Analysis
-
max time kernel
106s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 19:28
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
226KB
-
MD5
75b4f9883d47a3f05d728a9bf35ea8da
-
SHA1
7cacfa6e2216196754800b9284a4c1d848a3ccb5
-
SHA256
6a59517bc0735d8437978ab13b7993b26ce793a69146341be32fa71180557aa7
-
SHA512
d162c0695b887a64f4c1808c37c467cf98e10b262aa7a110c4ff63440dc23759181887813d64d37e65aed179c59d4da8d054f1d38d8db4b81834a92f567a382f
-
SSDEEP
6144:Vg6JgBicZWiL/2aFxXC9+DatC/NjXZ0yZF+VD+dADM+8:rciye6xM+uyZN6CaI
Malware Config
Extracted
amadey
3.50
31.41.244.17/hfk3vK9/index.php
Extracted
redline
pops
31.41.244.14:4694
-
auth_value
c377eb074ac3f12f85b0ff38d543b16d
Extracted
laplas
clipper.guru
-
api_key
ace492e9661223449782fcc8096dc6ef6289032d08d03a7b0a92179622c35bdb
Extracted
redline
Testing.v1
185.106.92.111:2510
-
auth_value
336be733d6f6d74b812efad48d422273
Signatures
-
Detect Amadey credential stealer module 6 IoCs
Processes:
resource yara_rule behavioral1/memory/884-136-0x00000000000C0000-0x00000000000E4000-memory.dmp amadey_cred_module \Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll amadey_cred_module C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\1000002001\laba.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000002001\laba.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000002001\laba.exe family_redline behavioral1/memory/1056-80-0x0000000000DE0000-0x0000000000E08000-memory.dmp family_redline behavioral1/memory/1120-105-0x0000000002310000-0x000000000234E000-memory.dmp family_redline behavioral1/memory/1120-117-0x0000000004950000-0x000000000498C000-memory.dmp family_redline -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 6 884 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
gntuud.exelaba.exelinda5.exegala.exeanon.exegntuud.exegntuud.exepid process 588 gntuud.exe 1056 laba.exe 1940 linda5.exe 1640 gala.exe 1120 anon.exe 112 gntuud.exe 1564 gntuud.exe -
Loads dropped DLL 18 IoCs
Processes:
file.exegntuud.exerundll32.exerundll32.exerundll32.exepid process 1976 file.exe 1976 file.exe 588 gntuud.exe 588 gntuud.exe 1144 rundll32.exe 1144 rundll32.exe 1144 rundll32.exe 588 gntuud.exe 588 gntuud.exe 588 gntuud.exe 588 gntuud.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 884 rundll32.exe 884 rundll32.exe 884 rundll32.exe 884 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
gntuud.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laba.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000002001\\laba.exe" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\linda5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000003001\\linda5.exe" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gala.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000004001\\gala.exe" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\anon.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\anon.exe" gntuud.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
rundll32.exelaba.exeanon.exepid process 884 rundll32.exe 884 rundll32.exe 884 rundll32.exe 884 rundll32.exe 1056 laba.exe 1120 anon.exe 1120 anon.exe 1056 laba.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
anon.exelaba.exedescription pid process Token: SeDebugPrivilege 1120 anon.exe Token: SeDebugPrivilege 1056 laba.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
file.exegntuud.exelinda5.execontrol.exerundll32.exeRunDll32.exetaskeng.exedescription pid process target process PID 1976 wrote to memory of 588 1976 file.exe gntuud.exe PID 1976 wrote to memory of 588 1976 file.exe gntuud.exe PID 1976 wrote to memory of 588 1976 file.exe gntuud.exe PID 1976 wrote to memory of 588 1976 file.exe gntuud.exe PID 588 wrote to memory of 840 588 gntuud.exe schtasks.exe PID 588 wrote to memory of 840 588 gntuud.exe schtasks.exe PID 588 wrote to memory of 840 588 gntuud.exe schtasks.exe PID 588 wrote to memory of 840 588 gntuud.exe schtasks.exe PID 588 wrote to memory of 1056 588 gntuud.exe laba.exe PID 588 wrote to memory of 1056 588 gntuud.exe laba.exe PID 588 wrote to memory of 1056 588 gntuud.exe laba.exe PID 588 wrote to memory of 1056 588 gntuud.exe laba.exe PID 588 wrote to memory of 1940 588 gntuud.exe linda5.exe PID 588 wrote to memory of 1940 588 gntuud.exe linda5.exe PID 588 wrote to memory of 1940 588 gntuud.exe linda5.exe PID 588 wrote to memory of 1940 588 gntuud.exe linda5.exe PID 1940 wrote to memory of 680 1940 linda5.exe control.exe PID 1940 wrote to memory of 680 1940 linda5.exe control.exe PID 1940 wrote to memory of 680 1940 linda5.exe control.exe PID 1940 wrote to memory of 680 1940 linda5.exe control.exe PID 680 wrote to memory of 1144 680 control.exe rundll32.exe PID 680 wrote to memory of 1144 680 control.exe rundll32.exe PID 680 wrote to memory of 1144 680 control.exe rundll32.exe PID 680 wrote to memory of 1144 680 control.exe rundll32.exe PID 680 wrote to memory of 1144 680 control.exe rundll32.exe PID 680 wrote to memory of 1144 680 control.exe rundll32.exe PID 680 wrote to memory of 1144 680 control.exe rundll32.exe PID 588 wrote to memory of 1640 588 gntuud.exe gala.exe PID 588 wrote to memory of 1640 588 gntuud.exe gala.exe PID 588 wrote to memory of 1640 588 gntuud.exe gala.exe PID 588 wrote to memory of 1640 588 gntuud.exe gala.exe PID 588 wrote to memory of 1120 588 gntuud.exe anon.exe PID 588 wrote to memory of 1120 588 gntuud.exe anon.exe PID 588 wrote to memory of 1120 588 gntuud.exe anon.exe PID 588 wrote to memory of 1120 588 gntuud.exe anon.exe PID 1144 wrote to memory of 1860 1144 rundll32.exe RunDll32.exe PID 1144 wrote to memory of 1860 1144 rundll32.exe RunDll32.exe PID 1144 wrote to memory of 1860 1144 rundll32.exe RunDll32.exe PID 1144 wrote to memory of 1860 1144 rundll32.exe RunDll32.exe PID 1860 wrote to memory of 1672 1860 RunDll32.exe rundll32.exe PID 1860 wrote to memory of 1672 1860 RunDll32.exe rundll32.exe PID 1860 wrote to memory of 1672 1860 RunDll32.exe rundll32.exe PID 1860 wrote to memory of 1672 1860 RunDll32.exe rundll32.exe PID 1860 wrote to memory of 1672 1860 RunDll32.exe rundll32.exe PID 1860 wrote to memory of 1672 1860 RunDll32.exe rundll32.exe PID 1860 wrote to memory of 1672 1860 RunDll32.exe rundll32.exe PID 896 wrote to memory of 112 896 taskeng.exe gntuud.exe PID 896 wrote to memory of 112 896 taskeng.exe gntuud.exe PID 896 wrote to memory of 112 896 taskeng.exe gntuud.exe PID 896 wrote to memory of 112 896 taskeng.exe gntuud.exe PID 588 wrote to memory of 884 588 gntuud.exe rundll32.exe PID 588 wrote to memory of 884 588 gntuud.exe rundll32.exe PID 588 wrote to memory of 884 588 gntuud.exe rundll32.exe PID 588 wrote to memory of 884 588 gntuud.exe rundll32.exe PID 588 wrote to memory of 884 588 gntuud.exe rundll32.exe PID 588 wrote to memory of 884 588 gntuud.exe rundll32.exe PID 588 wrote to memory of 884 588 gntuud.exe rundll32.exe PID 896 wrote to memory of 1564 896 taskeng.exe gntuud.exe PID 896 wrote to memory of 1564 896 taskeng.exe gntuud.exe PID 896 wrote to memory of 1564 896 taskeng.exe gntuud.exe PID 896 wrote to memory of 1564 896 taskeng.exe gntuud.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:840 -
C:\Users\Admin\AppData\Local\Temp\1000002001\laba.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\laba.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\1000003001\linda5.exe"C:\Users\Admin\AppData\Local\Temp\1000003001\linda5.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\bTpGZSE0.Cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\bTpGZSE0.Cpl",5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\bTpGZSE0.Cpl",6⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\bTpGZSE0.Cpl",7⤵
- Loads dropped DLL
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\1000004001\gala.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\gala.exe"3⤵
- Executes dropped EXE
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\1000005001\anon.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\anon.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:884
-
C:\Windows\system32\taskeng.exetaskeng.exe {1955202D-E3C6-4E14-AD80-367BB89159AB} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe2⤵
- Executes dropped EXE
PID:112 -
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe2⤵
- Executes dropped EXE
PID:1564
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD59299834655f07e6896b1ff0b9e92c7b4
SHA1acba1e9262b4aebf020758e30326afdc99c714ad
SHA256fe105a23e4bee42b0401669d6ce9d34dbc7816a6cbef7c7108e11adc3c339257
SHA5127ab23ac1eedb82044946bb9e6afb308580d434be45f3ebd18c5fc90cd98281738e4f50e75a3506315785e60d93e90cc4facc285fe7760985dfe0fd47771bc650
-
Filesize
137KB
MD59299834655f07e6896b1ff0b9e92c7b4
SHA1acba1e9262b4aebf020758e30326afdc99c714ad
SHA256fe105a23e4bee42b0401669d6ce9d34dbc7816a6cbef7c7108e11adc3c339257
SHA5127ab23ac1eedb82044946bb9e6afb308580d434be45f3ebd18c5fc90cd98281738e4f50e75a3506315785e60d93e90cc4facc285fe7760985dfe0fd47771bc650
-
Filesize
1.5MB
MD5680ab121e234c5796f4e4ea2a1b50f5b
SHA16561a4f8d1cbceffe5f8b2e1a606324be7fab01f
SHA256f337779a06e96f06730f591fe62c447fdd9cd75866f5b54f1336fc309374c0c1
SHA51224a2a44f6a4a77f81b42943839c6e2560b358da4ce505620b83c2713171749f8068695987f129120cddebdec3994d5878e29ab69ea0d48436a13d3bc6f46e88b
-
Filesize
1.5MB
MD5680ab121e234c5796f4e4ea2a1b50f5b
SHA16561a4f8d1cbceffe5f8b2e1a606324be7fab01f
SHA256f337779a06e96f06730f591fe62c447fdd9cd75866f5b54f1336fc309374c0c1
SHA51224a2a44f6a4a77f81b42943839c6e2560b358da4ce505620b83c2713171749f8068695987f129120cddebdec3994d5878e29ab69ea0d48436a13d3bc6f46e88b
-
Filesize
4.6MB
MD5f6829a19455a7b24a79e0b984d2a42d9
SHA1c71d657301d721b42c52c0252aa5fe0dbfb04f9f
SHA2567dc8f90673b102c2945e36747763ccccd243519500eca01fd1cfdbbfcb61d61b
SHA512e3d8db3d3938366e9fe8c1645647dbf29bfb5c9a6210f54bdfca05b9782f005b9b40df2a7980f160143c48139a638c5a4ff6b091d0d846a839d363eba94bce4c
-
Filesize
4.6MB
MD5f6829a19455a7b24a79e0b984d2a42d9
SHA1c71d657301d721b42c52c0252aa5fe0dbfb04f9f
SHA2567dc8f90673b102c2945e36747763ccccd243519500eca01fd1cfdbbfcb61d61b
SHA512e3d8db3d3938366e9fe8c1645647dbf29bfb5c9a6210f54bdfca05b9782f005b9b40df2a7980f160143c48139a638c5a4ff6b091d0d846a839d363eba94bce4c
-
Filesize
317KB
MD5d46c47543ab771c8d6bd2d7c9ba853a3
SHA1b339decb0fd779a0a7c192d321aec1017808e28e
SHA2569617d4eefc2c16ff7587d7a85c1f52d23053e02632e9cfc27e0a5eb84486f05c
SHA512e601d8b012d81409005b3b7aa002b2ce4417ae36f0a62f6dba4fdb592f6e730eafb02d1c5adbdc6db800206204b5b30577366e85f8faa3b719ef0dc574917d8f
-
Filesize
226KB
MD575b4f9883d47a3f05d728a9bf35ea8da
SHA17cacfa6e2216196754800b9284a4c1d848a3ccb5
SHA2566a59517bc0735d8437978ab13b7993b26ce793a69146341be32fa71180557aa7
SHA512d162c0695b887a64f4c1808c37c467cf98e10b262aa7a110c4ff63440dc23759181887813d64d37e65aed179c59d4da8d054f1d38d8db4b81834a92f567a382f
-
Filesize
226KB
MD575b4f9883d47a3f05d728a9bf35ea8da
SHA17cacfa6e2216196754800b9284a4c1d848a3ccb5
SHA2566a59517bc0735d8437978ab13b7993b26ce793a69146341be32fa71180557aa7
SHA512d162c0695b887a64f4c1808c37c467cf98e10b262aa7a110c4ff63440dc23759181887813d64d37e65aed179c59d4da8d054f1d38d8db4b81834a92f567a382f
-
Filesize
226KB
MD575b4f9883d47a3f05d728a9bf35ea8da
SHA17cacfa6e2216196754800b9284a4c1d848a3ccb5
SHA2566a59517bc0735d8437978ab13b7993b26ce793a69146341be32fa71180557aa7
SHA512d162c0695b887a64f4c1808c37c467cf98e10b262aa7a110c4ff63440dc23759181887813d64d37e65aed179c59d4da8d054f1d38d8db4b81834a92f567a382f
-
Filesize
226KB
MD575b4f9883d47a3f05d728a9bf35ea8da
SHA17cacfa6e2216196754800b9284a4c1d848a3ccb5
SHA2566a59517bc0735d8437978ab13b7993b26ce793a69146341be32fa71180557aa7
SHA512d162c0695b887a64f4c1808c37c467cf98e10b262aa7a110c4ff63440dc23759181887813d64d37e65aed179c59d4da8d054f1d38d8db4b81834a92f567a382f
-
Filesize
1.8MB
MD5257e5fd4c50e96ebb80c3d7535a11a0f
SHA11da144ae847cd4c9b281c72cf1a2861a90288dba
SHA256161ba3a907bf0de60d7bbd86109b195c0408346ce5f803e5a69d7fb12b1a3853
SHA512bdf8fd413fc5377c24bb47dbbc53c2c337b06155fa27a929326257546b2645feabd2d1d24da7d1a7ff073b73767848c804097acd367b33e40a86414cb27a14f8
-
Filesize
126KB
MD5adbaf286228c46522e50371c4be31a03
SHA1a29d644c4663b2e2b2bd92046ba0df629537c297
SHA256d3e9a3365f73a34e2dd9022a318abcc2c55af98bafb2dc302cbb55f5398bb9a0
SHA51274a55cc8d8c3af54e5ba290a34b968918da994ea2d55b5f0d1f39e83cb9a39d73226227933c760b48f2e0bdb646f8243967517ef8202e02d88411d2d19ae217d
-
Filesize
137KB
MD59299834655f07e6896b1ff0b9e92c7b4
SHA1acba1e9262b4aebf020758e30326afdc99c714ad
SHA256fe105a23e4bee42b0401669d6ce9d34dbc7816a6cbef7c7108e11adc3c339257
SHA5127ab23ac1eedb82044946bb9e6afb308580d434be45f3ebd18c5fc90cd98281738e4f50e75a3506315785e60d93e90cc4facc285fe7760985dfe0fd47771bc650
-
Filesize
1.5MB
MD5680ab121e234c5796f4e4ea2a1b50f5b
SHA16561a4f8d1cbceffe5f8b2e1a606324be7fab01f
SHA256f337779a06e96f06730f591fe62c447fdd9cd75866f5b54f1336fc309374c0c1
SHA51224a2a44f6a4a77f81b42943839c6e2560b358da4ce505620b83c2713171749f8068695987f129120cddebdec3994d5878e29ab69ea0d48436a13d3bc6f46e88b
-
Filesize
4.6MB
MD5f6829a19455a7b24a79e0b984d2a42d9
SHA1c71d657301d721b42c52c0252aa5fe0dbfb04f9f
SHA2567dc8f90673b102c2945e36747763ccccd243519500eca01fd1cfdbbfcb61d61b
SHA512e3d8db3d3938366e9fe8c1645647dbf29bfb5c9a6210f54bdfca05b9782f005b9b40df2a7980f160143c48139a638c5a4ff6b091d0d846a839d363eba94bce4c
-
Filesize
4.6MB
MD5f6829a19455a7b24a79e0b984d2a42d9
SHA1c71d657301d721b42c52c0252aa5fe0dbfb04f9f
SHA2567dc8f90673b102c2945e36747763ccccd243519500eca01fd1cfdbbfcb61d61b
SHA512e3d8db3d3938366e9fe8c1645647dbf29bfb5c9a6210f54bdfca05b9782f005b9b40df2a7980f160143c48139a638c5a4ff6b091d0d846a839d363eba94bce4c
-
Filesize
317KB
MD5d46c47543ab771c8d6bd2d7c9ba853a3
SHA1b339decb0fd779a0a7c192d321aec1017808e28e
SHA2569617d4eefc2c16ff7587d7a85c1f52d23053e02632e9cfc27e0a5eb84486f05c
SHA512e601d8b012d81409005b3b7aa002b2ce4417ae36f0a62f6dba4fdb592f6e730eafb02d1c5adbdc6db800206204b5b30577366e85f8faa3b719ef0dc574917d8f
-
Filesize
317KB
MD5d46c47543ab771c8d6bd2d7c9ba853a3
SHA1b339decb0fd779a0a7c192d321aec1017808e28e
SHA2569617d4eefc2c16ff7587d7a85c1f52d23053e02632e9cfc27e0a5eb84486f05c
SHA512e601d8b012d81409005b3b7aa002b2ce4417ae36f0a62f6dba4fdb592f6e730eafb02d1c5adbdc6db800206204b5b30577366e85f8faa3b719ef0dc574917d8f
-
Filesize
226KB
MD575b4f9883d47a3f05d728a9bf35ea8da
SHA17cacfa6e2216196754800b9284a4c1d848a3ccb5
SHA2566a59517bc0735d8437978ab13b7993b26ce793a69146341be32fa71180557aa7
SHA512d162c0695b887a64f4c1808c37c467cf98e10b262aa7a110c4ff63440dc23759181887813d64d37e65aed179c59d4da8d054f1d38d8db4b81834a92f567a382f
-
Filesize
226KB
MD575b4f9883d47a3f05d728a9bf35ea8da
SHA17cacfa6e2216196754800b9284a4c1d848a3ccb5
SHA2566a59517bc0735d8437978ab13b7993b26ce793a69146341be32fa71180557aa7
SHA512d162c0695b887a64f4c1808c37c467cf98e10b262aa7a110c4ff63440dc23759181887813d64d37e65aed179c59d4da8d054f1d38d8db4b81834a92f567a382f
-
Filesize
1.8MB
MD5257e5fd4c50e96ebb80c3d7535a11a0f
SHA11da144ae847cd4c9b281c72cf1a2861a90288dba
SHA256161ba3a907bf0de60d7bbd86109b195c0408346ce5f803e5a69d7fb12b1a3853
SHA512bdf8fd413fc5377c24bb47dbbc53c2c337b06155fa27a929326257546b2645feabd2d1d24da7d1a7ff073b73767848c804097acd367b33e40a86414cb27a14f8
-
Filesize
1.8MB
MD5257e5fd4c50e96ebb80c3d7535a11a0f
SHA11da144ae847cd4c9b281c72cf1a2861a90288dba
SHA256161ba3a907bf0de60d7bbd86109b195c0408346ce5f803e5a69d7fb12b1a3853
SHA512bdf8fd413fc5377c24bb47dbbc53c2c337b06155fa27a929326257546b2645feabd2d1d24da7d1a7ff073b73767848c804097acd367b33e40a86414cb27a14f8
-
Filesize
1.8MB
MD5257e5fd4c50e96ebb80c3d7535a11a0f
SHA11da144ae847cd4c9b281c72cf1a2861a90288dba
SHA256161ba3a907bf0de60d7bbd86109b195c0408346ce5f803e5a69d7fb12b1a3853
SHA512bdf8fd413fc5377c24bb47dbbc53c2c337b06155fa27a929326257546b2645feabd2d1d24da7d1a7ff073b73767848c804097acd367b33e40a86414cb27a14f8
-
Filesize
1.8MB
MD5257e5fd4c50e96ebb80c3d7535a11a0f
SHA11da144ae847cd4c9b281c72cf1a2861a90288dba
SHA256161ba3a907bf0de60d7bbd86109b195c0408346ce5f803e5a69d7fb12b1a3853
SHA512bdf8fd413fc5377c24bb47dbbc53c2c337b06155fa27a929326257546b2645feabd2d1d24da7d1a7ff073b73767848c804097acd367b33e40a86414cb27a14f8
-
Filesize
1.8MB
MD5257e5fd4c50e96ebb80c3d7535a11a0f
SHA11da144ae847cd4c9b281c72cf1a2861a90288dba
SHA256161ba3a907bf0de60d7bbd86109b195c0408346ce5f803e5a69d7fb12b1a3853
SHA512bdf8fd413fc5377c24bb47dbbc53c2c337b06155fa27a929326257546b2645feabd2d1d24da7d1a7ff073b73767848c804097acd367b33e40a86414cb27a14f8
-
Filesize
1.8MB
MD5257e5fd4c50e96ebb80c3d7535a11a0f
SHA11da144ae847cd4c9b281c72cf1a2861a90288dba
SHA256161ba3a907bf0de60d7bbd86109b195c0408346ce5f803e5a69d7fb12b1a3853
SHA512bdf8fd413fc5377c24bb47dbbc53c2c337b06155fa27a929326257546b2645feabd2d1d24da7d1a7ff073b73767848c804097acd367b33e40a86414cb27a14f8
-
Filesize
126KB
MD5adbaf286228c46522e50371c4be31a03
SHA1a29d644c4663b2e2b2bd92046ba0df629537c297
SHA256d3e9a3365f73a34e2dd9022a318abcc2c55af98bafb2dc302cbb55f5398bb9a0
SHA51274a55cc8d8c3af54e5ba290a34b968918da994ea2d55b5f0d1f39e83cb9a39d73226227933c760b48f2e0bdb646f8243967517ef8202e02d88411d2d19ae217d
-
Filesize
126KB
MD5adbaf286228c46522e50371c4be31a03
SHA1a29d644c4663b2e2b2bd92046ba0df629537c297
SHA256d3e9a3365f73a34e2dd9022a318abcc2c55af98bafb2dc302cbb55f5398bb9a0
SHA51274a55cc8d8c3af54e5ba290a34b968918da994ea2d55b5f0d1f39e83cb9a39d73226227933c760b48f2e0bdb646f8243967517ef8202e02d88411d2d19ae217d
-
Filesize
126KB
MD5adbaf286228c46522e50371c4be31a03
SHA1a29d644c4663b2e2b2bd92046ba0df629537c297
SHA256d3e9a3365f73a34e2dd9022a318abcc2c55af98bafb2dc302cbb55f5398bb9a0
SHA51274a55cc8d8c3af54e5ba290a34b968918da994ea2d55b5f0d1f39e83cb9a39d73226227933c760b48f2e0bdb646f8243967517ef8202e02d88411d2d19ae217d
-
Filesize
126KB
MD5adbaf286228c46522e50371c4be31a03
SHA1a29d644c4663b2e2b2bd92046ba0df629537c297
SHA256d3e9a3365f73a34e2dd9022a318abcc2c55af98bafb2dc302cbb55f5398bb9a0
SHA51274a55cc8d8c3af54e5ba290a34b968918da994ea2d55b5f0d1f39e83cb9a39d73226227933c760b48f2e0bdb646f8243967517ef8202e02d88411d2d19ae217d