Analysis
-
max time kernel
85s -
max time network
132s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 01:06
Static task
static1
Behavioral task
behavioral1
Sample
atikmdag-patcher 1.4.7.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
atikmdag-patcher 1.4.7.exe
Resource
win10v20201028
General
-
Target
atikmdag-patcher 1.4.7.exe
-
Size
6.3MB
-
MD5
1e43d60694f42e1c1360f484a3d8af44
-
SHA1
f347872032eba7c0a83e3b02a320d0ff822a41f1
-
SHA256
08dbec2319a6dc6fc42ac20e63560ff2796b9106ab9cfd4ea3974b45460f4c6b
-
SHA512
a428139d5f4238289cc1d30918046f503e496ef5ad0275e6d4e828c1f928fb201b83155fec1676c12b185dba40667a4a8b579200c787e9a88a2e53d24947f9eb
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4108-61-0x0000000000780000-0x00000000007A6000-memory.dmp family_redline -
Executes dropped EXE 12 IoCs
Processes:
atikmdag-patcher 1.4.7.tmpatikmdag-patcher 1.4.7.tmpatikmdag-patcher 1.4.7.exekeep.exert.exestpopit.exeAppare.comDa.comAppare.comDa.comRegAsm.exeRegAsm.exepid process 2680 atikmdag-patcher 1.4.7.tmp 4084 atikmdag-patcher 1.4.7.tmp 184 atikmdag-patcher 1.4.7.exe 700 keep.exe 4028 rt.exe 1884 stpopit.exe 2200 Appare.com 1928 Da.com 3220 Appare.com 3928 Da.com 4108 RegAsm.exe 4240 RegAsm.exe -
Drops startup file 1 IoCs
Processes:
Appare.comdescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hOVfzhxptF.url Appare.com -
Loads dropped DLL 1 IoCs
Processes:
keep.exepid process 700 keep.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
rt.exestpopit.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce rt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" rt.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce stpopit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" stpopit.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 31 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Da.comAppare.comdescription pid process target process PID 3928 set thread context of 4108 3928 Da.com RegAsm.exe PID 3220 set thread context of 4240 3220 Appare.com RegAsm.exe -
Drops file in Program Files directory 6 IoCs
Processes:
atikmdag-patcher 1.4.7.tmpdescription ioc process File opened for modification C:\Program Files (x86)\My Program\keep.exe atikmdag-patcher 1.4.7.tmp File opened for modification C:\Program Files (x86)\My Program\resource.dll atikmdag-patcher 1.4.7.tmp File created C:\Program Files (x86)\My Program\is-21NGI.tmp atikmdag-patcher 1.4.7.tmp File created C:\Program Files (x86)\My Program\is-P6MQ9.tmp atikmdag-patcher 1.4.7.tmp File created C:\Program Files (x86)\My Program\is-AFCH4.tmp atikmdag-patcher 1.4.7.tmp File opened for modification C:\Program Files (x86)\My Program\atikmdag-patcher 1.4.7.exe atikmdag-patcher 1.4.7.tmp -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
atikmdag-patcher 1.4.7.tmpRegAsm.exepid process 4084 atikmdag-patcher 1.4.7.tmp 4084 atikmdag-patcher 1.4.7.tmp 4108 RegAsm.exe 4108 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RegAsm.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 4108 RegAsm.exe Token: SeDebugPrivilege 4240 RegAsm.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
atikmdag-patcher 1.4.7.tmppid process 4084 atikmdag-patcher 1.4.7.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 4240 RegAsm.exe -
Suspicious use of WriteProcessMemory 85 IoCs
Processes:
atikmdag-patcher 1.4.7.exeatikmdag-patcher 1.4.7.tmpatikmdag-patcher 1.4.7.exeatikmdag-patcher 1.4.7.tmpkeep.exert.exestpopit.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3084 wrote to memory of 2680 3084 atikmdag-patcher 1.4.7.exe atikmdag-patcher 1.4.7.tmp PID 3084 wrote to memory of 2680 3084 atikmdag-patcher 1.4.7.exe atikmdag-patcher 1.4.7.tmp PID 3084 wrote to memory of 2680 3084 atikmdag-patcher 1.4.7.exe atikmdag-patcher 1.4.7.tmp PID 2680 wrote to memory of 2924 2680 atikmdag-patcher 1.4.7.tmp atikmdag-patcher 1.4.7.exe PID 2680 wrote to memory of 2924 2680 atikmdag-patcher 1.4.7.tmp atikmdag-patcher 1.4.7.exe PID 2680 wrote to memory of 2924 2680 atikmdag-patcher 1.4.7.tmp atikmdag-patcher 1.4.7.exe PID 2924 wrote to memory of 4084 2924 atikmdag-patcher 1.4.7.exe atikmdag-patcher 1.4.7.tmp PID 2924 wrote to memory of 4084 2924 atikmdag-patcher 1.4.7.exe atikmdag-patcher 1.4.7.tmp PID 2924 wrote to memory of 4084 2924 atikmdag-patcher 1.4.7.exe atikmdag-patcher 1.4.7.tmp PID 4084 wrote to memory of 184 4084 atikmdag-patcher 1.4.7.tmp atikmdag-patcher 1.4.7.exe PID 4084 wrote to memory of 184 4084 atikmdag-patcher 1.4.7.tmp atikmdag-patcher 1.4.7.exe PID 4084 wrote to memory of 184 4084 atikmdag-patcher 1.4.7.tmp atikmdag-patcher 1.4.7.exe PID 4084 wrote to memory of 700 4084 atikmdag-patcher 1.4.7.tmp keep.exe PID 4084 wrote to memory of 700 4084 atikmdag-patcher 1.4.7.tmp keep.exe PID 4084 wrote to memory of 700 4084 atikmdag-patcher 1.4.7.tmp keep.exe PID 700 wrote to memory of 4028 700 keep.exe rt.exe PID 700 wrote to memory of 4028 700 keep.exe rt.exe PID 700 wrote to memory of 4028 700 keep.exe rt.exe PID 4028 wrote to memory of 4040 4028 rt.exe cmd.exe PID 4028 wrote to memory of 4040 4028 rt.exe cmd.exe PID 4028 wrote to memory of 4040 4028 rt.exe cmd.exe PID 700 wrote to memory of 1884 700 keep.exe stpopit.exe PID 700 wrote to memory of 1884 700 keep.exe stpopit.exe PID 700 wrote to memory of 1884 700 keep.exe stpopit.exe PID 4028 wrote to memory of 2576 4028 rt.exe cmd.exe PID 4028 wrote to memory of 2576 4028 rt.exe cmd.exe PID 4028 wrote to memory of 2576 4028 rt.exe cmd.exe PID 1884 wrote to memory of 2692 1884 stpopit.exe cmd.exe PID 1884 wrote to memory of 2692 1884 stpopit.exe cmd.exe PID 1884 wrote to memory of 2692 1884 stpopit.exe cmd.exe PID 2576 wrote to memory of 848 2576 cmd.exe certutil.exe PID 2576 wrote to memory of 848 2576 cmd.exe certutil.exe PID 2576 wrote to memory of 848 2576 cmd.exe certutil.exe PID 1884 wrote to memory of 2244 1884 stpopit.exe cmd.exe PID 1884 wrote to memory of 2244 1884 stpopit.exe cmd.exe PID 1884 wrote to memory of 2244 1884 stpopit.exe cmd.exe PID 2244 wrote to memory of 2220 2244 cmd.exe certutil.exe PID 2244 wrote to memory of 2220 2244 cmd.exe certutil.exe PID 2244 wrote to memory of 2220 2244 cmd.exe certutil.exe PID 2576 wrote to memory of 1488 2576 cmd.exe cmd.exe PID 2576 wrote to memory of 1488 2576 cmd.exe cmd.exe PID 2576 wrote to memory of 1488 2576 cmd.exe cmd.exe PID 2244 wrote to memory of 3944 2244 cmd.exe cmd.exe PID 2244 wrote to memory of 3944 2244 cmd.exe cmd.exe PID 2244 wrote to memory of 3944 2244 cmd.exe cmd.exe PID 3944 wrote to memory of 2756 3944 cmd.exe findstr.exe PID 3944 wrote to memory of 2756 3944 cmd.exe findstr.exe PID 3944 wrote to memory of 2756 3944 cmd.exe findstr.exe PID 1488 wrote to memory of 760 1488 cmd.exe findstr.exe PID 1488 wrote to memory of 760 1488 cmd.exe findstr.exe PID 1488 wrote to memory of 760 1488 cmd.exe findstr.exe PID 3944 wrote to memory of 4092 3944 cmd.exe certutil.exe PID 3944 wrote to memory of 4092 3944 cmd.exe certutil.exe PID 3944 wrote to memory of 4092 3944 cmd.exe certutil.exe PID 1488 wrote to memory of 204 1488 cmd.exe certutil.exe PID 1488 wrote to memory of 204 1488 cmd.exe certutil.exe PID 1488 wrote to memory of 204 1488 cmd.exe certutil.exe PID 1488 wrote to memory of 2200 1488 cmd.exe Appare.com PID 1488 wrote to memory of 2200 1488 cmd.exe Appare.com PID 1488 wrote to memory of 2200 1488 cmd.exe Appare.com PID 3944 wrote to memory of 1928 3944 cmd.exe Da.com PID 3944 wrote to memory of 1928 3944 cmd.exe Da.com PID 3944 wrote to memory of 1928 3944 cmd.exe Da.com PID 3944 wrote to memory of 2084 3944 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.7.exe"C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\is-VMPOE.tmp\atikmdag-patcher 1.4.7.tmp"C:\Users\Admin\AppData\Local\Temp\is-VMPOE.tmp\atikmdag-patcher 1.4.7.tmp" /SL5="$6005A,5891519,780800,C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.7.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.7.exe"C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.7.exe" /VERYSILENT3⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\is-9QP7T.tmp\atikmdag-patcher 1.4.7.tmp"C:\Users\Admin\AppData\Local\Temp\is-9QP7T.tmp\atikmdag-patcher 1.4.7.tmp" /SL5="$7005A,5891519,780800,C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.7.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Program Files (x86)\My Program\atikmdag-patcher 1.4.7.exe"C:\Program Files (x86)\My Program\atikmdag-patcher 1.4.7.exe" C:\Program Files (x86)\My Program\atikmdag-patcher 1.4.7.exe5⤵
- Executes dropped EXE
PID:184 -
C:\Program Files (x86)\My Program\keep.exe"C:\Program Files (x86)\My Program\keep.exe" C:\Program Files (x86)\My Program\keep.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\rt.exe"C:\Users\Admin\AppData\Local\Temp/rt.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\cmd.execmd /c YwQV7⤵PID:4040
-
C:\Windows\SysWOW64\cmd.execmd /c certutil -decode Viso.pdf Fara.pdf & cmd < Fara.pdf7⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\certutil.execertutil -decode Viso.pdf Fara.pdf8⤵PID:848
-
C:\Windows\SysWOW64\cmd.execmd8⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^wSZJdQSZwKBWJCtpbfZHNwzsXALug$" Ansiosa.wks9⤵PID:760
-
C:\Windows\SysWOW64\certutil.execertutil -decode Ma.xls M9⤵PID:204
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Appare.comAppare.com M9⤵
- Executes dropped EXE
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Appare.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Appare.com M10⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of SetThreadContext
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4240 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 309⤵
- Runs ping.exe
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\stpopit.exe"C:\Users\Admin\AppData\Local\Temp/stpopit.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\cmd.execmd /c TxoIPAEm7⤵PID:2692
-
C:\Windows\SysWOW64\cmd.execmd /c certutil -decode Ascoltami.vsd Tue.html & cmd < Tue.html7⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\certutil.execertutil -decode Ascoltami.vsd Tue.html8⤵PID:2220
-
C:\Windows\SysWOW64\cmd.execmd8⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^kRZuMjyBJtsZkHQEHRpy$" Magro.m4a9⤵PID:2756
-
C:\Windows\SysWOW64\certutil.execertutil -decode Ne.cab E9⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Da.comDa.com E9⤵
- Executes dropped EXE
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Da.comC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Da.com E10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 309⤵
- Runs ping.exe
PID:2084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
5616e95156f37d4445947144eb72d84b
SHA12ce32920b08f8b6a0959905010b3699fa9111f28
SHA256f3b0e3ba3beb72ad455f478bca6347fbcabbce4ddfa2a6e34f72f11412502434
SHA51227f5a5bbb8dd752b575a74a38ab2aa66c9e714fc9c3e7351005be86c856c6f3cc5bb39835ceb5bd3f7b0f08e4bceb5157970cbf8bd0b927d89b35e042b85552e
-
MD5
5616e95156f37d4445947144eb72d84b
SHA12ce32920b08f8b6a0959905010b3699fa9111f28
SHA256f3b0e3ba3beb72ad455f478bca6347fbcabbce4ddfa2a6e34f72f11412502434
SHA51227f5a5bbb8dd752b575a74a38ab2aa66c9e714fc9c3e7351005be86c856c6f3cc5bb39835ceb5bd3f7b0f08e4bceb5157970cbf8bd0b927d89b35e042b85552e
-
MD5
8f1560ffac4b5f685d957f26f3da8c91
SHA1f0a8f67f32e1486b5ebbeb56ae0c74d3608183f6
SHA256c61355b31953f2b6853f380f1c77e6b9263b93cad54d8f4db8e91a54f775b00c
SHA5122f8a55cb2afa86cb2d83f5483bfa96b04266f95983cf4590b3fdd9644711d45d5372767b4d3bcc88c798a8cf9a6d37d475b9e7cda7d0d1761137965a103b8998
-
MD5
8f1560ffac4b5f685d957f26f3da8c91
SHA1f0a8f67f32e1486b5ebbeb56ae0c74d3608183f6
SHA256c61355b31953f2b6853f380f1c77e6b9263b93cad54d8f4db8e91a54f775b00c
SHA5122f8a55cb2afa86cb2d83f5483bfa96b04266f95983cf4590b3fdd9644711d45d5372767b4d3bcc88c798a8cf9a6d37d475b9e7cda7d0d1761137965a103b8998
-
MD5
013a6f2f31161c91a9a445bd6cc230e1
SHA1ca2de735fe750e91320100b81e0058523c7652a6
SHA2566019c54be638bdac665c249634ff5384d7e34f5ee8cb0d8283de14f2ec70e9fd
SHA51256d99898efb64595cf1b516482d918ef557cc26f9ea7ea5e6aa0191365566e97df6da6ec019ed0190cf3f065899087690ab96b8c9f611cb5ac356eaa2d7ed7b0
-
MD5
f363043e498919650e397754ec7c8c9d
SHA1804ad4227c2f18abd799af862e0d16dc4a299c4d
SHA25624c6e2095ee6a98e4dfa0634f60214bff38d6a7633ac3a3a7d53fd03c01b41c2
SHA512206bfab0fbff30201c529bb6c3ff3394545bb870e57d3901795b6834d0730e9b7937568d30bceeb6069105752f04d7f859878b3ba67d41ae9d6f5bd3d0118b1b
-
MD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
MD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
MD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
MD5
e978b8eff23960f958f41c82683db764
SHA1f548ce7eca4c7eb58fdb67725a86fc8c7ed2a8dc
SHA2563835d4d1d81946a2760df7c78d58df6eef867a15498436e38d48d74941e845aa
SHA512167299e411099c3ea722fa3401ac1bbc165ceee3fb3ae4aeae083e6f1a1ab4ab4c2b714bb85c2e42e8b1c48b575233ab81810d51565a6e434729749edf929115
-
MD5
808b36526737125ad413e5d772a253ba
SHA11a529db41dbe5555fb42b444b434dabd3bd5ceed
SHA2567ca9c4d248c6bf823e7d4d745cf8cd7c3a95593f075e85d29ae71c414e95e25a
SHA512ce3fcf6fd4e7c1d9a2512b6e5d982567ce905dc0ba3b401167e1d63043d810d03055966c0dd3c33677eb4d844deafe24b481a919ac9653ab854ce1a0c79afc95
-
MD5
3de6c2c92e9f7adc08b0d888a63177d6
SHA10afe6e14dce87a263a8cf4accb63a36c3b0818e2
SHA2562021f9828abd8dea0378d5f414fe4f06ef5926ffead111fa5c4e551e903df081
SHA51294c259727b69baf04b32a2e06a118d1f4694791b71eb3cffb3981f96c4da32db40ac3f96c3ac6136b864cc1e57223db53ef9851d655631dca5e6ee44e5297aff
-
MD5
bbaf0e88e94b7498d7bb2efbc867a0ca
SHA1a264a580e4b1fa2c68aa8bcdb246bbbe558c3d97
SHA25615d3f2fed1de2513f8a8f841a08c24025abc42e9ce97f613893bcfb7e4a593ef
SHA51266bcdebb7579ed58472d2c96fa8c4e97d1b69398719da411ac654cb4f9136f007ee4538d4efedc57f645bc2cf3fa28126589f18c7ab7dac727fc4b908339ddf1
-
MD5
b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
MD5
b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
MD5
c41a4c03c29003bc0a717a47c05d9b88
SHA1e6c18e38fda5ab34c251a5b3b01309b3476489e0
SHA256522c2942e9154228e10f9359566b6c647a378c05e4cd59c42527b2094691aa81
SHA5121f0cfe111fc260bd5fdca9f3c905f9c7f2a7ad7f76bf1feaa69bed12dc38c70f0b0ba4e1b1e46c5cfd48726bdb6a417e8a20417e87e35b0c9f349f8a5ad7edcd
-
MD5
70edb93e086c46de7138d7437df387c0
SHA1b507df7b8622a44b29f70946cdc82789067f3f14
SHA256fcf760f3d25131763bb68a4e0ca6edaad10530d9b53413383721f035fd0838be
SHA512d0e8b1378ab58fcc3c6f24103c8c7df9e1a9bac390987a41b93351f8dd3b5dfba9b8fd9577b5393ba4140e856ab9e6440227c36fef666e994b6a233e48fe49c5
-
MD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
MD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
MD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
MD5
12903c30dcfcf2b57cf3bd85857088a3
SHA17b310e4d763bbb756e41bf1b37c15345883fb8ac
SHA256968ffd11166d926c7756b83d0ca17d3d9d475a8677d321995d0d9a44630fc142
SHA512c1e2709ef0474afb05bf09377261c525e3044e3bf4a9d388200f53ace1b7ecaed9f11a8ae89e4c5e281310871a04119b24bc54b9f15224bd568a69cea06ea1eb
-
MD5
2f6790ccf7cea7c5f858b769f06709e7
SHA1002abffcca6d4701a4f4d9f0340bbd555200e672
SHA256a16cc02f8a3c93874de5888855246eaabb5ae1908d70266ab4428765de373c22
SHA51246fd1bab2c49c043a19ae1b71559694162823e17620fb29c1c68dc09a28241a12d58969d77ea482e5e38a9dd23a9a1299c195c6102fe5dfd1e233801709c2176
-
MD5
191f78d91c00aae954c20e7d7cea361e
SHA1407d4901ec62efd52f1339e183b88315f8ebc8e1
SHA25675dfa8b6b61a531bc3d76d2de4abe4c65fa83b4fddfd17a8cf2a07a52e076b4f
SHA512fbe25f494d1db18dac12dde905fc21a7232ed3da72911124a0b5cdcf4ac827d5133b2681c1714e7b359fb9555bac1ca13b637d1119a127fbbea42ccfbd50b091
-
MD5
ab04c32370b5b3a8c1612ac506176bf1
SHA1c33dcdceaf8bb68082e55a1421d48c53bc4f083b
SHA2566769f7fad25a161290777b143322bee65df02e7f4549d7abfe5d429f6fa9b0ea
SHA5127afb6b4dc8ee3dfabc3194c9dd544f9b52757f9bc69a369fd07418b06e91148a202bafc7bbe71d034e26a0e5a9251238445c070ec2046cbeb496b16f9d5f46bb
-
MD5
b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
MD5
b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
MD5
028baf06dfed68e9c21977aecac57b1f
SHA1472059c93b1183200bca025f62f2e0c472b94fd7
SHA256e9bc2db22920ac2433dd459fbf30bf56e11133ac56b3426a12c523eb7e50bb33
SHA51282679f7738d5e8a32571b07a0027fddb6b4e88207c943981e441eba6301ce37295fd32d750ff084f29d9f00e0467945eacd0328f8871c9222f7c1bdd1694cc3b
-
MD5
db27920346f23c1d742ec0722426417e
SHA1adf18d452653e13ab5518706ea9c4c492a46f4f7
SHA256a43522b8be197d4097bc7a04ac42e7bfb7e085e39969b58d0e4f2e7ff4cbc0f5
SHA51243f57a95c574c92d8d73f9767844681e1a45c7def5dc79848d357a1cf437b7874325af12b72c226fcdd109a9f8824c4e735d515d04b7fa65186604309dad10e5
-
MD5
db27920346f23c1d742ec0722426417e
SHA1adf18d452653e13ab5518706ea9c4c492a46f4f7
SHA256a43522b8be197d4097bc7a04ac42e7bfb7e085e39969b58d0e4f2e7ff4cbc0f5
SHA51243f57a95c574c92d8d73f9767844681e1a45c7def5dc79848d357a1cf437b7874325af12b72c226fcdd109a9f8824c4e735d515d04b7fa65186604309dad10e5
-
MD5
bb4beef02da8dad3d51e5b633aa7bd7e
SHA12697021d2e7fcc7897bd783d43e2641985dcaebd
SHA256fe41d5e451fad456182894fdfa58509b2cc00ba19d026932b0cabdc173b3d7e0
SHA51248ee4f8febc1d2a049586b8704022bfaf03b8d9d79e4ca2fc9fbdee40534f1a5db23342e62f2c812d2d04e413d3eac5839e0e251e16d7e39a27594aae4fef33d
-
MD5
9cdcb057318090085378e27abb294c49
SHA131026fc4a3abaa89c19f65c67dc0abc5fb66f320
SHA2563f80def9b910063314c8593a48a28647a060f5eaed7a46c6be24a6e36a0b2e48
SHA512018ec6b7f0104cbf7adb89893a9079ece63744c9572dfd4727bbeb133c0c73b539069e35fd32279890300ad2970bb6b621ae78ddeaed433e5cce16b37a6a3c01
-
MD5
013a6f2f31161c91a9a445bd6cc230e1
SHA1ca2de735fe750e91320100b81e0058523c7652a6
SHA2566019c54be638bdac665c249634ff5384d7e34f5ee8cb0d8283de14f2ec70e9fd
SHA51256d99898efb64595cf1b516482d918ef557cc26f9ea7ea5e6aa0191365566e97df6da6ec019ed0190cf3f065899087690ab96b8c9f611cb5ac356eaa2d7ed7b0