Analysis
-
max time kernel
262s -
max time network
324s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
23-06-2021 13:06
Static task
static1
Behavioral task
behavioral1
Sample
416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe
Resource
win10v20210410
General
-
Target
416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe
-
Size
369KB
-
MD5
331b8604ba1ee60396d11c0ccd628ebb
-
SHA1
637fde23551e378a3fcbecb64c64b8e51ece23b2
-
SHA256
416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5
-
SHA512
c55f673ae5a2c19e75585ef124161d72ac83959e8606e397388271290058f3ea4810a7ec39a00d8053138bf26ea96402e8dbe13bca186ec71fc8257442ec82c6
Malware Config
Extracted
redline
185.215.113.50:43919
Extracted
cryptbot
cypgvt32.top
morkyl03.top
-
payload_url
http://dugyly04.top/download.php?file=lv.exe
Extracted
redline
MIX 23.06
185.215.113.17:18597
Signatures
-
CryptBot Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1064-89-0x0000000000220000-0x0000000000301000-memory.dmp family_cryptbot behavioral1/memory/1064-90-0x0000000000400000-0x0000000000963000-memory.dmp family_cryptbot -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/432-71-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/432-72-0x0000000000417E26-mapping.dmp family_redline behavioral1/memory/432-74-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/832-113-0x00000000005A0000-0x00000000005BB000-memory.dmp family_redline behavioral1/memory/832-114-0x0000000000870000-0x0000000000889000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
85394565740.exe85394565740.exe47725708370.exe93394841020.exeGarbage Cleaner.exeedspolishpp.exepid Process 640 85394565740.exe 432 85394565740.exe 1064 47725708370.exe 772 93394841020.exe 1128 Garbage Cleaner.exe 832 edspolishpp.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 996 cmd.exe -
Loads dropped DLL 10 IoCs
Processes:
cmd.exe85394565740.execmd.execmd.exe416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.execmd.exe93394841020.exepid Process 996 cmd.exe 996 cmd.exe 640 85394565740.exe 1828 cmd.exe 1828 cmd.exe 1112 cmd.exe 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 1800 cmd.exe 772 93394841020.exe 772 93394841020.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
85394565740.exedescription pid Process procid_target PID 640 set thread context of 432 640 85394565740.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
47725708370.exe93394841020.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 47725708370.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 47725708370.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 93394841020.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 93394841020.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid Process 1012 taskkill.exe -
Processes:
93394841020.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 93394841020.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 93394841020.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d0030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 93394841020.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa20f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349040000000100000010000000497904b0eb8719ac47b0bc11519b74d0200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 93394841020.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
edspolishpp.exepid Process 832 edspolishpp.exe 832 edspolishpp.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
85394565740.exetaskkill.exeGarbage Cleaner.exeedspolishpp.exedescription pid Process Token: SeDebugPrivilege 432 85394565740.exe Token: SeDebugPrivilege 1012 taskkill.exe Token: SeDebugPrivilege 1128 Garbage Cleaner.exe Token: SeDebugPrivilege 832 edspolishpp.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.execmd.exe85394565740.execmd.execmd.execmd.execmd.exe93394841020.exedescription pid Process procid_target PID 1104 wrote to memory of 996 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 31 PID 1104 wrote to memory of 996 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 31 PID 1104 wrote to memory of 996 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 31 PID 1104 wrote to memory of 996 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 31 PID 996 wrote to memory of 640 996 cmd.exe 33 PID 996 wrote to memory of 640 996 cmd.exe 33 PID 996 wrote to memory of 640 996 cmd.exe 33 PID 996 wrote to memory of 640 996 cmd.exe 33 PID 640 wrote to memory of 432 640 85394565740.exe 35 PID 640 wrote to memory of 432 640 85394565740.exe 35 PID 640 wrote to memory of 432 640 85394565740.exe 35 PID 640 wrote to memory of 432 640 85394565740.exe 35 PID 640 wrote to memory of 432 640 85394565740.exe 35 PID 640 wrote to memory of 432 640 85394565740.exe 35 PID 640 wrote to memory of 432 640 85394565740.exe 35 PID 640 wrote to memory of 432 640 85394565740.exe 35 PID 640 wrote to memory of 432 640 85394565740.exe 35 PID 1104 wrote to memory of 1828 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 36 PID 1104 wrote to memory of 1828 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 36 PID 1104 wrote to memory of 1828 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 36 PID 1104 wrote to memory of 1828 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 36 PID 1828 wrote to memory of 1064 1828 cmd.exe 38 PID 1828 wrote to memory of 1064 1828 cmd.exe 38 PID 1828 wrote to memory of 1064 1828 cmd.exe 38 PID 1828 wrote to memory of 1064 1828 cmd.exe 38 PID 1104 wrote to memory of 1112 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 39 PID 1104 wrote to memory of 1112 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 39 PID 1104 wrote to memory of 1112 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 39 PID 1104 wrote to memory of 1112 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 39 PID 1112 wrote to memory of 772 1112 cmd.exe 41 PID 1112 wrote to memory of 772 1112 cmd.exe 41 PID 1112 wrote to memory of 772 1112 cmd.exe 41 PID 1112 wrote to memory of 772 1112 cmd.exe 41 PID 1104 wrote to memory of 1800 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 42 PID 1104 wrote to memory of 1800 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 42 PID 1104 wrote to memory of 1800 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 42 PID 1104 wrote to memory of 1800 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 42 PID 1800 wrote to memory of 1128 1800 cmd.exe 44 PID 1800 wrote to memory of 1128 1800 cmd.exe 44 PID 1800 wrote to memory of 1128 1800 cmd.exe 44 PID 1800 wrote to memory of 1128 1800 cmd.exe 44 PID 1104 wrote to memory of 996 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 45 PID 1104 wrote to memory of 996 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 45 PID 1104 wrote to memory of 996 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 45 PID 1104 wrote to memory of 996 1104 416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe 45 PID 996 wrote to memory of 1012 996 cmd.exe 47 PID 996 wrote to memory of 1012 996 cmd.exe 47 PID 996 wrote to memory of 1012 996 cmd.exe 47 PID 996 wrote to memory of 1012 996 cmd.exe 47 PID 772 wrote to memory of 832 772 93394841020.exe 50 PID 772 wrote to memory of 832 772 93394841020.exe 50 PID 772 wrote to memory of 832 772 93394841020.exe 50 PID 772 wrote to memory of 832 772 93394841020.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe"C:\Users\Admin\AppData\Local\Temp\416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{b8mL-0PSQN-WBjl-lcouF}\85394565740.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\{b8mL-0PSQN-WBjl-lcouF}\85394565740.exe"C:\Users\Admin\AppData\Local\Temp\{b8mL-0PSQN-WBjl-lcouF}\85394565740.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\{b8mL-0PSQN-WBjl-lcouF}\85394565740.exeC:\Users\Admin\AppData\Local\Temp\{b8mL-0PSQN-WBjl-lcouF}\85394565740.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{b8mL-0PSQN-WBjl-lcouF}\47725708370.exe" /mix2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\{b8mL-0PSQN-WBjl-lcouF}\47725708370.exe"C:\Users\Admin\AppData\Local\Temp\{b8mL-0PSQN-WBjl-lcouF}\47725708370.exe" /mix3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1064
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{b8mL-0PSQN-WBjl-lcouF}\93394841020.exe" /mix2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\{b8mL-0PSQN-WBjl-lcouF}\93394841020.exe"C:\Users\Admin\AppData\Local\Temp\{b8mL-0PSQN-WBjl-lcouF}\93394841020.exe" /mix3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Roaming\nailedp\edspolishpp.exeedspolishpp.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
2ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
MD5
90d01324d134695266115e71e43e35dc
SHA18474a7f1ba4491104770c241ecc97c58a833985f
SHA256f368fa6ec4bdce4139fb6926d329360e4f094e4fbebf49a3f2aaf333d108bce7
SHA5123e588e4b22e15c9518c326357ad998d6e49caf9321138a515bfd1a9444abc8457c52a01a5082bac94cba43e5eb12a65161f9c6cec05ba142ca6858dd8fd230bd
-
MD5
90d01324d134695266115e71e43e35dc
SHA18474a7f1ba4491104770c241ecc97c58a833985f
SHA256f368fa6ec4bdce4139fb6926d329360e4f094e4fbebf49a3f2aaf333d108bce7
SHA5123e588e4b22e15c9518c326357ad998d6e49caf9321138a515bfd1a9444abc8457c52a01a5082bac94cba43e5eb12a65161f9c6cec05ba142ca6858dd8fd230bd
-
MD5
464b04ba28ee7320e502763c75009d70
SHA178522380a8928b11494cff2c1f0b380af3751133
SHA256abaaec80f4b0d2fccb5b2c09869a9f86628b987f7369abefce67108dd1982595
SHA512691f17cda866ea5297293707e19991e6dcf0bc0e325e837aeadf55cea744ec28f4c8fd47ca1c525383e6f51c0a69084b5cdfca9d83df488eae799f5152acdb43
-
MD5
464b04ba28ee7320e502763c75009d70
SHA178522380a8928b11494cff2c1f0b380af3751133
SHA256abaaec80f4b0d2fccb5b2c09869a9f86628b987f7369abefce67108dd1982595
SHA512691f17cda866ea5297293707e19991e6dcf0bc0e325e837aeadf55cea744ec28f4c8fd47ca1c525383e6f51c0a69084b5cdfca9d83df488eae799f5152acdb43
-
MD5
85c85b73c8cd6890d30fec1afa642311
SHA14bd515ec57e56e3be543d5a98fcecfb446113d52
SHA256987540db2502a6f2264ecd208ff0bd4cc30fd4dd96ce8829d6d537660b7f2826
SHA5129c6f3289b29e57b58ed323df94e74acc4e25247568c6dce045391c4150d6a3ac653299ad07e25609f7a0314546f15f3513f6d8089f949736a121d14409dc09a1
-
MD5
85c85b73c8cd6890d30fec1afa642311
SHA14bd515ec57e56e3be543d5a98fcecfb446113d52
SHA256987540db2502a6f2264ecd208ff0bd4cc30fd4dd96ce8829d6d537660b7f2826
SHA5129c6f3289b29e57b58ed323df94e74acc4e25247568c6dce045391c4150d6a3ac653299ad07e25609f7a0314546f15f3513f6d8089f949736a121d14409dc09a1
-
MD5
85c85b73c8cd6890d30fec1afa642311
SHA14bd515ec57e56e3be543d5a98fcecfb446113d52
SHA256987540db2502a6f2264ecd208ff0bd4cc30fd4dd96ce8829d6d537660b7f2826
SHA5129c6f3289b29e57b58ed323df94e74acc4e25247568c6dce045391c4150d6a3ac653299ad07e25609f7a0314546f15f3513f6d8089f949736a121d14409dc09a1
-
MD5
a1898e4ebec6f43b6448701b7cd456c5
SHA1187645cff22119efe8f5e760fc6639bccf8c142a
SHA256393aac4cba99e10526596a762318a76c8380e1283ccf01aad2b10f5e5b0cbb90
SHA5122bda4d90df9e47e8b0d8d7f25c4ebb9af2d8fa9d5cd571de2aa556aa48cfd535379408e445cc335e9a40984a0da5b53cc00f8ab67dccd279a250b31f21a2da10
-
MD5
a1898e4ebec6f43b6448701b7cd456c5
SHA1187645cff22119efe8f5e760fc6639bccf8c142a
SHA256393aac4cba99e10526596a762318a76c8380e1283ccf01aad2b10f5e5b0cbb90
SHA5122bda4d90df9e47e8b0d8d7f25c4ebb9af2d8fa9d5cd571de2aa556aa48cfd535379408e445cc335e9a40984a0da5b53cc00f8ab67dccd279a250b31f21a2da10
-
MD5
dd65532fba354b179c4b91a54add8c3a
SHA1c88859c9c3ecd1fbb7acbdb1011f9673e9b54610
SHA256e10898e8492fe1e1128a4fe7aaa8f50a7fc5a56c59fe3a4b7620c79d8af4526d
SHA512b6e42c841a7fe548c28a702437a34d2831275d91903dc8a3b2c5958191b3526e99fd89469826ca08aa2ac236802805d095c9534a15814d4714df5b5fceb82c84
-
MD5
90d01324d134695266115e71e43e35dc
SHA18474a7f1ba4491104770c241ecc97c58a833985f
SHA256f368fa6ec4bdce4139fb6926d329360e4f094e4fbebf49a3f2aaf333d108bce7
SHA5123e588e4b22e15c9518c326357ad998d6e49caf9321138a515bfd1a9444abc8457c52a01a5082bac94cba43e5eb12a65161f9c6cec05ba142ca6858dd8fd230bd
-
MD5
90d01324d134695266115e71e43e35dc
SHA18474a7f1ba4491104770c241ecc97c58a833985f
SHA256f368fa6ec4bdce4139fb6926d329360e4f094e4fbebf49a3f2aaf333d108bce7
SHA5123e588e4b22e15c9518c326357ad998d6e49caf9321138a515bfd1a9444abc8457c52a01a5082bac94cba43e5eb12a65161f9c6cec05ba142ca6858dd8fd230bd
-
MD5
464b04ba28ee7320e502763c75009d70
SHA178522380a8928b11494cff2c1f0b380af3751133
SHA256abaaec80f4b0d2fccb5b2c09869a9f86628b987f7369abefce67108dd1982595
SHA512691f17cda866ea5297293707e19991e6dcf0bc0e325e837aeadf55cea744ec28f4c8fd47ca1c525383e6f51c0a69084b5cdfca9d83df488eae799f5152acdb43
-
MD5
464b04ba28ee7320e502763c75009d70
SHA178522380a8928b11494cff2c1f0b380af3751133
SHA256abaaec80f4b0d2fccb5b2c09869a9f86628b987f7369abefce67108dd1982595
SHA512691f17cda866ea5297293707e19991e6dcf0bc0e325e837aeadf55cea744ec28f4c8fd47ca1c525383e6f51c0a69084b5cdfca9d83df488eae799f5152acdb43
-
MD5
85c85b73c8cd6890d30fec1afa642311
SHA14bd515ec57e56e3be543d5a98fcecfb446113d52
SHA256987540db2502a6f2264ecd208ff0bd4cc30fd4dd96ce8829d6d537660b7f2826
SHA5129c6f3289b29e57b58ed323df94e74acc4e25247568c6dce045391c4150d6a3ac653299ad07e25609f7a0314546f15f3513f6d8089f949736a121d14409dc09a1
-
MD5
85c85b73c8cd6890d30fec1afa642311
SHA14bd515ec57e56e3be543d5a98fcecfb446113d52
SHA256987540db2502a6f2264ecd208ff0bd4cc30fd4dd96ce8829d6d537660b7f2826
SHA5129c6f3289b29e57b58ed323df94e74acc4e25247568c6dce045391c4150d6a3ac653299ad07e25609f7a0314546f15f3513f6d8089f949736a121d14409dc09a1
-
MD5
85c85b73c8cd6890d30fec1afa642311
SHA14bd515ec57e56e3be543d5a98fcecfb446113d52
SHA256987540db2502a6f2264ecd208ff0bd4cc30fd4dd96ce8829d6d537660b7f2826
SHA5129c6f3289b29e57b58ed323df94e74acc4e25247568c6dce045391c4150d6a3ac653299ad07e25609f7a0314546f15f3513f6d8089f949736a121d14409dc09a1
-
MD5
a1898e4ebec6f43b6448701b7cd456c5
SHA1187645cff22119efe8f5e760fc6639bccf8c142a
SHA256393aac4cba99e10526596a762318a76c8380e1283ccf01aad2b10f5e5b0cbb90
SHA5122bda4d90df9e47e8b0d8d7f25c4ebb9af2d8fa9d5cd571de2aa556aa48cfd535379408e445cc335e9a40984a0da5b53cc00f8ab67dccd279a250b31f21a2da10
-
MD5
dd65532fba354b179c4b91a54add8c3a
SHA1c88859c9c3ecd1fbb7acbdb1011f9673e9b54610
SHA256e10898e8492fe1e1128a4fe7aaa8f50a7fc5a56c59fe3a4b7620c79d8af4526d
SHA512b6e42c841a7fe548c28a702437a34d2831275d91903dc8a3b2c5958191b3526e99fd89469826ca08aa2ac236802805d095c9534a15814d4714df5b5fceb82c84
-
MD5
dd65532fba354b179c4b91a54add8c3a
SHA1c88859c9c3ecd1fbb7acbdb1011f9673e9b54610
SHA256e10898e8492fe1e1128a4fe7aaa8f50a7fc5a56c59fe3a4b7620c79d8af4526d
SHA512b6e42c841a7fe548c28a702437a34d2831275d91903dc8a3b2c5958191b3526e99fd89469826ca08aa2ac236802805d095c9534a15814d4714df5b5fceb82c84