Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
23-08-2021 13:56
Static task
static1
Behavioral task
behavioral1
Sample
f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2.exe
Resource
win10v20210410
General
-
Target
f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2.exe
-
Size
278KB
-
MD5
0d90e4f66414c1bc9779dbd3f776becd
-
SHA1
5abbb99c25720aaaa253d27ca6d71769b1fd1469
-
SHA256
f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2
-
SHA512
0a0a5775f0a04768be9cf20917b2a26dcd97d139dce1233745f4e37277d271bfeacaa60233bad02a1805a9db9c44bca8e4d73d83d2cff9f00fda22e35889bdfb
Malware Config
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
redline
185.215.113.29:8678
Extracted
vidar
40.1
517
https://eduarroma.tumblr.com/
-
profile_id
517
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1800-79-0x0000000002410000-0x000000000242D000-memory.dmp family_redline behavioral1/memory/1800-80-0x0000000003FB0000-0x0000000003FCC000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
Vidar Stealer 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1604-108-0x000000000046B77D-mapping.dmp family_vidar behavioral1/memory/1604-107-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral1/memory/1884-111-0x0000000002410000-0x00000000024AE000-memory.dmp family_vidar behavioral1/memory/1604-112-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
Processes:
12A6.exe166F.exe12A6.exe12A6.exe12A6.exebuild2.exebuild2.exebuild3.exebuild3.exepid process 1228 12A6.exe 1800 166F.exe 1140 12A6.exe 2004 12A6.exe 1628 12A6.exe 1884 build2.exe 1604 build2.exe 828 build3.exe 1136 build3.exe -
Deletes itself 1 IoCs
Processes:
pid process 1200 -
Loads dropped DLL 12 IoCs
Processes:
12A6.exe12A6.exe12A6.exe12A6.exebuild2.exepid process 1228 12A6.exe 1140 12A6.exe 1140 12A6.exe 2004 12A6.exe 1628 12A6.exe 1628 12A6.exe 1628 12A6.exe 1628 12A6.exe 1604 build2.exe 1604 build2.exe 1604 build2.exe 1604 build2.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
12A6.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\1c9932ba-fef3-43d0-9339-48fd154502c2\\12A6.exe\" --AutoStart" 12A6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 23 api.2ip.ua 24 api.2ip.ua 32 api.2ip.ua -
Suspicious use of SetThreadContext 4 IoCs
Processes:
12A6.exe12A6.exebuild2.exebuild3.exedescription pid process target process PID 1228 set thread context of 1140 1228 12A6.exe 12A6.exe PID 2004 set thread context of 1628 2004 12A6.exe 12A6.exe PID 1884 set thread context of 1604 1884 build2.exe build2.exe PID 828 set thread context of 1136 828 build3.exe build3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
build2.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
12A6.exe12A6.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 12A6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 12A6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 12A6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 12A6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 12A6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2.exepid process 1072 f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2.exe 1072 f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2.exe 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1200 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2.exepid process 1072 f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
166F.exedescription pid process Token: SeShutdownPrivilege 1200 Token: SeShutdownPrivilege 1200 Token: SeDebugPrivilege 1800 166F.exe Token: SeShutdownPrivilege 1200 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1200 1200 1200 1200 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1200 1200 1200 1200 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
12A6.exe12A6.exe12A6.exe12A6.exebuild2.exebuild3.exedescription pid process target process PID 1200 wrote to memory of 1228 1200 12A6.exe PID 1200 wrote to memory of 1228 1200 12A6.exe PID 1200 wrote to memory of 1228 1200 12A6.exe PID 1200 wrote to memory of 1228 1200 12A6.exe PID 1200 wrote to memory of 1800 1200 166F.exe PID 1200 wrote to memory of 1800 1200 166F.exe PID 1200 wrote to memory of 1800 1200 166F.exe PID 1200 wrote to memory of 1800 1200 166F.exe PID 1228 wrote to memory of 1140 1228 12A6.exe 12A6.exe PID 1228 wrote to memory of 1140 1228 12A6.exe 12A6.exe PID 1228 wrote to memory of 1140 1228 12A6.exe 12A6.exe PID 1228 wrote to memory of 1140 1228 12A6.exe 12A6.exe PID 1228 wrote to memory of 1140 1228 12A6.exe 12A6.exe PID 1228 wrote to memory of 1140 1228 12A6.exe 12A6.exe PID 1228 wrote to memory of 1140 1228 12A6.exe 12A6.exe PID 1228 wrote to memory of 1140 1228 12A6.exe 12A6.exe PID 1228 wrote to memory of 1140 1228 12A6.exe 12A6.exe PID 1228 wrote to memory of 1140 1228 12A6.exe 12A6.exe PID 1228 wrote to memory of 1140 1228 12A6.exe 12A6.exe PID 1140 wrote to memory of 1700 1140 12A6.exe icacls.exe PID 1140 wrote to memory of 1700 1140 12A6.exe icacls.exe PID 1140 wrote to memory of 1700 1140 12A6.exe icacls.exe PID 1140 wrote to memory of 1700 1140 12A6.exe icacls.exe PID 1140 wrote to memory of 2004 1140 12A6.exe 12A6.exe PID 1140 wrote to memory of 2004 1140 12A6.exe 12A6.exe PID 1140 wrote to memory of 2004 1140 12A6.exe 12A6.exe PID 1140 wrote to memory of 2004 1140 12A6.exe 12A6.exe PID 2004 wrote to memory of 1628 2004 12A6.exe 12A6.exe PID 2004 wrote to memory of 1628 2004 12A6.exe 12A6.exe PID 2004 wrote to memory of 1628 2004 12A6.exe 12A6.exe PID 2004 wrote to memory of 1628 2004 12A6.exe 12A6.exe PID 2004 wrote to memory of 1628 2004 12A6.exe 12A6.exe PID 2004 wrote to memory of 1628 2004 12A6.exe 12A6.exe PID 2004 wrote to memory of 1628 2004 12A6.exe 12A6.exe PID 2004 wrote to memory of 1628 2004 12A6.exe 12A6.exe PID 2004 wrote to memory of 1628 2004 12A6.exe 12A6.exe PID 2004 wrote to memory of 1628 2004 12A6.exe 12A6.exe PID 2004 wrote to memory of 1628 2004 12A6.exe 12A6.exe PID 1628 wrote to memory of 1884 1628 12A6.exe build2.exe PID 1628 wrote to memory of 1884 1628 12A6.exe build2.exe PID 1628 wrote to memory of 1884 1628 12A6.exe build2.exe PID 1628 wrote to memory of 1884 1628 12A6.exe build2.exe PID 1884 wrote to memory of 1604 1884 build2.exe build2.exe PID 1884 wrote to memory of 1604 1884 build2.exe build2.exe PID 1884 wrote to memory of 1604 1884 build2.exe build2.exe PID 1884 wrote to memory of 1604 1884 build2.exe build2.exe PID 1884 wrote to memory of 1604 1884 build2.exe build2.exe PID 1884 wrote to memory of 1604 1884 build2.exe build2.exe PID 1884 wrote to memory of 1604 1884 build2.exe build2.exe PID 1884 wrote to memory of 1604 1884 build2.exe build2.exe PID 1884 wrote to memory of 1604 1884 build2.exe build2.exe PID 1628 wrote to memory of 828 1628 12A6.exe build3.exe PID 1628 wrote to memory of 828 1628 12A6.exe build3.exe PID 1628 wrote to memory of 828 1628 12A6.exe build3.exe PID 1628 wrote to memory of 828 1628 12A6.exe build3.exe PID 828 wrote to memory of 1136 828 build3.exe build3.exe PID 828 wrote to memory of 1136 828 build3.exe build3.exe PID 828 wrote to memory of 1136 828 build3.exe build3.exe PID 828 wrote to memory of 1136 828 build3.exe build3.exe PID 828 wrote to memory of 1136 828 build3.exe build3.exe PID 828 wrote to memory of 1136 828 build3.exe build3.exe PID 828 wrote to memory of 1136 828 build3.exe build3.exe PID 828 wrote to memory of 1136 828 build3.exe build3.exe PID 828 wrote to memory of 1136 828 build3.exe build3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2.exe"C:\Users\Admin\AppData\Local\Temp\f6e8f13adceaaac1b6e35e41b0f2442bbd9e11288895b4fe9b40b0f97b83d7e2.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1072
-
C:\Users\Admin\AppData\Local\Temp\12A6.exeC:\Users\Admin\AppData\Local\Temp\12A6.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\12A6.exeC:\Users\Admin\AppData\Local\Temp\12A6.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\1c9932ba-fef3-43d0-9339-48fd154502c2" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\12A6.exe"C:\Users\Admin\AppData\Local\Temp\12A6.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\12A6.exe"C:\Users\Admin\AppData\Local\Temp\12A6.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\d9730b58-f77b-4d95-bcac-0cda1c319f62\build2.exe"C:\Users\Admin\AppData\Local\d9730b58-f77b-4d95-bcac-0cda1c319f62\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\d9730b58-f77b-4d95-bcac-0cda1c319f62\build2.exe"C:\Users\Admin\AppData\Local\d9730b58-f77b-4d95-bcac-0cda1c319f62\build2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1604 -
C:\Users\Admin\AppData\Local\d9730b58-f77b-4d95-bcac-0cda1c319f62\build3.exe"C:\Users\Admin\AppData\Local\d9730b58-f77b-4d95-bcac-0cda1c319f62\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\d9730b58-f77b-4d95-bcac-0cda1c319f62\build3.exe"C:\Users\Admin\AppData\Local\d9730b58-f77b-4d95-bcac-0cda1c319f62\build3.exe"6⤵
- Executes dropped EXE
PID:1136 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:1304
-
C:\Users\Admin\AppData\Local\Temp\166F.exeC:\Users\Admin\AppData\Local\Temp\166F.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
MD5963d1db9f126c1eb996607fb3eb2597f
SHA16c5081d894644e99f3839cad4b5464b82e2c1576
SHA256a4d77d674dff77c53515cd14631449b33ae373296f58ed62d38bc4cb3a2b2866
SHA51213ada4d9774bc9771421257d43ab462fd1418dc49d1523ef025e1677af243fb095265d30666faac23d5534fdcddc60b9c52fee92bd2f3f09fe04f222dbca669f
-
MD5
2902de11e30dcc620b184e3bb0f0c1cb
SHA15d11d14a2558801a2688dc2d6dfad39ac294f222
SHA256e6a7f1f8810e46a736e80ee5ac6187690f28f4d5d35d130d410e20084b2c1544
SHA512efd415cde25b827ac2a7ca4d6486ce3a43cdcc1c31d3a94fd7944681aa3e83a4966625bf2e6770581c4b59d05e35ff9318d9adaddade9070f131076892af2fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD546e56db83743835a5a523c0714070a87
SHA128e43123d05c08d45f60164246d4c98b084c3891
SHA256f48d883230e3d4b59b4c63cfa18546e971222852fd4dffc78de373c7ccfc3a10
SHA512f8c6b87a711a31adba9029def9b9023f5d3ae50f3992e9a843c23844c8d612fd84a5dac987c47c06386a2a46e9d15efea097b3a7b965d6f75102d9daef72c22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
MD5dc1a829b183507ea12fae48522d8e1aa
SHA1575f82c323162adbb6f600a31ac9e8b4c825f92d
SHA25693f4005ae82768aea556dad31ca62a411df8dee87f2b032c12a91055fc887b70
SHA512da54bca42a308486be2dc5f7332faaf681cb9e4838b6410fc385d86e4d6a205d0c0678bdc391c2579ae2734f6dd487060b0d9aa71344d41f09c9ef9c1a5809cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
MD50eef0c193657fefd13b12fa57d802ffb
SHA191e2d8b3ea79b6db1d1272c12b31081b2bf26a12
SHA2561cab5f719248d3b10beb9771a562410be3060a75cf2549cd4ec3220517482a95
SHA5128174063a6af1f5a3b0f28c1f2d2ccbd34cbf69e84beca8fb2625a668847e5407e81573b4bddff5a04d5908a5788563701b1aff0d79f504cf7cd09d7625c53a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD5068d9dd02c6fc0a5bcc9aa41a5348594
SHA110944f7479f3eaaad6568f7d79b37e1106d6e87f
SHA25644d2af587b91ba05cea7ce6449147b84d9384b04fe08710cb54dd6cf8704b6e5
SHA512d7772e2394bb636799cd8579550662e57a9e912b3323fd1bc5833a92437cf3b38793f691e5604d19fddda1bd554bba6ed544f24203c59c48f826babc16b8bd44
-
MD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
MD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
MD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
MD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
MD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
MD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
MD5
193232121f2548d05f4915cc583fbed6
SHA1b19662c7d6c8618fbc88cb9d67aa9241a64264dc
SHA256ca2714547361d26fbd3908a0a323d4bd34a2901249d1cb2aeb801104f0f88eac
SHA5122a801e59bbe03e73d76bb4560b8eb7780833cdf5970e227ae09cc8c3dbccdd2fc76559fcf63521dbd9baea659040756cd04ce2770536d583e6185c8d92ba8d95
-
MD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
MD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
MD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
MD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
MD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
MD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
MD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
MD5
109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
MD5
7587bf9cb4147022cd5681b015183046
SHA1f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
SHA5120b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f
-
MD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
MD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
MD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
MD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
MD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
MD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
MD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
MD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3