Analysis
-
max time kernel
164s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 16:52
Static task
static1
Behavioral task
behavioral1
Sample
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe
Resource
win7-20221111-en
General
-
Target
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe
-
Size
244KB
-
MD5
529dd7d863272e41eb4e8319861ac846
-
SHA1
3efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
-
SHA256
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
-
SHA512
89892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
SSDEEP
6144:wuTL+CSPjWEbvxm4XHLNOcWPfJnj7zIo3B2:wuT7SP/bvYE51WPfVjwIB2
Malware Config
Extracted
amadey
3.50
193.56.146.174/g84kvj4jck/index.php
Extracted
vidar
55.7
1829
https://t.me/deadftx
https://www.tiktok.com/@user6068972597711
-
profile_id
1829
Extracted
redline
novr
31.41.244.14:4694
-
auth_value
34ddf4eb9326256f20a48cd5f1e9b496
Extracted
redline
45.138.74.121:80
-
auth_value
36460b59063b2ac8535ad35f0861e6d9
Extracted
redline
@REDLINEVIP Cloud (TG: @FATHEROFCARDERS)
151.80.89.233:13553
-
auth_value
fbee175162920530e6bf470c8003fa1a
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 12 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\1000192001\lada.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000192001\lada.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000192001\lada.exe family_redline behavioral1/memory/1580-124-0x0000000000380000-0x00000000003A8000-memory.dmp family_redline behavioral1/memory/42580-155-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/42580-160-0x00000000004227CE-mapping.dmp family_redline behavioral1/memory/42580-163-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/42580-164-0x0000000000400000-0x0000000000428000-memory.dmp family_redline \Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exe family_redline behavioral1/memory/42752-176-0x0000000001300000-0x0000000001328000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exe family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
mao.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mao.exe -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
Processes:
rovwer.exemao.exerovwer.exelinda5.exelada.exe20k.exe@tag123123_crypted.exe5239890474.exe40Kdfdf.exerovwer.exepid process 1868 rovwer.exe 1768 mao.exe 1064 rovwer.exe 572 linda5.exe 1580 lada.exe 1652 20k.exe 2012 @tag123123_crypted.exe 42436 5239890474.exe 42752 40Kdfdf.exe 42744 rovwer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
mao.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mao.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mao.exe -
Loads dropped DLL 23 IoCs
Processes:
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exerovwer.exe20k.exerundll32.exemao.exeWerFault.exerundll32.exepid process 1728 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe 1728 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe 1868 rovwer.exe 1868 rovwer.exe 1868 rovwer.exe 1868 rovwer.exe 1652 20k.exe 608 rundll32.exe 608 rundll32.exe 608 rundll32.exe 1652 20k.exe 1652 20k.exe 1768 mao.exe 1768 mao.exe 42644 WerFault.exe 42644 WerFault.exe 42644 WerFault.exe 42644 WerFault.exe 1868 rovwer.exe 42644 WerFault.exe 42860 rundll32.exe 42860 rundll32.exe 42860 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
rovwer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mao.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000174001\\mao.exe" rovwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\lada.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000192001\\lada.exe" rovwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\40Kdfdf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000199001\\40Kdfdf.exe" rovwer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
mao.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mao.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
mao.exepid process 1768 mao.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
@tag123123_crypted.exedescription pid process target process PID 2012 set thread context of 42580 2012 @tag123123_crypted.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 42644 2012 WerFault.exe @tag123123_crypted.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
mao.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mao.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mao.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 42940 timeout.exe -
Processes:
mao.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 mao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 mao.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
mao.exelada.exevbc.exe40Kdfdf.exepid process 1768 mao.exe 1768 mao.exe 1580 lada.exe 1580 lada.exe 42580 vbc.exe 42580 vbc.exe 42752 40Kdfdf.exe 42752 40Kdfdf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vbc.exelada.exe40Kdfdf.exedescription pid process Token: SeDebugPrivilege 42580 vbc.exe Token: SeDebugPrivilege 1580 lada.exe Token: SeDebugPrivilege 42752 40Kdfdf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exerovwer.execmd.exetaskeng.exelinda5.exe20k.exedescription pid process target process PID 1728 wrote to memory of 1868 1728 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe rovwer.exe PID 1728 wrote to memory of 1868 1728 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe rovwer.exe PID 1728 wrote to memory of 1868 1728 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe rovwer.exe PID 1728 wrote to memory of 1868 1728 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe rovwer.exe PID 1868 wrote to memory of 1292 1868 rovwer.exe schtasks.exe PID 1868 wrote to memory of 1292 1868 rovwer.exe schtasks.exe PID 1868 wrote to memory of 1292 1868 rovwer.exe schtasks.exe PID 1868 wrote to memory of 1292 1868 rovwer.exe schtasks.exe PID 1868 wrote to memory of 788 1868 rovwer.exe cmd.exe PID 1868 wrote to memory of 788 1868 rovwer.exe cmd.exe PID 1868 wrote to memory of 788 1868 rovwer.exe cmd.exe PID 1868 wrote to memory of 788 1868 rovwer.exe cmd.exe PID 788 wrote to memory of 272 788 cmd.exe cmd.exe PID 788 wrote to memory of 272 788 cmd.exe cmd.exe PID 788 wrote to memory of 272 788 cmd.exe cmd.exe PID 788 wrote to memory of 272 788 cmd.exe cmd.exe PID 788 wrote to memory of 1772 788 cmd.exe cacls.exe PID 788 wrote to memory of 1772 788 cmd.exe cacls.exe PID 788 wrote to memory of 1772 788 cmd.exe cacls.exe PID 788 wrote to memory of 1772 788 cmd.exe cacls.exe PID 788 wrote to memory of 1528 788 cmd.exe cacls.exe PID 788 wrote to memory of 1528 788 cmd.exe cacls.exe PID 788 wrote to memory of 1528 788 cmd.exe cacls.exe PID 788 wrote to memory of 1528 788 cmd.exe cacls.exe PID 788 wrote to memory of 1284 788 cmd.exe cmd.exe PID 788 wrote to memory of 1284 788 cmd.exe cmd.exe PID 788 wrote to memory of 1284 788 cmd.exe cmd.exe PID 788 wrote to memory of 1284 788 cmd.exe cmd.exe PID 788 wrote to memory of 1172 788 cmd.exe cacls.exe PID 788 wrote to memory of 1172 788 cmd.exe cacls.exe PID 788 wrote to memory of 1172 788 cmd.exe cacls.exe PID 788 wrote to memory of 1172 788 cmd.exe cacls.exe PID 788 wrote to memory of 1564 788 cmd.exe cacls.exe PID 788 wrote to memory of 1564 788 cmd.exe cacls.exe PID 788 wrote to memory of 1564 788 cmd.exe cacls.exe PID 788 wrote to memory of 1564 788 cmd.exe cacls.exe PID 1868 wrote to memory of 1768 1868 rovwer.exe mao.exe PID 1868 wrote to memory of 1768 1868 rovwer.exe mao.exe PID 1868 wrote to memory of 1768 1868 rovwer.exe mao.exe PID 1868 wrote to memory of 1768 1868 rovwer.exe mao.exe PID 1608 wrote to memory of 1064 1608 taskeng.exe rovwer.exe PID 1608 wrote to memory of 1064 1608 taskeng.exe rovwer.exe PID 1608 wrote to memory of 1064 1608 taskeng.exe rovwer.exe PID 1608 wrote to memory of 1064 1608 taskeng.exe rovwer.exe PID 1868 wrote to memory of 572 1868 rovwer.exe linda5.exe PID 1868 wrote to memory of 572 1868 rovwer.exe linda5.exe PID 1868 wrote to memory of 572 1868 rovwer.exe linda5.exe PID 1868 wrote to memory of 572 1868 rovwer.exe linda5.exe PID 1868 wrote to memory of 1580 1868 rovwer.exe lada.exe PID 1868 wrote to memory of 1580 1868 rovwer.exe lada.exe PID 1868 wrote to memory of 1580 1868 rovwer.exe lada.exe PID 1868 wrote to memory of 1580 1868 rovwer.exe lada.exe PID 1868 wrote to memory of 1652 1868 rovwer.exe 20k.exe PID 1868 wrote to memory of 1652 1868 rovwer.exe 20k.exe PID 1868 wrote to memory of 1652 1868 rovwer.exe 20k.exe PID 1868 wrote to memory of 1652 1868 rovwer.exe 20k.exe PID 572 wrote to memory of 1504 572 linda5.exe control.exe PID 572 wrote to memory of 1504 572 linda5.exe control.exe PID 572 wrote to memory of 1504 572 linda5.exe control.exe PID 572 wrote to memory of 1504 572 linda5.exe control.exe PID 1652 wrote to memory of 2012 1652 20k.exe @tag123123_crypted.exe PID 1652 wrote to memory of 2012 1652 20k.exe @tag123123_crypted.exe PID 1652 wrote to memory of 2012 1652 20k.exe @tag123123_crypted.exe PID 1652 wrote to memory of 2012 1652 20k.exe @tag123123_crypted.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe"C:\Users\Admin\AppData\Local\Temp\3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:1292
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:272
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:N"4⤵PID:1772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:R" /E4⤵PID:1528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1284
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:N"4⤵PID:1172
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:R" /E4⤵PID:1564
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000174001\mao.exe"C:\Users\Admin\AppData\Local\Temp\1000174001\mao.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1000174001\mao.exe" & exit4⤵PID:42900
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:42940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000184001\linda5.exe"C:\Users\Admin\AppData\Local\Temp\1000184001\linda5.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\Sb9igBQ.CPL",4⤵PID:1504
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Sb9igBQ.CPL",5⤵
- Loads dropped DLL
PID:608 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Sb9igBQ.CPL",6⤵PID:42848
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\Sb9igBQ.CPL",7⤵
- Loads dropped DLL
PID:42860
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000192001\lada.exe"C:\Users\Admin\AppData\Local\Temp\1000192001\lada.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\1000187001\20k.exe"C:\Users\Admin\AppData\Local\Temp\1000187001\20k.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Roaming\@tag123123_crypted.exeC:\Users\Admin\AppData\Roaming\@tag123123_crypted.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:42580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 408325⤵
- Loads dropped DLL
- Program crash
PID:42644
-
-
-
C:\Users\Admin\AppData\Roaming\5239890474.exeC:\Users\Admin\AppData\Roaming\5239890474.exe4⤵
- Executes dropped EXE
PID:42436 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Roaming\5239890474.exe5⤵PID:42632
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 06⤵PID:42696
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exe"C:\Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:42752
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C005B409-92F4-4C39-8B24-099ABAEBC41B} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe2⤵
- Executes dropped EXE
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe2⤵
- Executes dropped EXE
PID:42744
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573b75455b475eb1b7d1e1fa3b14ae4cf
SHA1cf8678aef9ef9574defb171d50c7df72ee2fc695
SHA256542f6bc920df4ec7e42cda8fe5e9fdc9815512e3dee45d6900c283e327ad70f0
SHA5126edb93092db076d1e8ba6c1899c4ef51ba5ea1da8695583f05fae77a45b93d8100948d484cb21468cb29730f9c68e16f58a0284a02bb90686ff07a63330208cd
-
Filesize
2.7MB
MD57803876440d7a0ea73e4dd883911142b
SHA1e91991cbe6f1b9037d2912db41313f7186cfa20f
SHA256f763556b253fa22454cdc3e21f288cfcf360c4938b14258ee00e9a3c0e39ae17
SHA5127746e555a437292b6055bf87d518b14ac995cc95d40a61d580df1deab1e42e966bcc395535b473fd46a14f16945ca6cd0ef94145bcb37763fc944693965f0140
-
Filesize
2.7MB
MD57803876440d7a0ea73e4dd883911142b
SHA1e91991cbe6f1b9037d2912db41313f7186cfa20f
SHA256f763556b253fa22454cdc3e21f288cfcf360c4938b14258ee00e9a3c0e39ae17
SHA5127746e555a437292b6055bf87d518b14ac995cc95d40a61d580df1deab1e42e966bcc395535b473fd46a14f16945ca6cd0ef94145bcb37763fc944693965f0140
-
Filesize
2.0MB
MD5313a062271c1cedd92e488036f2296d9
SHA1df97fe2e55021dbf59d181d10fbd482e9c925f3e
SHA256d90c57c9c10ea665e9e20a86c6d8125b7f24555ce4fa468360cc5943f4b4c18b
SHA5123b34f44829352386ae80870bef9545c5c541b55e3297a75b3303b4ce6e049a99a109a1a844fb48325988c0e569ef69a8ce8ebfab5a31dc66fec6eeabb960fe29
-
Filesize
2.0MB
MD5313a062271c1cedd92e488036f2296d9
SHA1df97fe2e55021dbf59d181d10fbd482e9c925f3e
SHA256d90c57c9c10ea665e9e20a86c6d8125b7f24555ce4fa468360cc5943f4b4c18b
SHA5123b34f44829352386ae80870bef9545c5c541b55e3297a75b3303b4ce6e049a99a109a1a844fb48325988c0e569ef69a8ce8ebfab5a31dc66fec6eeabb960fe29
-
Filesize
3.4MB
MD59031c3e9f21b7cf62af4c6e7260b7d3d
SHA1507bacea45d88d14dbf069cbc818aa77198ffcff
SHA256efbaac9a7e848ae4e3f57c8c9352e2fd87a0e98551f275b6be51eee59c703793
SHA51215569551b752320b64176c3cfc4201b09b85b43ec6a6f3f62a189bbcf2c9c85025edc5e4b107d8be00009825b1c8669520dc3c504a2cbc9a791d386428c91ed1
-
Filesize
3.4MB
MD59031c3e9f21b7cf62af4c6e7260b7d3d
SHA1507bacea45d88d14dbf069cbc818aa77198ffcff
SHA256efbaac9a7e848ae4e3f57c8c9352e2fd87a0e98551f275b6be51eee59c703793
SHA51215569551b752320b64176c3cfc4201b09b85b43ec6a6f3f62a189bbcf2c9c85025edc5e4b107d8be00009825b1c8669520dc3c504a2cbc9a791d386428c91ed1
-
Filesize
137KB
MD5bae3fb566c191522bab2bde67c482767
SHA17da8b30a638ff9f943cf03b32a4f254273990708
SHA2563ed2170e83cce59a98471509fb4a84090f2ddcb38549a191663d5fbd05612e01
SHA512f9859aba46d440df5dd10059a95708acdd45cca36339867ee654c271f4bb065f6c58005eadadc9a954c35078986402d2f379d5cf3c10484c603ae262d38e1f46
-
Filesize
137KB
MD5bae3fb566c191522bab2bde67c482767
SHA17da8b30a638ff9f943cf03b32a4f254273990708
SHA2563ed2170e83cce59a98471509fb4a84090f2ddcb38549a191663d5fbd05612e01
SHA512f9859aba46d440df5dd10059a95708acdd45cca36339867ee654c271f4bb065f6c58005eadadc9a954c35078986402d2f379d5cf3c10484c603ae262d38e1f46
-
Filesize
137KB
MD587ef06885fd221a86bba9e5b86a7ea7d
SHA16644db86f2d557167f442a5fe72a82de3fe943ba
SHA256ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f
SHA512c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0
-
Filesize
137KB
MD587ef06885fd221a86bba9e5b86a7ea7d
SHA16644db86f2d557167f442a5fe72a82de3fe943ba
SHA256ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f
SHA512c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
1.7MB
MD563af264ba5eebe084947c753bfbddccc
SHA1cb287c79c5a90fc3ce72c81c3aa1683f0d910de5
SHA25622fbddcd8d7a6190aebc29219a81bfe8f1ba6e4ab216761557ad2caaca71925d
SHA512dbc8bc8cec6b85ac78548c06451bef22425791fada5788db467903d77d7a86b7dc86872bc6957187b323fd6cfbaa1b2e4f22dd14ec92de6bb2167e830fe5d322
-
Filesize
7.4MB
MD57231349e4c175b73a002c684bd8a3d0f
SHA1a01d9fab5e0a37b169d94872d46ddb399bf9f6e4
SHA25611e30da908b0558f5cf1e206bf0632144c3022eb8b356087f58fca2a81e9492d
SHA512695a32ff03e27e8710bf293989cc8b885e017200b65a96ad359f6b1da1c2a163d399f937433886a2d7f5b908dad02d0ca3481faa5b3315e4e21eda11d02da7b9
-
Filesize
294KB
MD5c7f66d3ee80feafa254d4eb8d2c9e315
SHA1e15387a60f2a3406c61a5888f6bc77c958de6a53
SHA25645c54db5096e1815a9b4271b9c127ae87074336c12fdb7b812ae6e741e661d35
SHA512b7ff08113154be0798202ad77795a05295ab6431646c41ce38df31afb3de8e3db0be16f320bdd1c073bb6e14ca7a85f8c6653acb0a97a0b6b793d5dc770a4bf7
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2.7MB
MD57803876440d7a0ea73e4dd883911142b
SHA1e91991cbe6f1b9037d2912db41313f7186cfa20f
SHA256f763556b253fa22454cdc3e21f288cfcf360c4938b14258ee00e9a3c0e39ae17
SHA5127746e555a437292b6055bf87d518b14ac995cc95d40a61d580df1deab1e42e966bcc395535b473fd46a14f16945ca6cd0ef94145bcb37763fc944693965f0140
-
Filesize
2.0MB
MD5313a062271c1cedd92e488036f2296d9
SHA1df97fe2e55021dbf59d181d10fbd482e9c925f3e
SHA256d90c57c9c10ea665e9e20a86c6d8125b7f24555ce4fa468360cc5943f4b4c18b
SHA5123b34f44829352386ae80870bef9545c5c541b55e3297a75b3303b4ce6e049a99a109a1a844fb48325988c0e569ef69a8ce8ebfab5a31dc66fec6eeabb960fe29
-
Filesize
3.4MB
MD59031c3e9f21b7cf62af4c6e7260b7d3d
SHA1507bacea45d88d14dbf069cbc818aa77198ffcff
SHA256efbaac9a7e848ae4e3f57c8c9352e2fd87a0e98551f275b6be51eee59c703793
SHA51215569551b752320b64176c3cfc4201b09b85b43ec6a6f3f62a189bbcf2c9c85025edc5e4b107d8be00009825b1c8669520dc3c504a2cbc9a791d386428c91ed1
-
Filesize
137KB
MD5bae3fb566c191522bab2bde67c482767
SHA17da8b30a638ff9f943cf03b32a4f254273990708
SHA2563ed2170e83cce59a98471509fb4a84090f2ddcb38549a191663d5fbd05612e01
SHA512f9859aba46d440df5dd10059a95708acdd45cca36339867ee654c271f4bb065f6c58005eadadc9a954c35078986402d2f379d5cf3c10484c603ae262d38e1f46
-
Filesize
137KB
MD587ef06885fd221a86bba9e5b86a7ea7d
SHA16644db86f2d557167f442a5fe72a82de3fe943ba
SHA256ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f
SHA512c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
1.7MB
MD563af264ba5eebe084947c753bfbddccc
SHA1cb287c79c5a90fc3ce72c81c3aa1683f0d910de5
SHA25622fbddcd8d7a6190aebc29219a81bfe8f1ba6e4ab216761557ad2caaca71925d
SHA512dbc8bc8cec6b85ac78548c06451bef22425791fada5788db467903d77d7a86b7dc86872bc6957187b323fd6cfbaa1b2e4f22dd14ec92de6bb2167e830fe5d322
-
Filesize
1.7MB
MD563af264ba5eebe084947c753bfbddccc
SHA1cb287c79c5a90fc3ce72c81c3aa1683f0d910de5
SHA25622fbddcd8d7a6190aebc29219a81bfe8f1ba6e4ab216761557ad2caaca71925d
SHA512dbc8bc8cec6b85ac78548c06451bef22425791fada5788db467903d77d7a86b7dc86872bc6957187b323fd6cfbaa1b2e4f22dd14ec92de6bb2167e830fe5d322
-
Filesize
1.7MB
MD563af264ba5eebe084947c753bfbddccc
SHA1cb287c79c5a90fc3ce72c81c3aa1683f0d910de5
SHA25622fbddcd8d7a6190aebc29219a81bfe8f1ba6e4ab216761557ad2caaca71925d
SHA512dbc8bc8cec6b85ac78548c06451bef22425791fada5788db467903d77d7a86b7dc86872bc6957187b323fd6cfbaa1b2e4f22dd14ec92de6bb2167e830fe5d322
-
Filesize
1.7MB
MD563af264ba5eebe084947c753bfbddccc
SHA1cb287c79c5a90fc3ce72c81c3aa1683f0d910de5
SHA25622fbddcd8d7a6190aebc29219a81bfe8f1ba6e4ab216761557ad2caaca71925d
SHA512dbc8bc8cec6b85ac78548c06451bef22425791fada5788db467903d77d7a86b7dc86872bc6957187b323fd6cfbaa1b2e4f22dd14ec92de6bb2167e830fe5d322
-
Filesize
1.7MB
MD563af264ba5eebe084947c753bfbddccc
SHA1cb287c79c5a90fc3ce72c81c3aa1683f0d910de5
SHA25622fbddcd8d7a6190aebc29219a81bfe8f1ba6e4ab216761557ad2caaca71925d
SHA512dbc8bc8cec6b85ac78548c06451bef22425791fada5788db467903d77d7a86b7dc86872bc6957187b323fd6cfbaa1b2e4f22dd14ec92de6bb2167e830fe5d322
-
Filesize
1.7MB
MD563af264ba5eebe084947c753bfbddccc
SHA1cb287c79c5a90fc3ce72c81c3aa1683f0d910de5
SHA25622fbddcd8d7a6190aebc29219a81bfe8f1ba6e4ab216761557ad2caaca71925d
SHA512dbc8bc8cec6b85ac78548c06451bef22425791fada5788db467903d77d7a86b7dc86872bc6957187b323fd6cfbaa1b2e4f22dd14ec92de6bb2167e830fe5d322
-
Filesize
7.4MB
MD57231349e4c175b73a002c684bd8a3d0f
SHA1a01d9fab5e0a37b169d94872d46ddb399bf9f6e4
SHA25611e30da908b0558f5cf1e206bf0632144c3022eb8b356087f58fca2a81e9492d
SHA512695a32ff03e27e8710bf293989cc8b885e017200b65a96ad359f6b1da1c2a163d399f937433886a2d7f5b908dad02d0ca3481faa5b3315e4e21eda11d02da7b9
-
Filesize
7.4MB
MD57231349e4c175b73a002c684bd8a3d0f
SHA1a01d9fab5e0a37b169d94872d46ddb399bf9f6e4
SHA25611e30da908b0558f5cf1e206bf0632144c3022eb8b356087f58fca2a81e9492d
SHA512695a32ff03e27e8710bf293989cc8b885e017200b65a96ad359f6b1da1c2a163d399f937433886a2d7f5b908dad02d0ca3481faa5b3315e4e21eda11d02da7b9
-
Filesize
294KB
MD5c7f66d3ee80feafa254d4eb8d2c9e315
SHA1e15387a60f2a3406c61a5888f6bc77c958de6a53
SHA25645c54db5096e1815a9b4271b9c127ae87074336c12fdb7b812ae6e741e661d35
SHA512b7ff08113154be0798202ad77795a05295ab6431646c41ce38df31afb3de8e3db0be16f320bdd1c073bb6e14ca7a85f8c6653acb0a97a0b6b793d5dc770a4bf7
-
Filesize
294KB
MD5c7f66d3ee80feafa254d4eb8d2c9e315
SHA1e15387a60f2a3406c61a5888f6bc77c958de6a53
SHA25645c54db5096e1815a9b4271b9c127ae87074336c12fdb7b812ae6e741e661d35
SHA512b7ff08113154be0798202ad77795a05295ab6431646c41ce38df31afb3de8e3db0be16f320bdd1c073bb6e14ca7a85f8c6653acb0a97a0b6b793d5dc770a4bf7
-
Filesize
294KB
MD5c7f66d3ee80feafa254d4eb8d2c9e315
SHA1e15387a60f2a3406c61a5888f6bc77c958de6a53
SHA25645c54db5096e1815a9b4271b9c127ae87074336c12fdb7b812ae6e741e661d35
SHA512b7ff08113154be0798202ad77795a05295ab6431646c41ce38df31afb3de8e3db0be16f320bdd1c073bb6e14ca7a85f8c6653acb0a97a0b6b793d5dc770a4bf7
-
Filesize
294KB
MD5c7f66d3ee80feafa254d4eb8d2c9e315
SHA1e15387a60f2a3406c61a5888f6bc77c958de6a53
SHA25645c54db5096e1815a9b4271b9c127ae87074336c12fdb7b812ae6e741e661d35
SHA512b7ff08113154be0798202ad77795a05295ab6431646c41ce38df31afb3de8e3db0be16f320bdd1c073bb6e14ca7a85f8c6653acb0a97a0b6b793d5dc770a4bf7
-
Filesize
294KB
MD5c7f66d3ee80feafa254d4eb8d2c9e315
SHA1e15387a60f2a3406c61a5888f6bc77c958de6a53
SHA25645c54db5096e1815a9b4271b9c127ae87074336c12fdb7b812ae6e741e661d35
SHA512b7ff08113154be0798202ad77795a05295ab6431646c41ce38df31afb3de8e3db0be16f320bdd1c073bb6e14ca7a85f8c6653acb0a97a0b6b793d5dc770a4bf7
-
Filesize
294KB
MD5c7f66d3ee80feafa254d4eb8d2c9e315
SHA1e15387a60f2a3406c61a5888f6bc77c958de6a53
SHA25645c54db5096e1815a9b4271b9c127ae87074336c12fdb7b812ae6e741e661d35
SHA512b7ff08113154be0798202ad77795a05295ab6431646c41ce38df31afb3de8e3db0be16f320bdd1c073bb6e14ca7a85f8c6653acb0a97a0b6b793d5dc770a4bf7