Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
29-03-2021 07:05
Static task
static1
Behavioral task
behavioral1
Sample
874bcf36482b83f3df470655e985e29b.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
874bcf36482b83f3df470655e985e29b.exe
Resource
win10v20201028
General
-
Target
874bcf36482b83f3df470655e985e29b.exe
-
Size
162KB
-
MD5
874bcf36482b83f3df470655e985e29b
-
SHA1
bbcfeea3e3b437680cbf14c8016b3954cac1398a
-
SHA256
1c259208bdea5d896335c7a22d7a3048e4cfe0c7578a466f8faad880446f4e02
-
SHA512
688cd7b19786c7c41079a1867a394ade9ed1201f10f38c408d52bae8da9edcd42b433ae979de6b68ed4bbf628201228c45ec4d9a03987851782265c19b0da8c6
Malware Config
Extracted
smokeloader
2020
http://xsss99.icu/upload/
http://bingooodsg.icu/upload/
http://junntd.xyz/upload/
http://ginessa11.xyz/upload/
http://overplayninsx.xyz/upload/
http://bananinze.com/upload/
http://daunimlas.com/upload/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Taurus Stealer
Taurus is an infostealer first seen in June 2020.
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 8 IoCs
Processes:
FFF1.exe119E.exeFFF1.exeupdatewin.exe5.exe40F8.exeoqlrkxh.exe5B7B.exepid Process 1532 FFF1.exe 1228 119E.exe 1744 FFF1.exe 1940 updatewin.exe 1656 5.exe 652 40F8.exe 1568 oqlrkxh.exe 2044 5B7B.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Deletes itself 1 IoCs
Processes:
pid Process 1264 -
Loads dropped DLL 9 IoCs
Processes:
874bcf36482b83f3df470655e985e29b.exeFFF1.exeFFF1.exeupdatewin.exepid Process 644 874bcf36482b83f3df470655e985e29b.exe 1532 FFF1.exe 1532 FFF1.exe 1744 FFF1.exe 1940 updatewin.exe 1940 updatewin.exe 1940 updatewin.exe 1744 FFF1.exe 1744 FFF1.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
FFF1.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\0e20c117-82cc-4bda-95fa-b490e6f5bd84\\FFF1.exe\" --AutoStart" FFF1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 23 api.2ip.ua 24 api.2ip.ua 44 api.2ip.ua -
Suspicious use of SetThreadContext 1 IoCs
Processes:
oqlrkxh.exedescription pid Process procid_target PID 1568 set thread context of 460 1568 oqlrkxh.exe 57 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
874bcf36482b83f3df470655e985e29b.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 874bcf36482b83f3df470655e985e29b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 874bcf36482b83f3df470655e985e29b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 874bcf36482b83f3df470655e985e29b.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 1704 timeout.exe -
Processes:
119E.exeFFF1.exeFFF1.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 119E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 FFF1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 FFF1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 FFF1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 FFF1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 FFF1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 119E.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
874bcf36482b83f3df470655e985e29b.exepid Process 644 874bcf36482b83f3df470655e985e29b.exe 644 874bcf36482b83f3df470655e985e29b.exe 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
874bcf36482b83f3df470655e985e29b.exepid Process 644 874bcf36482b83f3df470655e985e29b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
updatewin.exedescription pid Process Token: SeRestorePrivilege 1940 updatewin.exe Token: SeBackupPrivilege 1940 updatewin.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid Process 1264 1264 1264 1264 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid Process 1264 1264 1264 1264 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
FFF1.exeFFF1.exeupdatewin.execmd.exe40F8.exedescription pid Process procid_target PID 1264 wrote to memory of 1532 1264 29 PID 1264 wrote to memory of 1532 1264 29 PID 1264 wrote to memory of 1532 1264 29 PID 1264 wrote to memory of 1532 1264 29 PID 1264 wrote to memory of 1228 1264 32 PID 1264 wrote to memory of 1228 1264 32 PID 1264 wrote to memory of 1228 1264 32 PID 1264 wrote to memory of 1228 1264 32 PID 1532 wrote to memory of 288 1532 FFF1.exe 33 PID 1532 wrote to memory of 288 1532 FFF1.exe 33 PID 1532 wrote to memory of 288 1532 FFF1.exe 33 PID 1532 wrote to memory of 288 1532 FFF1.exe 33 PID 1532 wrote to memory of 1744 1532 FFF1.exe 34 PID 1532 wrote to memory of 1744 1532 FFF1.exe 34 PID 1532 wrote to memory of 1744 1532 FFF1.exe 34 PID 1532 wrote to memory of 1744 1532 FFF1.exe 34 PID 1744 wrote to memory of 1940 1744 FFF1.exe 35 PID 1744 wrote to memory of 1940 1744 FFF1.exe 35 PID 1744 wrote to memory of 1940 1744 FFF1.exe 35 PID 1744 wrote to memory of 1940 1744 FFF1.exe 35 PID 1744 wrote to memory of 1940 1744 FFF1.exe 35 PID 1744 wrote to memory of 1940 1744 FFF1.exe 35 PID 1744 wrote to memory of 1940 1744 FFF1.exe 35 PID 1744 wrote to memory of 1656 1744 FFF1.exe 36 PID 1744 wrote to memory of 1656 1744 FFF1.exe 36 PID 1744 wrote to memory of 1656 1744 FFF1.exe 36 PID 1744 wrote to memory of 1656 1744 FFF1.exe 36 PID 1264 wrote to memory of 652 1264 38 PID 1264 wrote to memory of 652 1264 38 PID 1264 wrote to memory of 652 1264 38 PID 1264 wrote to memory of 652 1264 38 PID 1940 wrote to memory of 616 1940 updatewin.exe 39 PID 1940 wrote to memory of 616 1940 updatewin.exe 39 PID 1940 wrote to memory of 616 1940 updatewin.exe 39 PID 1940 wrote to memory of 616 1940 updatewin.exe 39 PID 1940 wrote to memory of 616 1940 updatewin.exe 39 PID 1940 wrote to memory of 616 1940 updatewin.exe 39 PID 1940 wrote to memory of 616 1940 updatewin.exe 39 PID 616 wrote to memory of 1704 616 cmd.exe 41 PID 616 wrote to memory of 1704 616 cmd.exe 41 PID 616 wrote to memory of 1704 616 cmd.exe 41 PID 616 wrote to memory of 1704 616 cmd.exe 41 PID 616 wrote to memory of 1704 616 cmd.exe 41 PID 616 wrote to memory of 1704 616 cmd.exe 41 PID 616 wrote to memory of 1704 616 cmd.exe 41 PID 652 wrote to memory of 2040 652 40F8.exe 42 PID 652 wrote to memory of 2040 652 40F8.exe 42 PID 652 wrote to memory of 2040 652 40F8.exe 42 PID 652 wrote to memory of 2040 652 40F8.exe 42 PID 652 wrote to memory of 460 652 40F8.exe 44 PID 652 wrote to memory of 460 652 40F8.exe 44 PID 652 wrote to memory of 460 652 40F8.exe 44 PID 652 wrote to memory of 460 652 40F8.exe 44 PID 652 wrote to memory of 1076 652 40F8.exe 46 PID 652 wrote to memory of 1076 652 40F8.exe 46 PID 652 wrote to memory of 1076 652 40F8.exe 46 PID 652 wrote to memory of 1076 652 40F8.exe 46 PID 652 wrote to memory of 1984 652 40F8.exe 48 PID 652 wrote to memory of 1984 652 40F8.exe 48 PID 652 wrote to memory of 1984 652 40F8.exe 48 PID 652 wrote to memory of 1984 652 40F8.exe 48 PID 652 wrote to memory of 780 652 40F8.exe 51 PID 652 wrote to memory of 780 652 40F8.exe 51 PID 652 wrote to memory of 780 652 40F8.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\874bcf36482b83f3df470655e985e29b.exe"C:\Users\Admin\AppData\Local\Temp\874bcf36482b83f3df470655e985e29b.exe"1⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:644
-
C:\Users\Admin\AppData\Local\Temp\FFF1.exeC:\Users\Admin\AppData\Local\Temp\FFF1.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\0e20c117-82cc-4bda-95fa-b490e6f5bd84" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:288
-
-
C:\Users\Admin\AppData\Local\Temp\FFF1.exe"C:\Users\Admin\AppData\Local\Temp\FFF1.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\ad7fe939-eecd-4428-9a01-20f3e59645f1\updatewin.exe"C:\Users\Admin\AppData\Local\ad7fe939-eecd-4428-9a01-20f3e59645f1\updatewin.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\ad7fe939-eecd-4428-9a01-20f3e59645f1\updatewin.exe4⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:1704
-
-
-
-
C:\Users\Admin\AppData\Local\ad7fe939-eecd-4428-9a01-20f3e59645f1\5.exe"C:\Users\Admin\AppData\Local\ad7fe939-eecd-4428-9a01-20f3e59645f1\5.exe"3⤵
- Executes dropped EXE
PID:1656
-
-
-
C:\Users\Admin\AppData\Local\Temp\119E.exeC:\Users\Admin\AppData\Local\Temp\119E.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
PID:1228
-
C:\Users\Admin\AppData\Local\Temp\40F8.exeC:\Users\Admin\AppData\Local\Temp\40F8.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hvfmkgob\2⤵PID:2040
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\oqlrkxh.exe" C:\Windows\SysWOW64\hvfmkgob\2⤵PID:460
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create hvfmkgob binPath= "C:\Windows\SysWOW64\hvfmkgob\oqlrkxh.exe /d\"C:\Users\Admin\AppData\Local\Temp\40F8.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:1076
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description hvfmkgob "wifi internet conection"2⤵PID:1984
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start hvfmkgob2⤵PID:780
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1012
-
-
C:\Windows\SysWOW64\hvfmkgob\oqlrkxh.exeC:\Windows\SysWOW64\hvfmkgob\oqlrkxh.exe /d"C:\Users\Admin\AppData\Local\Temp\40F8.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1568 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:460
-
-
C:\Users\Admin\AppData\Local\Temp\5B7B.exeC:\Users\Admin\AppData\Local\Temp\5B7B.exe1⤵
- Executes dropped EXE
PID:2044
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
2Defense Evasion
File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
MD554e60fd0149fe960a1bb51d1a63724b3
SHA18edc3d0d641441a72c642c3e96dabfe8aa9877a8
SHA2567cdb049d052b55ee9c2ba9096e8cf7e1f9117d2898c1679ab2ef2e8683356309
SHA512090766a3ae2e7d091ee0f22ce954373327d9642e10451f55342b76b1aa444c8e16cc4102957570e08d7fa19b1e17fe34f8a764f8c041c82f799d095ccf0f357b
-
MD5
61a03d15cf62612f50b74867090dbe79
SHA115228f34067b4b107e917bebaf17cc7c3c1280a8
SHA256f9e23dc21553daa34c6eb778cd262831e466ce794f4bea48150e8d70d3e6af6d
SHA5125fece89ccbbf994e4f1e3ef89a502f25a72f359d445c034682758d26f01d9f3aa20a43010b9a87f2687da7ba201476922aa46d4906d442d56eb59b2b881259d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD53be96afd7b9e0ff481b665d594167224
SHA1aff8ca9cc93425b2c20b55aaf1c1e0b56f347144
SHA25636981629cd13aef6fa93a598db9dd7745d491fb7bee57b235ddcb66f1a8c5799
SHA51276df4e5a44f6be6e75136550ebdc4bad504cafeef08c2a3f3730343f43b22771b8a3f9ba6ea5b755ed4e674257754bf29b2b8197f9bc0894219dde5f34821299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
MD5e1b17cb36e7813e48c590622bc15252b
SHA16dfc7033c04075f8925ffed5a3c13a242825c0db
SHA256e0cfd73d9d91f8b78fd95262a42ec028eb804c6f8ea6b150debbf31d187ab47a
SHA51295bd7f3752dc2676c577a7da203bf790635cb5fb54a4658377096908d6366ee065697dbcc0c92f93620e07a568935960b2682891a5d3b0c36483c96ebf286c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
MD5a371f7cc29a05a7f0e82a8a31efa4e7e
SHA18975bd5e233e38163b7f31872103913e29d5a1da
SHA256a73431586875e0278e8cae7961dd19365426c636a4da3eb75c939b5830ce381e
SHA51293990add273f5745a296683f8200b081e1427306c54c0bd0497ffa876a4d8cd800adf802f3383a95d50f58ad3979c75ed9316b7b642762af4f0f8f64b17123bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
MD5baa4c9614f2441f998810f59f0e13e5d
SHA13c7efcb961e5d9c4101306cc041d6f1ba669271c
SHA256c548c21ac30a37d3a54898d4bcd2779c8ed68a32ec09f176fde1142245259bcd
SHA512d03994ea26214c94687bbf6de97a45e9aec32a69a9de2b00399bd5fc390eae53c869189d7414b6781255e6ff7f2d2cb13bea2ac461e251f82773dac9ceca0461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD58058b6dc9feb88ae83718fea690a323c
SHA1e28729119d3f103f9de2b0cdb8a4332a2cce0ea8
SHA256e5281dd24ed6274511795abf2f457dbb6afcd3af3c921d31abe969ad0aeae12a
SHA512e2e06b163e7080defd6dde512c165ef479cbea30d710e3bb2b98be07c3b88092500699a4a9bc3d1c28645ffbad1537414931f1200b9437305b4bcdc56574f73a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
MD5a8079cadffa7896d4d133050dd7de062
SHA1b293c7d381f9d97b97c24e7477120cd699b8131a
SHA256250f7fdd1536b9314f45af3ea2fcd231c9d61c929b7b8c3358a7b45b69ca8bcf
SHA5126756d69ba08e82f1aefdd9116d59927c8e26cb74d8098a66419a7d91713b4a71b2936be97e89015f671ad11e8bc47a91443424d5b0c2462e788cc9556385d6b3
-
MD5
f3f35dcb69fca49ae55a22812770ecb2
SHA1eb8c95dc050978d10c05073b0d5311f86da986ed
SHA256a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2
SHA512098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D73194RS\xeronxik123[1].json
MD5de7d500173d3291bbc3ea5ea30e91c21
SHA15431cf97d0a6bde446cc3b57f214e59586dee96a
SHA256413fe78439b86a7add7750535369815d156ffce951b5e63a3cec0f906ec88afc
SHA512b1fda28c48401bbd388fc0595852cd697cff6945aaab4db32442589719d84cfe8cb2d387b3a4920f69b50cf74518d8a34afed448548561b68079f02c898b420b
-
MD5
6c1a69a9e18b98cfb5785df241f0594c
SHA1de5736e5ed2c74b14f73564e0487a67135826028
SHA2566a9c8196948a83cf1d12891b639d5fd27fa04ec5e418600cf8429184b464258e
SHA512004725c80d44475bc59899da974dc0ac6d3b4a2cb39b8d850cd8e21e357794f674fcf267f29b1b79d499e3493fa1e60e96a3154bb18eef60a30913f9289bdd6e
-
MD5
4e34484acc2dca82861b7c093e6725e6
SHA19086b5b62ea11b8130a4287221a6261abaf4a7b6
SHA256f20b356209c6bfb249c15b756306e563b2ad6263dda15bb1eef2671e06a34d13
SHA512207669d9d21b03f49cb8ead0136affe55201fe660d240b558313c976585279fa770b40c2ab72cb1ca11126221de4986c12a60e7c711ab507ec05fed062be2379
-
MD5
4e34484acc2dca82861b7c093e6725e6
SHA19086b5b62ea11b8130a4287221a6261abaf4a7b6
SHA256f20b356209c6bfb249c15b756306e563b2ad6263dda15bb1eef2671e06a34d13
SHA512207669d9d21b03f49cb8ead0136affe55201fe660d240b558313c976585279fa770b40c2ab72cb1ca11126221de4986c12a60e7c711ab507ec05fed062be2379
-
MD5
9866604e6a4eb4fce58553700dcb5834
SHA158f0571b583dda88a2dc56976b1d8654a51a96c0
SHA256240967b5dfa83d9c937ee2b419aaaedb587b785aaeff9428dd9b334714461622
SHA5127a585ddf38f18ba8de7906f5570538d69306850d4a1cdfd40e3b5a6ba70b37e8cf2ccf31c5c869d21fb3d532e3ec4ec571e0bd0aa08982bdad60ee072828e89e
-
MD5
f3f35dcb69fca49ae55a22812770ecb2
SHA1eb8c95dc050978d10c05073b0d5311f86da986ed
SHA256a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2
SHA512098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632
-
MD5
f3f35dcb69fca49ae55a22812770ecb2
SHA1eb8c95dc050978d10c05073b0d5311f86da986ed
SHA256a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2
SHA512098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632
-
MD5
f3f35dcb69fca49ae55a22812770ecb2
SHA1eb8c95dc050978d10c05073b0d5311f86da986ed
SHA256a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2
SHA512098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632
-
MD5
cd609bb374acadbd628599bae56b6ce5
SHA165cbba0ce41ff3f3193ed3ccc3ab0951ffd37307
SHA256db60f632d229c5613d9986bf8943d41c2af1644bc2f4c578358cc5b0e09bcb00
SHA51203b6611d915b5637a3ca221f2129af7f9e8725ab5ad20722d2b3cffcd1826e9d1b7b910a74c787781d70f2023129e53badde9ca39f0e20d3442e300fbdb25ffc
-
MD5
e1edad05494a14cefa05fa28c3611a6e
SHA1718fe9cf4e4a7272ffa0583c0851e3134d6f1547
SHA25600b09aba4c90b634ce887da826fc74284f171698c203dcfd7da3e8b529ac6db1
SHA5127230dd424bb0e28f436239ab45a7bb93867e9ec8533b3fdd780b430762a0f5f6e8bc514841f09e49be608334f77c8d11b1ae884f032df2c05aca5739cfdacca5
-
MD5
2ba02a23e7b421bb51d9c47665ed540b
SHA1f5e6d401c61760fe7f6edad47a0517fb85d9cdeb
SHA25653430b4106efc011a26b50b14b9cead42607cb1de2a6a7ef7bbb04b960baea92
SHA51216c9c254b8f78212f949d78c5e4679dcc9d365ad3188ffa0d12d6ad7f6f3e41b7db229075c99f31e35b58f7e6764f9177f9d1c4bf3bc5827503a8a793b54ade2
-
MD5
2ba02a23e7b421bb51d9c47665ed540b
SHA1f5e6d401c61760fe7f6edad47a0517fb85d9cdeb
SHA25653430b4106efc011a26b50b14b9cead42607cb1de2a6a7ef7bbb04b960baea92
SHA51216c9c254b8f78212f949d78c5e4679dcc9d365ad3188ffa0d12d6ad7f6f3e41b7db229075c99f31e35b58f7e6764f9177f9d1c4bf3bc5827503a8a793b54ade2
-
MD5
54bd88dff7b72f98c55e02abe67ea775
SHA1fa6cf4d0ef30b11afb41530d5fdb4736c49c61c5
SHA2568290f78143eafe780712f7f692a5853847e3557887442bb3bcb25a02f5c6f7ff
SHA5129932f79f076a00027e64b6a54246ee8828770f9a19b7a146d88553f92a8b3ea163bdbd16f134b1cc20ada713956e2283134c47815d3bd16c6760980240f647aa
-
MD5
cd609bb374acadbd628599bae56b6ce5
SHA165cbba0ce41ff3f3193ed3ccc3ab0951ffd37307
SHA256db60f632d229c5613d9986bf8943d41c2af1644bc2f4c578358cc5b0e09bcb00
SHA51203b6611d915b5637a3ca221f2129af7f9e8725ab5ad20722d2b3cffcd1826e9d1b7b910a74c787781d70f2023129e53badde9ca39f0e20d3442e300fbdb25ffc
-
MD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
MD5
f3f35dcb69fca49ae55a22812770ecb2
SHA1eb8c95dc050978d10c05073b0d5311f86da986ed
SHA256a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2
SHA512098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632
-
MD5
f3f35dcb69fca49ae55a22812770ecb2
SHA1eb8c95dc050978d10c05073b0d5311f86da986ed
SHA256a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2
SHA512098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632
-
MD5
e1edad05494a14cefa05fa28c3611a6e
SHA1718fe9cf4e4a7272ffa0583c0851e3134d6f1547
SHA25600b09aba4c90b634ce887da826fc74284f171698c203dcfd7da3e8b529ac6db1
SHA5127230dd424bb0e28f436239ab45a7bb93867e9ec8533b3fdd780b430762a0f5f6e8bc514841f09e49be608334f77c8d11b1ae884f032df2c05aca5739cfdacca5
-
MD5
e1edad05494a14cefa05fa28c3611a6e
SHA1718fe9cf4e4a7272ffa0583c0851e3134d6f1547
SHA25600b09aba4c90b634ce887da826fc74284f171698c203dcfd7da3e8b529ac6db1
SHA5127230dd424bb0e28f436239ab45a7bb93867e9ec8533b3fdd780b430762a0f5f6e8bc514841f09e49be608334f77c8d11b1ae884f032df2c05aca5739cfdacca5
-
MD5
2ba02a23e7b421bb51d9c47665ed540b
SHA1f5e6d401c61760fe7f6edad47a0517fb85d9cdeb
SHA25653430b4106efc011a26b50b14b9cead42607cb1de2a6a7ef7bbb04b960baea92
SHA51216c9c254b8f78212f949d78c5e4679dcc9d365ad3188ffa0d12d6ad7f6f3e41b7db229075c99f31e35b58f7e6764f9177f9d1c4bf3bc5827503a8a793b54ade2
-
MD5
2ba02a23e7b421bb51d9c47665ed540b
SHA1f5e6d401c61760fe7f6edad47a0517fb85d9cdeb
SHA25653430b4106efc011a26b50b14b9cead42607cb1de2a6a7ef7bbb04b960baea92
SHA51216c9c254b8f78212f949d78c5e4679dcc9d365ad3188ffa0d12d6ad7f6f3e41b7db229075c99f31e35b58f7e6764f9177f9d1c4bf3bc5827503a8a793b54ade2
-
MD5
2ba02a23e7b421bb51d9c47665ed540b
SHA1f5e6d401c61760fe7f6edad47a0517fb85d9cdeb
SHA25653430b4106efc011a26b50b14b9cead42607cb1de2a6a7ef7bbb04b960baea92
SHA51216c9c254b8f78212f949d78c5e4679dcc9d365ad3188ffa0d12d6ad7f6f3e41b7db229075c99f31e35b58f7e6764f9177f9d1c4bf3bc5827503a8a793b54ade2
-
MD5
2ba02a23e7b421bb51d9c47665ed540b
SHA1f5e6d401c61760fe7f6edad47a0517fb85d9cdeb
SHA25653430b4106efc011a26b50b14b9cead42607cb1de2a6a7ef7bbb04b960baea92
SHA51216c9c254b8f78212f949d78c5e4679dcc9d365ad3188ffa0d12d6ad7f6f3e41b7db229075c99f31e35b58f7e6764f9177f9d1c4bf3bc5827503a8a793b54ade2