Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 15:47
Static task
static1
Behavioral task
behavioral1
Sample
TDMenu_x64.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
TDMenu_x64.exe
Resource
win10v2004-20241007-en
General
-
Target
TDMenu_x64.exe
-
Size
6.4MB
-
MD5
3f9d8993daa6e07221f9a12eaa011ca6
-
SHA1
a33290d94fb3bba06337b7b847d971b1a8fd6110
-
SHA256
109bf7761442498abd03f972c2b315b6ea8727a79ed35e7e75a90e6d1e4b7f79
-
SHA512
ffb917e3a01e72b5cec0c8ff41328bac3840c6be0dcb05a58513a3f77a32c2280fc6881109725ba931b31809fbb0abb83bdacd9ec8022ea8a49d6476ca2177c0
-
SSDEEP
98304:S/STPMYacPcyyc7Ht40MV+9eN+jCxf8/kbqEVgUmSr7CqnfMwd+mJbKc1rm7cNAH:S9xcPj9Hy0MWGxk/kWEu72t+mKlPDT
Malware Config
Extracted
xworm
23.27.201.57:7000
-
Install_directory
%ProgramData%
-
install_file
DirectX End-User Runtime.exe
Extracted
redline
godseye3-01-25
23.27.201.57:62529
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000700000001921d-9.dat family_xworm behavioral1/memory/2120-12-0x0000000000FB0000-0x0000000000FCA000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2120-88-0x0000000000F90000-0x0000000000FAE000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/2120-88-0x0000000000F90000-0x0000000000FAE000-memory.dmp family_sectoprat -
Sectoprat family
-
Xmrig family
-
Xworm family
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/2244-59-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2244-60-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2244-58-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2244-57-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2244-55-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2244-54-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2244-61-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2244-68-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2244-69-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2008 powershell.exe 1076 powershell.exe 1712 powershell.exe 2356 powershell.exe 2168 powershell.exe 2812 powershell.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts GameBar-Update-Service.exe File created C:\Windows\system32\drivers\etc\hosts GameBarUpdateService.exe -
Stops running service(s) 4 TTPs
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk DirectX End-User Runtime.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk DirectX End-User Runtime.exe -
Executes dropped EXE 5 IoCs
pid Process 2488 TDMenu.exe 2120 DirectX End-User Runtime.exe 2480 GameBar-Update-Service.exe 476 Process not Found 1948 GameBarUpdateService.exe -
Loads dropped DLL 4 IoCs
pid Process 2528 TDMenu_x64.exe 2528 TDMenu_x64.exe 2528 TDMenu_x64.exe 476 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\DirectX End-User Runtime = "C:\\ProgramData\\DirectX End-User Runtime.exe" DirectX End-User Runtime.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe GameBarUpdateService.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe GameBar-Update-Service.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1948 set thread context of 1904 1948 GameBarUpdateService.exe 56 PID 1948 set thread context of 2244 1948 GameBarUpdateService.exe 58 -
resource yara_rule behavioral1/memory/2244-51-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2244-49-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2244-50-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2244-59-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2244-60-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2244-58-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2244-57-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2244-55-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2244-54-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2244-53-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2244-52-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2244-61-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2244-68-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2244-69-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2668 sc.exe 2644 sc.exe 1608 sc.exe 796 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 3081f80de56cdb01 powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1980 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2480 GameBar-Update-Service.exe 2812 powershell.exe 2480 GameBar-Update-Service.exe 2480 GameBar-Update-Service.exe 2480 GameBar-Update-Service.exe 2480 GameBar-Update-Service.exe 2480 GameBar-Update-Service.exe 2480 GameBar-Update-Service.exe 1948 GameBarUpdateService.exe 2008 powershell.exe 1948 GameBarUpdateService.exe 1948 GameBarUpdateService.exe 1948 GameBarUpdateService.exe 1076 powershell.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 1712 powershell.exe 2356 powershell.exe 2244 explorer.exe 2168 powershell.exe 2120 DirectX End-User Runtime.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2120 DirectX End-User Runtime.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 2008 powershell.exe Token: SeLockMemoryPrivilege 2244 explorer.exe Token: SeDebugPrivilege 1076 powershell.exe Token: SeDebugPrivilege 1712 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 2168 powershell.exe Token: SeDebugPrivilege 2120 DirectX End-User Runtime.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2120 DirectX End-User Runtime.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2488 2528 TDMenu_x64.exe 31 PID 2528 wrote to memory of 2488 2528 TDMenu_x64.exe 31 PID 2528 wrote to memory of 2488 2528 TDMenu_x64.exe 31 PID 2528 wrote to memory of 2120 2528 TDMenu_x64.exe 33 PID 2528 wrote to memory of 2120 2528 TDMenu_x64.exe 33 PID 2528 wrote to memory of 2120 2528 TDMenu_x64.exe 33 PID 2528 wrote to memory of 2480 2528 TDMenu_x64.exe 34 PID 2528 wrote to memory of 2480 2528 TDMenu_x64.exe 34 PID 2528 wrote to memory of 2480 2528 TDMenu_x64.exe 34 PID 2776 wrote to memory of 2664 2776 cmd.exe 42 PID 2776 wrote to memory of 2664 2776 cmd.exe 42 PID 2776 wrote to memory of 2664 2776 cmd.exe 42 PID 1976 wrote to memory of 2928 1976 cmd.exe 50 PID 1976 wrote to memory of 2928 1976 cmd.exe 50 PID 1976 wrote to memory of 2928 1976 cmd.exe 50 PID 1948 wrote to memory of 1904 1948 GameBarUpdateService.exe 56 PID 1948 wrote to memory of 1904 1948 GameBarUpdateService.exe 56 PID 1948 wrote to memory of 1904 1948 GameBarUpdateService.exe 56 PID 1948 wrote to memory of 1904 1948 GameBarUpdateService.exe 56 PID 1948 wrote to memory of 1904 1948 GameBarUpdateService.exe 56 PID 1948 wrote to memory of 1904 1948 GameBarUpdateService.exe 56 PID 1948 wrote to memory of 1904 1948 GameBarUpdateService.exe 56 PID 1948 wrote to memory of 1904 1948 GameBarUpdateService.exe 56 PID 1948 wrote to memory of 1904 1948 GameBarUpdateService.exe 56 PID 1948 wrote to memory of 2244 1948 GameBarUpdateService.exe 58 PID 1948 wrote to memory of 2244 1948 GameBarUpdateService.exe 58 PID 1948 wrote to memory of 2244 1948 GameBarUpdateService.exe 58 PID 1948 wrote to memory of 2244 1948 GameBarUpdateService.exe 58 PID 1948 wrote to memory of 2244 1948 GameBarUpdateService.exe 58 PID 1232 wrote to memory of 1188 1232 cmd.exe 59 PID 1232 wrote to memory of 1188 1232 cmd.exe 59 PID 1232 wrote to memory of 1188 1232 cmd.exe 59 PID 2120 wrote to memory of 1076 2120 DirectX End-User Runtime.exe 60 PID 2120 wrote to memory of 1076 2120 DirectX End-User Runtime.exe 60 PID 2120 wrote to memory of 1076 2120 DirectX End-User Runtime.exe 60 PID 2120 wrote to memory of 1712 2120 DirectX End-User Runtime.exe 62 PID 2120 wrote to memory of 1712 2120 DirectX End-User Runtime.exe 62 PID 2120 wrote to memory of 1712 2120 DirectX End-User Runtime.exe 62 PID 2120 wrote to memory of 2356 2120 DirectX End-User Runtime.exe 64 PID 2120 wrote to memory of 2356 2120 DirectX End-User Runtime.exe 64 PID 2120 wrote to memory of 2356 2120 DirectX End-User Runtime.exe 64 PID 2120 wrote to memory of 2168 2120 DirectX End-User Runtime.exe 66 PID 2120 wrote to memory of 2168 2120 DirectX End-User Runtime.exe 66 PID 2120 wrote to memory of 2168 2120 DirectX End-User Runtime.exe 66 PID 2120 wrote to memory of 1980 2120 DirectX End-User Runtime.exe 68 PID 2120 wrote to memory of 1980 2120 DirectX End-User Runtime.exe 68 PID 2120 wrote to memory of 1980 2120 DirectX End-User Runtime.exe 68 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\ProgramData\TDMenu.exe"C:\ProgramData\TDMenu.exe"2⤵
- Executes dropped EXE
PID:2488
-
-
C:\ProgramData\DirectX End-User Runtime.exe"C:\ProgramData\DirectX End-User Runtime.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "DirectX End-User Runtime" /tr "C:\ProgramData\DirectX End-User Runtime.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1980
-
-
-
C:\ProgramData\GameBar-Update-Service.exe"C:\ProgramData\GameBar-Update-Service.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵
- Drops file in Windows directory
PID:2664
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "Xbox GameBar Update"3⤵
- Launches sc.exe
PID:2668
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "Xbox GameBar Update" binpath= "C:\ProgramData\XboxGame\GameBarUpdateService.exe" start= "auto"3⤵
- Launches sc.exe
PID:2644
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:796
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "Xbox GameBar Update"3⤵
- Launches sc.exe
PID:1608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\ProgramData\GameBar-Update-Service.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:2928
-
-
-
-
C:\ProgramData\XboxGame\GameBarUpdateService.exeC:\ProgramData\XboxGame\GameBarUpdateService.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:1188
-
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1904
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {DB0102E1-1DF0-44BF-8F75-58B3546951C6} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]1⤵PID:2520
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD518d86f6b69457eb245764f48643697df
SHA181da90762a99e970874a1c9a0ce60c267c02b18c
SHA25675a6a0ee2e9749380b9c26dedea02ce7cb7d7b140e45ed054868be6f80d56b33
SHA5129e1f2851e3c9e2a32f710521259fa637b20daad431573f941e89fb731143a83d147ff849ecc1c7e3c95a88d708f56aa4ace707ce52789ac40c1cd048ecd119c1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0PO5AQGQQQYEW4LANTYV.temp
Filesize7KB
MD565c0cfbb74b5a352e0d5b8ff0d0dfd6b
SHA1496972cc6e247284084f99107e9031148101eee0
SHA25636ed94edf230424626e0d6c965fb61447d7584eab188f2be0fe766fbb3471c17
SHA5127bcc025db0b08e22b05ae4aff3a394f6e9a1d40310ecf8df71b46be144b1a253aff8dc73f8e0757f7024c86f74953e0e677d05b64b063c497bba947180dc9d04
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD519f2457d35473a3a132c0923c7795ac1
SHA1139bcfe7009cb4d58d0131260f3ce865b4b01827
SHA256d1774b45d27cc4f131d949c584a87b147c9f102d682ffc59576091313c3a611c
SHA512ca1a745ad269a4012e6d7696a94b0a6d761b93ad95e5d26ebdfe2c5184365a7d380bca9519b4b9246734325718cc5c2f3fde81b25dd0d38e4863febd3bb0f8ef
-
Filesize
2KB
MD512d66cedb71979f4c004a5d65ad408b8
SHA187fee242855bd27e7019f7f6addebb2664d57d87
SHA256ab7d0a7491f316d8ded0298a820c3606ef2290eb736c45166e052659c5b25094
SHA5129a62e74db84872e1e12198b4cb436db073ed8a68d060a5a0514a0aa33167512f271ce2580fd2a0157973d27be3ca7e56be4793a9546e2a4fe2bf15de939ff1ea
-
Filesize
5.1MB
MD502f3666b4f382f4b9c64ddda3183ab7e
SHA1ef7828f1040da2c09788d56a0205358fcc533065
SHA2562b2653d6ba0add65199560b9315aa06a157d80271b5bcd6a5c7caca7a5e27bb6
SHA5127b70ec1a76c296525310e4f1984b279639ed25e70114d7aa890e76a4c9a6eae14169195247f1613f1c83ace40f62ef29902c54676718a9299b38bd9d85638f75
-
Filesize
1.2MB
MD5443a251e35d62f4ca4aeb3b5350adea9
SHA1edd6c016656e1eb673066cb19f6d0187e4db046f
SHA2568f73d7c48e9bf46f6a31e0a76090ff6b61f5ccc208f9a0f523f7604fcbc7273e
SHA51291b04727b34f73432eac1dadd86d451d794cc72414ea0f864237a782959910a916a9162d9ac7b9bc5575e603480732bd8e7f59015d770a0ab8105476f030bd94