Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-es -
resource tags
arch:x64arch:x86image:win10v2004-20250207-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
15/02/2025, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20241010-es
Behavioral task
behavioral2
Sample
random.exe
Resource
win10v2004-20250207-es
Behavioral task
behavioral3
Sample
random.exe
Resource
win10ltsc2021-20250211-es
Behavioral task
behavioral4
Sample
random.exe
Resource
win11-20250210-es
General
-
Target
random.exe
-
Size
1.8MB
-
MD5
bc3b0fcb68c9a3e6ce6ee8b3b9c258f6
-
SHA1
edde275eb12f3e35413bf5872034ed7fe318ee68
-
SHA256
c4de054a99bee0ddfb0969f6e7a371ab4c0cdf3fb5e6e712d657eb58f5e916d8
-
SHA512
7f1b24935b2e0746aa57ce2bc2208b7756556de44e759073539e434fcaa859a1be62ea554999468bba9948de54038f7ee389ff80effcd2ba4e2d238cc86e4d83
-
SSDEEP
49152:y3OcrT0HpwEszQyM6w1muKtmMSb65a2wz3pcM:K4GJzbM6qmuKtjSb65ybV
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 376af85888.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2ed65a2733.exe -
Downloads MZ/PE file 7 IoCs
flow pid Process 107 2992 axplong.exe 9 2992 axplong.exe 9 2992 axplong.exe 73 3504 Process not Found 109 1736 skotes.exe 69 2992 axplong.exe 78 1736 skotes.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 376af85888.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 376af85888.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2ed65a2733.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2ed65a2733.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Control Panel\International\Geo\Nation random.exe Key value queried \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Control Panel\International\Geo\Nation 2ed65a2733.exe -
Executes dropped EXE 10 IoCs
pid Process 2992 axplong.exe 3132 axplong.exe 4976 376af85888.exe 3772 axplong.exe 2480 2ed65a2733.exe 1736 skotes.exe 4220 skotes.exe 1580 axplong.exe 4968 DpLKrVb.exe 2940 G3Qcscg.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Wine 376af85888.exe Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Wine 2ed65a2733.exe Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Wine axplong.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\376af85888.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1020772001\\376af85888.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2ed65a2733.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1020773001\\2ed65a2733.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4656 random.exe 2992 axplong.exe 3132 axplong.exe 4976 376af85888.exe 3772 axplong.exe 2480 2ed65a2733.exe 1736 skotes.exe 4220 skotes.exe 1580 axplong.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job random.exe File created C:\Windows\Tasks\skotes.job 2ed65a2733.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 376af85888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ed65a2733.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4636 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4656 random.exe 4656 random.exe 2992 axplong.exe 2992 axplong.exe 3132 axplong.exe 3132 axplong.exe 4976 376af85888.exe 4976 376af85888.exe 3772 axplong.exe 3772 axplong.exe 2480 2ed65a2733.exe 2480 2ed65a2733.exe 1736 skotes.exe 1736 skotes.exe 4220 skotes.exe 4220 skotes.exe 1580 axplong.exe 1580 axplong.exe 2940 G3Qcscg.exe 2940 G3Qcscg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4656 random.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4656 wrote to memory of 2992 4656 random.exe 90 PID 4656 wrote to memory of 2992 4656 random.exe 90 PID 4656 wrote to memory of 2992 4656 random.exe 90 PID 2992 wrote to memory of 4976 2992 axplong.exe 98 PID 2992 wrote to memory of 4976 2992 axplong.exe 98 PID 2992 wrote to memory of 4976 2992 axplong.exe 98 PID 2992 wrote to memory of 2480 2992 axplong.exe 118 PID 2992 wrote to memory of 2480 2992 axplong.exe 118 PID 2992 wrote to memory of 2480 2992 axplong.exe 118 PID 2480 wrote to memory of 1736 2480 2ed65a2733.exe 119 PID 2480 wrote to memory of 1736 2480 2ed65a2733.exe 119 PID 2480 wrote to memory of 1736 2480 2ed65a2733.exe 119 PID 1736 wrote to memory of 4968 1736 skotes.exe 131 PID 1736 wrote to memory of 4968 1736 skotes.exe 131 PID 4968 wrote to memory of 4296 4968 DpLKrVb.exe 133 PID 4968 wrote to memory of 4296 4968 DpLKrVb.exe 133 PID 4968 wrote to memory of 4540 4968 DpLKrVb.exe 134 PID 4968 wrote to memory of 4540 4968 DpLKrVb.exe 134 PID 4968 wrote to memory of 1748 4968 DpLKrVb.exe 135 PID 4968 wrote to memory of 1748 4968 DpLKrVb.exe 135 PID 4968 wrote to memory of 1140 4968 DpLKrVb.exe 136 PID 4968 wrote to memory of 1140 4968 DpLKrVb.exe 136 PID 4968 wrote to memory of 2008 4968 DpLKrVb.exe 137 PID 4968 wrote to memory of 2008 4968 DpLKrVb.exe 137 PID 4968 wrote to memory of 1660 4968 DpLKrVb.exe 138 PID 4968 wrote to memory of 1660 4968 DpLKrVb.exe 138 PID 4968 wrote to memory of 4648 4968 DpLKrVb.exe 139 PID 4968 wrote to memory of 4648 4968 DpLKrVb.exe 139 PID 4968 wrote to memory of 1464 4968 DpLKrVb.exe 140 PID 4968 wrote to memory of 1464 4968 DpLKrVb.exe 140 PID 4968 wrote to memory of 2856 4968 DpLKrVb.exe 141 PID 4968 wrote to memory of 2856 4968 DpLKrVb.exe 141 PID 4968 wrote to memory of 4244 4968 DpLKrVb.exe 142 PID 4968 wrote to memory of 4244 4968 DpLKrVb.exe 142 PID 4968 wrote to memory of 4424 4968 DpLKrVb.exe 143 PID 4968 wrote to memory of 4424 4968 DpLKrVb.exe 143 PID 4968 wrote to memory of 4884 4968 DpLKrVb.exe 144 PID 4968 wrote to memory of 4884 4968 DpLKrVb.exe 144 PID 4968 wrote to memory of 4544 4968 DpLKrVb.exe 145 PID 4968 wrote to memory of 4544 4968 DpLKrVb.exe 145 PID 4968 wrote to memory of 2288 4968 DpLKrVb.exe 146 PID 4968 wrote to memory of 2288 4968 DpLKrVb.exe 146 PID 4968 wrote to memory of 2980 4968 DpLKrVb.exe 147 PID 4968 wrote to memory of 2980 4968 DpLKrVb.exe 147 PID 1736 wrote to memory of 2940 1736 skotes.exe 148 PID 1736 wrote to memory of 2940 1736 skotes.exe 148 PID 4968 wrote to memory of 1356 4968 DpLKrVb.exe 149 PID 4968 wrote to memory of 1356 4968 DpLKrVb.exe 149
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\1020772001\376af85888.exe"C:\Users\Admin\AppData\Local\Temp\1020772001\376af85888.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\1020773001\2ed65a2733.exe"C:\Users\Admin\AppData\Local\Temp\1020773001\2ed65a2733.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\1079996001\DpLKrVb.exe"C:\Users\Admin\AppData\Local\Temp\1079996001\DpLKrVb.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:4296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:4540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:1748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:1140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:2008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:1660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:4648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:1464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:2856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:4244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:4424
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:4884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:4544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:2288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:2980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:1356
-
-
-
C:\Users\Admin\AppData\Local\Temp\1080248001\G3Qcscg.exe"C:\Users\Admin\AppData\Local\Temp\1080248001\G3Qcscg.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI3IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU4NjAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODIxNjMwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDAxNzgxNzI0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4636
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1580
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD5bba960e6a75b81376be6b486ce1c5a04
SHA1baf9f467cb4fe8d223c240067e3c537e5e884c0d
SHA256763801af8b506ae84dfec5f5435f2990aa248c93bf337cbdc893d99210090f19
SHA512272dab3baa82afdb118c59be59fbb07ea43eee0dc728c765ffbb0a0c25f5a491cee78c74120092e4818cd76e6967a3eb365cad8eddfa14f64614f443831b2cf0
-
Filesize
1.7MB
MD5be387fa24001fc6815aaa56fd034e158
SHA1ea2116971dc1c9e20250d6e895a467033d3b66cc
SHA25697a0714c97ef7d24d3e6724c9101e4fa035159eab3dd194b4b8f2c3fe927ced3
SHA5128f7ce5bd72a87b7147c65a341b0f6902d68af49b1400bd6a42bcbe2b90719da218a5568eac26ca24e9f6c045ab784a446cd9e81bcf3d8ea212f96c7b9422f1da
-
Filesize
2.0MB
MD5190126600c4f0d6f6f75c7bd47081ce9
SHA17fce3c146cb29413dcbe133013f7bf760fb3d6d1
SHA25604a56891b310acf9bb0397f078f1ac1c117754423f6ebc76bd2b0c7182cf3825
SHA5128ee42e579c04a085bca667cc797b07fe63e26d5379f95d15471c877f26e5f22fb478986c717ecb1871ccbb2758eea7f523f7ce0ab2231b358a17d41223f73384
-
Filesize
1.7MB
MD5e307fa1b4dc1f430e7c81fb76025e722
SHA16e378eb3371f63f6277c8537f2006ca02817c0f5
SHA2561642ed4cc19a67b5c85f84c108c822a616906b45dba5c4eebb9fb0cb52ac4ad4
SHA5120e5757e3048f14ebfbc95f26a26117fffb375e9ebf19949c80a39e9593e68714d67792e5cd071f2377efe4806f8fa9be77b7c06f080e5386a0e87f5a23133102
-
Filesize
96KB
MD5d024cd2918c9fd2d35588034f74fa80d
SHA113f6649f5c4af6b284ed32c49c64b725ee1af0eb
SHA25650b23fe1691112c228f6fd9266ad447344283a0c6dd20c262a8c6c749c9ec8d4
SHA5120c74a9c1bdfda48ef85f6e5ac97e1899f70bcec3dd575034009242b722e1bb5ff7f259a1fa63ae656833faa8f6172eca686ee06a592c1726c9d251553332745e
-
Filesize
232KB
MD561df5bd677361765915aeee63c6b2b32
SHA1b95821e718908535903ae4e9aee850af22a63206
SHA2560d8a94a6639ce0c091363a25f027df4d30bb0b6d9d8a3039e931ad1f5c629480
SHA51217e1d6860b74b159614dad61744c883469b7e8b3d4dd4c25e9ba64de5f2f1c2dcc213d581d5b1295b2d95f1e74cf89cbe96dcdec854e203a83cd173a9366c7fd
-
Filesize
865KB
MD5f3b99592f40e424a2fb51e8f60b98077
SHA116481ab398ad77608131d6ef9dbccce2965a970f
SHA256aa63cf25cfc47e6a53dc1b286e425faa8775ac0311c47ca6c59d1950cfa03251
SHA5125c66a2257f037862abfdf142d7f3df5a53970bced7d274ec79e3ebfe4cf1015498cc1e47ca077cfebeb8a73d499e1f68ed287bc35bb2b8365c7843f7f46be3be
-
Filesize
1.8MB
MD5bc3b0fcb68c9a3e6ce6ee8b3b9c258f6
SHA1edde275eb12f3e35413bf5872034ed7fe318ee68
SHA256c4de054a99bee0ddfb0969f6e7a371ab4c0cdf3fb5e6e712d657eb58f5e916d8
SHA5127f1b24935b2e0746aa57ce2bc2208b7756556de44e759073539e434fcaa859a1be62ea554999468bba9948de54038f7ee389ff80effcd2ba4e2d238cc86e4d83