Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-02-2025 16:25
Static task
static1
Behavioral task
behavioral1
Sample
UniversitiesGe.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
UniversitiesGe.exe
Resource
win10ltsc2021-20250207-en
General
-
Target
UniversitiesGe.exe
-
Size
828KB
-
MD5
d05c6019e8f4f2d004ae9055e1c8079d
-
SHA1
13b411440b37d1134c09018fcc55b215d3743314
-
SHA256
e5dd75c651de425c6ff14196ae0b026bd38a09bc9b535315a8d03e4c3c1c0a40
-
SHA512
c33f0595b910e9664768003b76ea897a95ead7b063d5e58035587801798dfb4caa55351a0dca811c88450c6899602fcb1bd44fcb033f11d39652e65ea42e1d92
-
SSDEEP
24576:KG0h0scaIrCcBGUGMx2R9THpPlP0tIkYqio:MhJcZhBpGMx+lPlsJdd
Malware Config
Extracted
vidar
https://t.me/sc1phell
https://steamcommunity.com/profiles/76561199819539662
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/2264-390-0x0000000003EC0000-0x0000000003EE2000-memory.dmp family_vidar_v7 behavioral1/memory/2264-391-0x0000000003EC0000-0x0000000003EE2000-memory.dmp family_vidar_v7 behavioral1/memory/2264-392-0x0000000003EC0000-0x0000000003EE2000-memory.dmp family_vidar_v7 -
Vidar family
-
Executes dropped EXE 1 IoCs
pid Process 2264 Bat.com -
Loads dropped DLL 1 IoCs
pid Process 1668 cmd.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2416 tasklist.exe 2280 tasklist.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\FavoriteElderly UniversitiesGe.exe File opened for modification C:\Windows\CollinsRenaissance UniversitiesGe.exe File opened for modification C:\Windows\WebsiteCoordination UniversitiesGe.exe File opened for modification C:\Windows\AccompaniedMassive UniversitiesGe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UniversitiesGe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bat.com -
Modifies system certificate store 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Bat.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Bat.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Bat.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25040000000100000010000000d474de575c39b2d39c8583c5c065498a2000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Bat.com -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2264 Bat.com 2264 Bat.com 2264 Bat.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2416 tasklist.exe Token: SeDebugPrivilege 2280 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2264 Bat.com 2264 Bat.com 2264 Bat.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2264 Bat.com 2264 Bat.com 2264 Bat.com -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2608 wrote to memory of 1668 2608 UniversitiesGe.exe 29 PID 2608 wrote to memory of 1668 2608 UniversitiesGe.exe 29 PID 2608 wrote to memory of 1668 2608 UniversitiesGe.exe 29 PID 2608 wrote to memory of 1668 2608 UniversitiesGe.exe 29 PID 1668 wrote to memory of 2416 1668 cmd.exe 31 PID 1668 wrote to memory of 2416 1668 cmd.exe 31 PID 1668 wrote to memory of 2416 1668 cmd.exe 31 PID 1668 wrote to memory of 2416 1668 cmd.exe 31 PID 1668 wrote to memory of 2424 1668 cmd.exe 32 PID 1668 wrote to memory of 2424 1668 cmd.exe 32 PID 1668 wrote to memory of 2424 1668 cmd.exe 32 PID 1668 wrote to memory of 2424 1668 cmd.exe 32 PID 1668 wrote to memory of 2280 1668 cmd.exe 34 PID 1668 wrote to memory of 2280 1668 cmd.exe 34 PID 1668 wrote to memory of 2280 1668 cmd.exe 34 PID 1668 wrote to memory of 2280 1668 cmd.exe 34 PID 1668 wrote to memory of 1412 1668 cmd.exe 35 PID 1668 wrote to memory of 1412 1668 cmd.exe 35 PID 1668 wrote to memory of 1412 1668 cmd.exe 35 PID 1668 wrote to memory of 1412 1668 cmd.exe 35 PID 1668 wrote to memory of 884 1668 cmd.exe 36 PID 1668 wrote to memory of 884 1668 cmd.exe 36 PID 1668 wrote to memory of 884 1668 cmd.exe 36 PID 1668 wrote to memory of 884 1668 cmd.exe 36 PID 1668 wrote to memory of 1104 1668 cmd.exe 37 PID 1668 wrote to memory of 1104 1668 cmd.exe 37 PID 1668 wrote to memory of 1104 1668 cmd.exe 37 PID 1668 wrote to memory of 1104 1668 cmd.exe 37 PID 1668 wrote to memory of 1332 1668 cmd.exe 38 PID 1668 wrote to memory of 1332 1668 cmd.exe 38 PID 1668 wrote to memory of 1332 1668 cmd.exe 38 PID 1668 wrote to memory of 1332 1668 cmd.exe 38 PID 1668 wrote to memory of 2428 1668 cmd.exe 39 PID 1668 wrote to memory of 2428 1668 cmd.exe 39 PID 1668 wrote to memory of 2428 1668 cmd.exe 39 PID 1668 wrote to memory of 2428 1668 cmd.exe 39 PID 1668 wrote to memory of 2240 1668 cmd.exe 40 PID 1668 wrote to memory of 2240 1668 cmd.exe 40 PID 1668 wrote to memory of 2240 1668 cmd.exe 40 PID 1668 wrote to memory of 2240 1668 cmd.exe 40 PID 1668 wrote to memory of 2264 1668 cmd.exe 41 PID 1668 wrote to memory of 2264 1668 cmd.exe 41 PID 1668 wrote to memory of 2264 1668 cmd.exe 41 PID 1668 wrote to memory of 2264 1668 cmd.exe 41 PID 1668 wrote to memory of 2860 1668 cmd.exe 42 PID 1668 wrote to memory of 2860 1668 cmd.exe 42 PID 1668 wrote to memory of 2860 1668 cmd.exe 42 PID 1668 wrote to memory of 2860 1668 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\UniversitiesGe.exe"C:\Users\Admin\AppData\Local\Temp\UniversitiesGe.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Ment Ment.cmd & Ment.cmd2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:2424
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:1412
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5976583⤵
- System Location Discovery: System Language Discovery
PID:884
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Fifth3⤵
- System Location Discovery: System Language Discovery
PID:1104
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Pastor" Cincinnati3⤵
- System Location Discovery: System Language Discovery
PID:1332
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 597658\Bat.com + Times + Much + Button + Honey + Concerns + Fly + Every + Seminar + Qualified 597658\Bat.com3⤵
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Athens + ..\Chair + ..\Celebration + ..\Casey C3⤵
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\597658\Bat.comBat.com C3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2264
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e3815ae5c82cd5a04b1c1f0cdd855858
SHA195a3bd1a46c9517bac9597ea44b949f59c4ad97d
SHA25685f8382cc62bcc298de806eebeea81a91b5b8af5e67e380b85d79d0612fbb605
SHA512313b1fa276dcdf5b97688bd07d007c0ef5171492e26461c2a686997d6ead960441441873a81582f36ff3639040d166b34447a5c390d783f4cd8788c2d347d0ac
-
Filesize
242KB
MD5e5081be3c43b71f2c324509e3905c919
SHA1a9a9e3455de38e23901bd19c35084cb487d56c3e
SHA256dfc4959b1ffd2f633ca1b0d2c9a5a8850e8e7bf5d59a8dc848050362b11f2dca
SHA51247bfb4b5a345a9f557c11e8220b8fe6d3de41bbe6c5917de1a1c6f4269e851cd60ee2bce3f69aa9eab70bfc37d319df61a3baff17303ab224bacdbffa416983b
-
Filesize
57KB
MD5fa1fd78212a58de0533495c6778e6d3e
SHA195e58c0bc9103618236a241d58ada1d15f449b29
SHA2569534b5fb95c518194ac8b218cb9080ec6cdd6877481ba1fcf82a84b9007b1df3
SHA512ab61ab59f0ea136206bf2546027ae68c0af7db2ba98d185a3dd26445b50a6c54f36fe03002588370bae15680d37106b810cd0b5f2cf20b944ae07e715b219e13
-
Filesize
70KB
MD5ae86c29f25c53974e66f90a49be69796
SHA1490a417f8024ddca87caaaddb8366deff1ab8c4e
SHA2566f88f53220c40ee9f2fdb549e9ba7e0998e3279934448776119767948f5f9ffd
SHA512a35280428c19f72051b2323672c7d79544dbf14fade70a3c5e874cf6d37be5677b036353c1c1881f9997359bdc461567a76c41cd7e4c087df2379116ba1fa063
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
34KB
MD5118ffa8e5a9eabed5d95aa012f7a6db5
SHA14be84544f8df04e944f6741c8c207f50b35360a6
SHA2562d8ba5fede231abe3f58f9a2be7b1729d47d934f3d5616f81d7c07cad4a6b9df
SHA512fd6a04bd6b3ec3c9becfa4d12e6d8820bb17b15330b8650a809ddd035cdc3c49c2d4c9c6aab5cee5c5bb6b8cfea30c8f503e76e6d7f16b81ef95f40fc8a8b8ad
-
Filesize
83KB
MD511d8e2219353b27b7793128a5ff79e36
SHA11ce87f177fa10341a8c312a95e5d81abcfb06875
SHA2566dad534d0d6179104b64ce3e26f28a4c5edc9e9b030fe634a8f06107b8f77f50
SHA512d63bdbf650b24c81330aed48504e841708c10fa94ab8f54105a077d6a77ab1357cb7e0907ddf93705c6f21fd74c423bc3b44b2797a3bfd7a3587a715e1cc08f0
-
Filesize
68KB
MD547d8a54fa650d6fd74eba187eebeab85
SHA1a7828bdf2c81e0083b80d8a9262459667ee22e67
SHA256522c47e2993416aee57a788aa3655e54ad2ec49223d5205285e7ccbdc24694ec
SHA512a88d15a76e55b2cb479d9b1637c2d34d96d24966c482dfb64766916da7d211f6a579f4799b4e19c59abe27a84ec2d73ea65114ee62cf1207afee77f7f6b53fdf
-
Filesize
1KB
MD5df863dfe1528490598409b41f940b9df
SHA1d0cd2316f752bfaa222e70066c3d00fed07d3eb1
SHA256ae799aa0b5eec813beea8423ace784172aa91b0e6c3ada1769338e0a3f617d75
SHA5125dee2b641eea04e76c3f97beaf47a00f051d3cabe47382b74bf1b98ee84a1518937b578000aa6fe4bc9dcf8322fa222c6629e778da1a4c8a483a0adf6a5404f3
-
Filesize
94KB
MD5004180fdb3d0fcadce55390ee219c97d
SHA1e579fa8418655603b1ebcf9ded9dac398fc00bbd
SHA2566e87f83a658ec477296fdd0e52309f5f8d82279f3336b42dec486239480321ae
SHA512820ba44c6ff8a3d269431f64d23fc892bf4499f957d4b377296269236106f8a3c01f0fc3c02f1f4b0a14e2e9372d130ea4d9d16e97b0ff6401da9cf528f38992
-
Filesize
132KB
MD5c8846f057078acc3cd27c0eb132c515d
SHA163496ec40103039868130096509dd8aa3492f224
SHA25696f2352ffb731bbac2fa080086fdb11d2f7b01a10f8c3634d32d0498ae9b71ff
SHA512fb262c02ce772c93f742eabb528dfd86c0ece0c0e2425b68846a62b1262ae6cb452bcae42e4aacc7767a71ea193cfde5da10069776eb12f285c9a0b6daaf0357
-
Filesize
476KB
MD5642e781e97ebbe41489a2e209a112d79
SHA18c5f2e5948c0b422a52b844d5a5184a9264c1bb6
SHA256ac589821b3508b48f460935f8a2b8fae481ca3228c98a187546337d192ad837b
SHA5128107d8e7adadcb6ccecbbff19080aeaf02245cfd2a503fc7934fae309c75835f698a5203f2a4e29a2d01cf25e27c050ddaa06c9058c27d7b1fdfbb4b8c51d510
-
Filesize
102KB
MD539dd73a39987b1e07f215ff3bd9dac79
SHA1b0f6a3adec49fee690ffeffee5c41c5318e44ad8
SHA2562c06fed7c4c902ca5c036e1974ceb187efeb47fc663bdf6cec33674cd5ef2368
SHA5124dbcec767011a2f73d6660f887c9838218e4b7df8eabdd8e6018793528524ae1bd7da78a5e9f5bddcf88331d43e228dab3b3c4c5d352d670d5cd2cadf2b71000
-
Filesize
127KB
MD562a89b70fddb0b5617c79041c763621b
SHA16293781334f2cc9ed7709811526c3aa00b7a8755
SHA256625cfcab94d8a4b83497260617e126ed694e5a0712a638f80ada101ea14b9821
SHA512218955f15bfb8fa659eb85130a8de9249a8aec187f106975165bf18b055721204cc03445b7eae31978025fa2ec57bc0f4cf399fe9864b930490bb95351c89af7
-
Filesize
13KB
MD5a67f25f56cb23fbc29e019e0cccd0a7b
SHA15f7b04dde51844b6a21d60766b893764693efa52
SHA256aff0699b0257ab27762b1285b872e18f7d72cae40a01acd8cacf3155c7e7150f
SHA5129f658c9c0423a25a3d70f8224ff0bb5e3dbb593994a0e4c0a3013d73ffbd3a6360b0b83653c6b4559c9152076951e7ce4fc88483f616dd152c4ad271a1c161df
-
Filesize
79KB
MD5599d37d9b9fce86beae9fa45b594a2eb
SHA119d806e5d722774db3503662baba4d5916c06586
SHA256f26f5a7a461b445dfaf187c2d3beee5edfbcf01acfb65fd0fe08a279603a6cef
SHA5121563da7567837f3fa191e434a0c125abff07163ca8cea8db59c811b9893b145f0e7d971b21699358cd0f614959d546b03a219eb0e9a64b4d491bffaf500aedcd
-
Filesize
57KB
MD522169ccdb223ac6f9a4b6eb418e42694
SHA1c2d34ff063a02bfebd94ab7ac422492eeb580673
SHA25651fa2faebd30d506ef658476a2645a394deedd22b0e06a6f96d48a7a2b855c4b
SHA512e0aaa1800260b89af45d5cfa85bc03aa1cd5dd2af093a419ee2502a856e4b0f0c32639ed413a38f066c7205e04cdedf46f876d0e80c6582b73c81309d6a38b90
-
Filesize
144KB
MD5d284a50463ae857c47bd026148c1282e
SHA1aea523cb5997f4caade22c9c432c9a2e712de356
SHA25638fde8383b4cfc29b2ec19f5f8983ae67eddd2fa91e741c730111d726d85340c
SHA5120305c6135406dde002fb17b7a059ffd2fa3f6bbbed8c1f7fa11ffc77609a7a70936f0ea8179246e1175fd31823bde8445309ca3774852c0b8721fa8ba5d7f562
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
118KB
MD55c3d7b5bcc0336e55c9b07a5c1f6c03e
SHA12088651b12fd9b88c52cd0d1cddd63c10c538f84
SHA256cca4b7e90e4eed0c1b7560c80547329147e2e4886e39e3e183d4ba5e7c49db36
SHA512394517c8950746cf37488888336974d310b5448e5b55a1d7f312ea4f848e3530b1146845a1430768bd7f04794921bbbf5cd1d8cf21bbcd9c9a3b286a856adcea
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f