory of 2280 2720 4363463463464363463463463.exe 33 PID 2720 wrote to memory of 2280 2720 4363463463464363463463463.exe 33 PID 2676 wrote to memory of 1416 2676 Money.exe 34 PID 2676 wrote to memory of 1416 2676 Money.exe 34 PID 2676 wrote to memory of 1416 2676 Money.exe 34 PID 2676 wrote to memory of 2468 2676 Money.exe 36 PID 2676 wrote to memory of 2468 2676 Money.exe 36 PID 2676 wrote to memory of 2468 2676 Money.exe 36 PID 2280 wrote to memory of 2348 2280 Client-built.exe 37 PID 2280 wrote to memory of 2348 2280 Client-built.exe 37 PID 2280 wrote to memory of 2348 2280 Client-built.exe 37 PID 2280 wrote to memory of 2416 2280 Client-built.exe 39 PID 2280 wrote to memory of 2416 2280 Client-built.exe 39 PID 2280 wrote to memory of 2416 2280 Client-built.exe 39 PID 2468 wrote to memory of 2300 2468 Client.exe 40 PID 2468 wrote to memory of 2300 2468 Client.exe 40 PID 2468 wrote to memory of 2300 2468 Client.exe 40 PID 2416 wrote to memory of 2088 2416 Application Frame Host.exe 42 PID 2416 wrote to memory of 2088 2416 Application Frame Host.exe 42 PID 2416 wrote to memory of 2088 2416 Application Frame Host.exe 42 PID 2720 wrote to memory of 1872 2720 4363463463464363463463463.exe 44 PID 2720 wrote to memory of 1872 2720 4363463463464363463463463.exe 44 PID 2720 wrote to memory of 1872 2720 4363463463464363463463463.exe 44 PID 2720 wrote to memory of 1872 2720 4363463463464363463463463.exe 44 PID 2720 wrote to memory of 1872 2720 4363463463464363463463463.exe 44 PID 2720 wrote to memory of 1872 2720 4363463463464363463463463.exe 44 PID 2720 wrote to memory of 1872 2720 4363463463464363463463463.exe 44 PID 2720 wrote to memory of 2976 2720 4363463463464363463463463.exe 45 PID 2720 wrote to memory of 2976 2720 4363463463464363463463463.exe 45 PID 2720 wrote to memory of 2976 2720 4363463463464363463463463.exe 45 PID 2720 wrote to memory of 2976 2720 4363463463464363463463463.exe 45 PID 2976 wrote to memory of 1060 2976 aidans.dont.run.exe 46 PID 2976 wrote to memory of 1060 2976 aidans.dont.run.exe 46 PID 2976 wrote to memory of 1060 2976 aidans.dont.run.exe 46 PID 2976 wrote to memory of 1572 2976 aidans.dont.run.exe 48 PID 2976 wrote to memory of 1572 2976 aidans.dont.run.exe 48 PID 2976 wrote to memory of 1572 2976 aidans.dont.run.exe 48 PID 1060 wrote to memory of 1444 1060 cmd.exe 50 PID 1060 wrote to memory of 1444 1060 cmd.exe 50 PID 1060 wrote to memory of 1444 1060 cmd.exe 50 PID 1572 wrote to memory of 1812 1572 cmd.exe 51 PID 1572 wrote to memory of 1812 1572 cmd.exe 51 PID 1572 wrote to memory of 1812 1572 cmd.exe 51 PID 1572 wrote to memory of 1596 1572 cmd.exe 52 PID 1572 wrote to memory of 1596 1572 cmd.exe 52 PID 1572 wrote to memory of 1596 1572 cmd.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Files\Money.exe"C:\Users\Admin\AppData\Local\Temp\Files\Money.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1416
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\script.exe"C:\Users\Admin\AppData\Local\Temp\Files\script.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Microsoft" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Application Frame Host.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2348
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Application Frame Host.exe"C:\Users\Admin\AppData\Roaming\SubDir\Application Frame Host.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Microsoft" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Application Frame Host.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\wmfdist.exe"C:\Users\Admin\AppData\Local\Temp\Files\wmfdist.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\Files\aidans.dont.run.exe"C:\Users\Admin\AppData\Local\Temp\Files\aidans.dont.run.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows" /tr '"C:\Users\Admin\AppData\Roaming\windows.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows" /tr '"C:\Users\Admin\AppData\Roaming\windows.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:1444
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp168.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:1812
-
-
C:\Users\Admin\AppData\Roaming\windows.exe"C:\Users\Admin\AppData\Roaming\windows.exe"4⤵
- Executes dropped EXE
PID:1596
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb1937f07676d669a7835b233ed5cc3
SHA158ea816d8c4b753748f869c97f784daed609cedb
SHA256bf1a4234dbd4f5e803c0b52d7c7efe2a47668b8977464f8be8358dbbc51f00f9
SHA512c4d3532a69b8773e1672f2f982f243628c73e4711a7e865bc7210ade9f14b81312b64dcb8221d616893492c3302b093c4fc6602affe02d955ac794d53e848a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd52c6be993619fe9f7e8f86635de2d9
SHA13b232c910934c531f49dea2dd3b43bf78fb465d8
SHA256e27a24482e5d83601f08278fafebb615e9b6fd2b79c9c17c8cf095d64ef38e74
SHA512fb63e533ca32ea0799c863d7b3c6079638c8326a7938ebb57081a59e8577676fe843aa9f66d026fa81650665e408f954eee86beb271578d0e1ed38418e2b383e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beacf7bda310dc88afeb510ef9845f50
SHA1fd40d50bbb06ae39d7bfe8b04ff87e4a3a190522
SHA256bc3d40d1d552c48614e0f08ff08e891ec6724858cc2f0f191d9c622dd5caaaee
SHA512531bbe148e26481a4108998be3d1c4e9c5671c8d17c9f92017ca7beec52b7a8dca0196744e6667cdf0ff2eabeb4a54655e721a99226906ed91f88a8e81763b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597799f705e88e7b6d13be252aac5b068
SHA15e28c078df6e88f34f530c3ab0af5467c54332b4
SHA256eb4caf9869e665c683571709865d67f09a37480fde1c58db3cae9d3086ba6b61
SHA512a9595483e70b9ce74497f6d313c28371c1e49d54347abc0090fb2ffea414d86c3dfa1880135f3bb1033a1c91130005a4ad64e546e16291e335926c7d4f03f80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589816338b0aa4bca471e453b34faa5ed
SHA19bf3618b0b56eb706f895220f01169b80f887104
SHA256d22640790928d2fb81aa1061d4a6d912145ef9aa61f9e3a636aaef13f40e20dd
SHA51228b5b445e40e17773c9ce22e89a9e31781863103981e252ef779780c86a9d4c6161b5ada63ca6ba70a1b524951b65f750ec04a3bf8ce1043e8a4ef64e9570138
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
3.1MB
MD5cf049d1ba0fceeb5348f71e15889fbc4
SHA194cc88586240456f777aed403d955027555db8d1
SHA25641bd24fe8b67e9e3cd5bb272a07640de345c39f6cb6c4057491838de95dac6d7
SHA5122e7a7d3415164cb453193fdceef02d46c35f9103521b33bc424c9b79659fac2e4b9deb0fe8754f0842546b51403181032b6c7a05116adfc4f2b8fd599c3ad6ed
-
Filesize
3.1MB
MD5fc6a9a66fb9a404078fe5c31d73c3bab
SHA12cfb6b088ed8ab7ca66299d094813ce2d04e5677
SHA256695bc096a65c4bd026b95d5363a4b9c316cec8fec3672808e036081397da6df8
SHA5125edd45b69ca36e87ae399eb8260eb47411575a7b8296007b948b8a7c4b8200c0bda115cd223029bf39095d64a5e1c0dbd381d4b6947a67560e0a9142e18a642f
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
150B
MD586f5bb46e87ad29063f05a0dff63b4c8
SHA12a3ca698b5090f5cb398d0c326ad013711c8a845
SHA256878b8b1f00f56f36406d951e4a019884c35cb20ae2e8628f1f4659011c9167b1
SHA512836bc87d4c00fee6fb93af64bb65fb6629af2a3189a5ec2ddab3b82fc150bb77e444c6f749b86d36d65b252b2927b5591799830f8dd01a3ed3b044cd3a674b08
-
Filesize
63KB
MD59efaf6b98fdde9df4532d1236b60619f
SHA15d1414d09d54de16b04cd0cd05ccfc0692588fd1
SHA2567c8a5e6cf4e451d61157e113f431a1f3e606fba0e7147ffa9a8f429cb60e47d6
SHA512eabc2c58a7b2d636f13b149199f2dc943c4af3296c5a4605b72293294a449a2ea8da432238748ca2fb69fb944a31ac6fae7e5310cdc57609e5955f62b71e812d
-
Filesize
6KB
MD5308d9beab0eccfd8f218a89456b9b7d4
SHA1b444fa187f2762104248a6ad7d82b1e9e145e366
SHA2563570eab57ac55e89ce4467d665502896790881a21e93a25aabb738fa368e9e02
SHA512b74095e5bc85fd4aef7685a18d4e7c64c322ba66823e8da6cd96f8551abf10f6376ac32728d33f72eb616e25587b442ff5a03866821151d64ac2102cffe68955
-
Filesize
3.9MB
MD56e05e7d536b34f171ed70e4353d553c2
SHA1333750aa2d2121ad3e332ada651add83170b7bf8
SHA256fd0754a2ef3567859db0bf3c75f18ec50aaeae6a7561aff9e7f6c7775a945ed7
SHA512148be9744466f83ae89650fa461132266300cea8b08c793a320416f4a71a19fd3caf2e9258664040fcc44c06c77eb84bd5a7d1c47839d147c8ed5b5bee69610f