Analysis
-
max time kernel
163s -
max time network
220s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 19:54
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
415KB
-
MD5
70cd594f87a878654fd368101f377ff2
-
SHA1
a16ad597765ba4d92f8e5be733cbffc618abffe8
-
SHA256
ea4612578a49d01cde8383c01738edae7d04af2a5994937f3ab9791b853129fa
-
SHA512
eddc50dfb47f4e78315a7b94380e2e9367611c683a41f4e3284c5d31739928d30fa3a0c992aee3dce11f4444e6ec5db6d46f0359df5458f55285967462b15e2c
-
SSDEEP
6144:wTCEZKDLbCwKhuf0aPe5nkI+7jaRDro59t34aU4WcoBlCcg0n2+aV:wT1ZM3CwKQ8aPe5k17ja1stoJcWC/+
Malware Config
Extracted
amadey
3.50
62.204.41.6/p9cWxH/index.php
Extracted
redline
new2811
jamesmillion.xyz:15772
-
auth_value
86a08d2c48d5c5db0c9cb371fb180937
Signatures
-
Detect Amadey credential stealer module 5 IoCs
resource yara_rule behavioral1/files/0x0008000000012333-99.dat amadey_cred_module behavioral1/files/0x0008000000012333-103.dat amadey_cred_module behavioral1/files/0x0008000000012333-102.dat amadey_cred_module behavioral1/files/0x0008000000012333-101.dat amadey_cred_module behavioral1/files/0x0008000000012333-100.dat amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 17 1808 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 1028 gntuud.exe 924 5jk29l2fg.exe 2020 linda5.exe 1916 gntuud.exe -
Loads dropped DLL 20 IoCs
pid Process 1496 file.exe 1496 file.exe 1028 gntuud.exe 1028 gntuud.exe 240 WerFault.exe 240 WerFault.exe 240 WerFault.exe 1028 gntuud.exe 1808 rundll32.exe 1808 rundll32.exe 1808 rundll32.exe 1808 rundll32.exe 832 rundll32.exe 832 rundll32.exe 832 rundll32.exe 832 rundll32.exe 1008 rundll32.exe 1008 rundll32.exe 1008 rundll32.exe 1008 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\5jk29l2fg.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000033001\\5jk29l2fg.exe" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\linda5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000036001\\linda5.exe" gntuud.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 924 set thread context of 1208 924 5jk29l2fg.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 240 924 WerFault.exe 33 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1188 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1808 rundll32.exe 1808 rundll32.exe 1808 rundll32.exe 1808 rundll32.exe 1208 vbc.exe 1208 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1208 vbc.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 1496 wrote to memory of 1028 1496 file.exe 28 PID 1496 wrote to memory of 1028 1496 file.exe 28 PID 1496 wrote to memory of 1028 1496 file.exe 28 PID 1496 wrote to memory of 1028 1496 file.exe 28 PID 1028 wrote to memory of 1188 1028 gntuud.exe 29 PID 1028 wrote to memory of 1188 1028 gntuud.exe 29 PID 1028 wrote to memory of 1188 1028 gntuud.exe 29 PID 1028 wrote to memory of 1188 1028 gntuud.exe 29 PID 1028 wrote to memory of 924 1028 gntuud.exe 33 PID 1028 wrote to memory of 924 1028 gntuud.exe 33 PID 1028 wrote to memory of 924 1028 gntuud.exe 33 PID 1028 wrote to memory of 924 1028 gntuud.exe 33 PID 924 wrote to memory of 1208 924 5jk29l2fg.exe 35 PID 924 wrote to memory of 1208 924 5jk29l2fg.exe 35 PID 924 wrote to memory of 1208 924 5jk29l2fg.exe 35 PID 924 wrote to memory of 1208 924 5jk29l2fg.exe 35 PID 924 wrote to memory of 1208 924 5jk29l2fg.exe 35 PID 924 wrote to memory of 1208 924 5jk29l2fg.exe 35 PID 924 wrote to memory of 240 924 5jk29l2fg.exe 36 PID 924 wrote to memory of 240 924 5jk29l2fg.exe 36 PID 924 wrote to memory of 240 924 5jk29l2fg.exe 36 PID 924 wrote to memory of 240 924 5jk29l2fg.exe 36 PID 1028 wrote to memory of 1808 1028 gntuud.exe 37 PID 1028 wrote to memory of 1808 1028 gntuud.exe 37 PID 1028 wrote to memory of 1808 1028 gntuud.exe 37 PID 1028 wrote to memory of 1808 1028 gntuud.exe 37 PID 1028 wrote to memory of 1808 1028 gntuud.exe 37 PID 1028 wrote to memory of 1808 1028 gntuud.exe 37 PID 1028 wrote to memory of 1808 1028 gntuud.exe 37 PID 1028 wrote to memory of 2020 1028 gntuud.exe 38 PID 1028 wrote to memory of 2020 1028 gntuud.exe 38 PID 1028 wrote to memory of 2020 1028 gntuud.exe 38 PID 1028 wrote to memory of 2020 1028 gntuud.exe 38 PID 2020 wrote to memory of 1108 2020 linda5.exe 39 PID 2020 wrote to memory of 1108 2020 linda5.exe 39 PID 2020 wrote to memory of 1108 2020 linda5.exe 39 PID 2020 wrote to memory of 1108 2020 linda5.exe 39 PID 1108 wrote to memory of 832 1108 control.exe 40 PID 1108 wrote to memory of 832 1108 control.exe 40 PID 1108 wrote to memory of 832 1108 control.exe 40 PID 1108 wrote to memory of 832 1108 control.exe 40 PID 1108 wrote to memory of 832 1108 control.exe 40 PID 1108 wrote to memory of 832 1108 control.exe 40 PID 1108 wrote to memory of 832 1108 control.exe 40 PID 832 wrote to memory of 1192 832 rundll32.exe 42 PID 832 wrote to memory of 1192 832 rundll32.exe 42 PID 832 wrote to memory of 1192 832 rundll32.exe 42 PID 832 wrote to memory of 1192 832 rundll32.exe 42 PID 1192 wrote to memory of 1008 1192 RunDll32.exe 43 PID 1192 wrote to memory of 1008 1192 RunDll32.exe 43 PID 1192 wrote to memory of 1008 1192 RunDll32.exe 43 PID 1192 wrote to memory of 1008 1192 RunDll32.exe 43 PID 1192 wrote to memory of 1008 1192 RunDll32.exe 43 PID 1192 wrote to memory of 1008 1192 RunDll32.exe 43 PID 1192 wrote to memory of 1008 1192 RunDll32.exe 43 PID 1756 wrote to memory of 1916 1756 taskeng.exe 45 PID 1756 wrote to memory of 1916 1756 taskeng.exe 45 PID 1756 wrote to memory of 1916 1756 taskeng.exe 45 PID 1756 wrote to memory of 1916 1756 taskeng.exe 45 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\1000033001\5jk29l2fg.exe"C:\Users\Admin\AppData\Local\Temp\1000033001\5jk29l2fg.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 924 -s 364⤵
- Loads dropped DLL
- Program crash
PID:240
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\1000036001\linda5.exe"C:\Users\Admin\AppData\Local\Temp\1000036001\linda5.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\Ew1QaMQ.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Ew1QaMQ.cpl",5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Ew1QaMQ.cpl",6⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\Ew1QaMQ.cpl",7⤵
- Loads dropped DLL
PID:1008
-
-
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {CD61D987-73F0-4C5F-B050-513E54D88CCA} S-1-5-21-3385717845-2518323428-350143044-1000:SABDUHNY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe2⤵
- Executes dropped EXE
PID:1916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
787KB
MD5abacca218986209482f20ed9772c4cf4
SHA12398f39d3a0007ed0fbb5af7a26e4ccce249af9f
SHA256a404da44d49619445b10db9dad87e04456aa18ec88e9fc9ee328e40d8bbf479d
SHA5125a834ae01248f8aac8aa198435d9fb71da3d26fcc23cd66faf1d29dc85a8bdb56464aed336494ea51eef8258fed08ba93cea3bf0f9882961bb4e40d20144afd6
-
Filesize
1.9MB
MD5af1a2ee9532ea127afeb211a93b4ca84
SHA1bbf422f0466af2580d130d3a2976cba31836eecd
SHA256f4ce569098cea1745ed7103659ab2eada5ca92399f513989c39619a322ef4059
SHA5121ce2cf9a9ce7733d668e9ac5816f7b55a45e1b4308b898759cdd0fe76fb552c72413b9a0179bde67edaad73d21e8e8e866e6dbcab7bc46e39d401a40201371b4
-
Filesize
1.9MB
MD5af1a2ee9532ea127afeb211a93b4ca84
SHA1bbf422f0466af2580d130d3a2976cba31836eecd
SHA256f4ce569098cea1745ed7103659ab2eada5ca92399f513989c39619a322ef4059
SHA5121ce2cf9a9ce7733d668e9ac5816f7b55a45e1b4308b898759cdd0fe76fb552c72413b9a0179bde67edaad73d21e8e8e866e6dbcab7bc46e39d401a40201371b4
-
Filesize
415KB
MD570cd594f87a878654fd368101f377ff2
SHA1a16ad597765ba4d92f8e5be733cbffc618abffe8
SHA256ea4612578a49d01cde8383c01738edae7d04af2a5994937f3ab9791b853129fa
SHA512eddc50dfb47f4e78315a7b94380e2e9367611c683a41f4e3284c5d31739928d30fa3a0c992aee3dce11f4444e6ec5db6d46f0359df5458f55285967462b15e2c
-
Filesize
415KB
MD570cd594f87a878654fd368101f377ff2
SHA1a16ad597765ba4d92f8e5be733cbffc618abffe8
SHA256ea4612578a49d01cde8383c01738edae7d04af2a5994937f3ab9791b853129fa
SHA512eddc50dfb47f4e78315a7b94380e2e9367611c683a41f4e3284c5d31739928d30fa3a0c992aee3dce11f4444e6ec5db6d46f0359df5458f55285967462b15e2c
-
Filesize
415KB
MD570cd594f87a878654fd368101f377ff2
SHA1a16ad597765ba4d92f8e5be733cbffc618abffe8
SHA256ea4612578a49d01cde8383c01738edae7d04af2a5994937f3ab9791b853129fa
SHA512eddc50dfb47f4e78315a7b94380e2e9367611c683a41f4e3284c5d31739928d30fa3a0c992aee3dce11f4444e6ec5db6d46f0359df5458f55285967462b15e2c
-
Filesize
3.6MB
MD501543320298c4842b0223f584ab7f8ed
SHA1bdd998d63b06a8e80b0a0bc62b874e4920628ee8
SHA256ca0051a45a65118a3eca68af4c2bda1f15834b8418d385e7d1d98513bef499e5
SHA512db59490c79b4f5327325f14cee6191bb126d6c6366a862f6392d44da2b4aea1def26c1599ba7f40d79ab8e2923795ca7cf99dc5c3250fec34fb21cc87690d33c
-
Filesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1
-
Filesize
787KB
MD5abacca218986209482f20ed9772c4cf4
SHA12398f39d3a0007ed0fbb5af7a26e4ccce249af9f
SHA256a404da44d49619445b10db9dad87e04456aa18ec88e9fc9ee328e40d8bbf479d
SHA5125a834ae01248f8aac8aa198435d9fb71da3d26fcc23cd66faf1d29dc85a8bdb56464aed336494ea51eef8258fed08ba93cea3bf0f9882961bb4e40d20144afd6
-
Filesize
787KB
MD5abacca218986209482f20ed9772c4cf4
SHA12398f39d3a0007ed0fbb5af7a26e4ccce249af9f
SHA256a404da44d49619445b10db9dad87e04456aa18ec88e9fc9ee328e40d8bbf479d
SHA5125a834ae01248f8aac8aa198435d9fb71da3d26fcc23cd66faf1d29dc85a8bdb56464aed336494ea51eef8258fed08ba93cea3bf0f9882961bb4e40d20144afd6
-
Filesize
787KB
MD5abacca218986209482f20ed9772c4cf4
SHA12398f39d3a0007ed0fbb5af7a26e4ccce249af9f
SHA256a404da44d49619445b10db9dad87e04456aa18ec88e9fc9ee328e40d8bbf479d
SHA5125a834ae01248f8aac8aa198435d9fb71da3d26fcc23cd66faf1d29dc85a8bdb56464aed336494ea51eef8258fed08ba93cea3bf0f9882961bb4e40d20144afd6
-
Filesize
787KB
MD5abacca218986209482f20ed9772c4cf4
SHA12398f39d3a0007ed0fbb5af7a26e4ccce249af9f
SHA256a404da44d49619445b10db9dad87e04456aa18ec88e9fc9ee328e40d8bbf479d
SHA5125a834ae01248f8aac8aa198435d9fb71da3d26fcc23cd66faf1d29dc85a8bdb56464aed336494ea51eef8258fed08ba93cea3bf0f9882961bb4e40d20144afd6
-
Filesize
787KB
MD5abacca218986209482f20ed9772c4cf4
SHA12398f39d3a0007ed0fbb5af7a26e4ccce249af9f
SHA256a404da44d49619445b10db9dad87e04456aa18ec88e9fc9ee328e40d8bbf479d
SHA5125a834ae01248f8aac8aa198435d9fb71da3d26fcc23cd66faf1d29dc85a8bdb56464aed336494ea51eef8258fed08ba93cea3bf0f9882961bb4e40d20144afd6
-
Filesize
1.9MB
MD5af1a2ee9532ea127afeb211a93b4ca84
SHA1bbf422f0466af2580d130d3a2976cba31836eecd
SHA256f4ce569098cea1745ed7103659ab2eada5ca92399f513989c39619a322ef4059
SHA5121ce2cf9a9ce7733d668e9ac5816f7b55a45e1b4308b898759cdd0fe76fb552c72413b9a0179bde67edaad73d21e8e8e866e6dbcab7bc46e39d401a40201371b4
-
Filesize
415KB
MD570cd594f87a878654fd368101f377ff2
SHA1a16ad597765ba4d92f8e5be733cbffc618abffe8
SHA256ea4612578a49d01cde8383c01738edae7d04af2a5994937f3ab9791b853129fa
SHA512eddc50dfb47f4e78315a7b94380e2e9367611c683a41f4e3284c5d31739928d30fa3a0c992aee3dce11f4444e6ec5db6d46f0359df5458f55285967462b15e2c
-
Filesize
415KB
MD570cd594f87a878654fd368101f377ff2
SHA1a16ad597765ba4d92f8e5be733cbffc618abffe8
SHA256ea4612578a49d01cde8383c01738edae7d04af2a5994937f3ab9791b853129fa
SHA512eddc50dfb47f4e78315a7b94380e2e9367611c683a41f4e3284c5d31739928d30fa3a0c992aee3dce11f4444e6ec5db6d46f0359df5458f55285967462b15e2c
-
Filesize
3.6MB
MD501543320298c4842b0223f584ab7f8ed
SHA1bdd998d63b06a8e80b0a0bc62b874e4920628ee8
SHA256ca0051a45a65118a3eca68af4c2bda1f15834b8418d385e7d1d98513bef499e5
SHA512db59490c79b4f5327325f14cee6191bb126d6c6366a862f6392d44da2b4aea1def26c1599ba7f40d79ab8e2923795ca7cf99dc5c3250fec34fb21cc87690d33c
-
Filesize
3.6MB
MD501543320298c4842b0223f584ab7f8ed
SHA1bdd998d63b06a8e80b0a0bc62b874e4920628ee8
SHA256ca0051a45a65118a3eca68af4c2bda1f15834b8418d385e7d1d98513bef499e5
SHA512db59490c79b4f5327325f14cee6191bb126d6c6366a862f6392d44da2b4aea1def26c1599ba7f40d79ab8e2923795ca7cf99dc5c3250fec34fb21cc87690d33c
-
Filesize
3.6MB
MD501543320298c4842b0223f584ab7f8ed
SHA1bdd998d63b06a8e80b0a0bc62b874e4920628ee8
SHA256ca0051a45a65118a3eca68af4c2bda1f15834b8418d385e7d1d98513bef499e5
SHA512db59490c79b4f5327325f14cee6191bb126d6c6366a862f6392d44da2b4aea1def26c1599ba7f40d79ab8e2923795ca7cf99dc5c3250fec34fb21cc87690d33c
-
Filesize
3.6MB
MD501543320298c4842b0223f584ab7f8ed
SHA1bdd998d63b06a8e80b0a0bc62b874e4920628ee8
SHA256ca0051a45a65118a3eca68af4c2bda1f15834b8418d385e7d1d98513bef499e5
SHA512db59490c79b4f5327325f14cee6191bb126d6c6366a862f6392d44da2b4aea1def26c1599ba7f40d79ab8e2923795ca7cf99dc5c3250fec34fb21cc87690d33c
-
Filesize
3.6MB
MD501543320298c4842b0223f584ab7f8ed
SHA1bdd998d63b06a8e80b0a0bc62b874e4920628ee8
SHA256ca0051a45a65118a3eca68af4c2bda1f15834b8418d385e7d1d98513bef499e5
SHA512db59490c79b4f5327325f14cee6191bb126d6c6366a862f6392d44da2b4aea1def26c1599ba7f40d79ab8e2923795ca7cf99dc5c3250fec34fb21cc87690d33c
-
Filesize
3.6MB
MD501543320298c4842b0223f584ab7f8ed
SHA1bdd998d63b06a8e80b0a0bc62b874e4920628ee8
SHA256ca0051a45a65118a3eca68af4c2bda1f15834b8418d385e7d1d98513bef499e5
SHA512db59490c79b4f5327325f14cee6191bb126d6c6366a862f6392d44da2b4aea1def26c1599ba7f40d79ab8e2923795ca7cf99dc5c3250fec34fb21cc87690d33c
-
Filesize
3.6MB
MD501543320298c4842b0223f584ab7f8ed
SHA1bdd998d63b06a8e80b0a0bc62b874e4920628ee8
SHA256ca0051a45a65118a3eca68af4c2bda1f15834b8418d385e7d1d98513bef499e5
SHA512db59490c79b4f5327325f14cee6191bb126d6c6366a862f6392d44da2b4aea1def26c1599ba7f40d79ab8e2923795ca7cf99dc5c3250fec34fb21cc87690d33c
-
Filesize
3.6MB
MD501543320298c4842b0223f584ab7f8ed
SHA1bdd998d63b06a8e80b0a0bc62b874e4920628ee8
SHA256ca0051a45a65118a3eca68af4c2bda1f15834b8418d385e7d1d98513bef499e5
SHA512db59490c79b4f5327325f14cee6191bb126d6c6366a862f6392d44da2b4aea1def26c1599ba7f40d79ab8e2923795ca7cf99dc5c3250fec34fb21cc87690d33c
-
Filesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1
-
Filesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1
-
Filesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1
-
Filesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1