Analysis
-
max time kernel
109s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
19-12-2022 21:46
Static task
static1
Behavioral task
behavioral1
Sample
5514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023.exe
Resource
win10v2004-20220901-en
General
-
Target
5514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023.exe
-
Size
272KB
-
MD5
0c569e87bcb0d34c7c7c8426ab7ae6d7
-
SHA1
3467ee4c23aaa4c49764d817c221e8a70fd5a4bd
-
SHA256
5514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023
-
SHA512
14639b276932a926151badd5c88364072d86785fcfdef35e3231e5bba20de2ee83db2e82b5fc55950a24af9a0bf392900a11c34b4b7ebc7f18f7402d505b99cc
-
SSDEEP
6144:GS4LQoZi6M4ykUJ8EpOklzc1gweQIa+MK5jlVklPH:GS4coZdM4ykzEgpfoaWlU
Malware Config
Extracted
amadey
3.50
31.41.244.237/jg94cVd30f/index.php
Extracted
redline
nokia
31.41.244.198:4083
-
auth_value
3b38e056d594ae0cf1368e6e1daa3a4e
Signatures
-
Detect Amadey credential stealer module 5 IoCs
resource yara_rule behavioral1/files/0x00070000000126d7-131.dat amadey_cred_module behavioral1/files/0x00070000000126d7-132.dat amadey_cred_module behavioral1/files/0x00070000000126d7-133.dat amadey_cred_module behavioral1/files/0x00070000000126d7-134.dat amadey_cred_module behavioral1/files/0x00070000000126d7-135.dat amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/1636-96-0x0000000001E50000-0x0000000001E96000-memory.dmp family_redline behavioral1/memory/1636-97-0x0000000001E90000-0x0000000001ED4000-memory.dmp family_redline -
Blocklisted process makes network request 1 IoCs
flow pid Process 7 2032 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 2040 gntuud.exe 1960 linda5.exe 1636 ladia.exe 1728 gntuud.exe 396 gntuud.exe -
Loads dropped DLL 17 IoCs
pid Process 1720 5514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023.exe 1720 5514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023.exe 2040 gntuud.exe 1176 rundll32.exe 1176 rundll32.exe 1176 rundll32.exe 1176 rundll32.exe 2040 gntuud.exe 2040 gntuud.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\linda5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000020001\\linda5.exe" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ladia.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000021001\\ladia.exe" gntuud.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1636 ladia.exe 1636 ladia.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1636 ladia.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2040 1720 5514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023.exe 28 PID 1720 wrote to memory of 2040 1720 5514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023.exe 28 PID 1720 wrote to memory of 2040 1720 5514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023.exe 28 PID 1720 wrote to memory of 2040 1720 5514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023.exe 28 PID 2040 wrote to memory of 560 2040 gntuud.exe 29 PID 2040 wrote to memory of 560 2040 gntuud.exe 29 PID 2040 wrote to memory of 560 2040 gntuud.exe 29 PID 2040 wrote to memory of 560 2040 gntuud.exe 29 PID 2040 wrote to memory of 564 2040 gntuud.exe 31 PID 2040 wrote to memory of 564 2040 gntuud.exe 31 PID 2040 wrote to memory of 564 2040 gntuud.exe 31 PID 2040 wrote to memory of 564 2040 gntuud.exe 31 PID 564 wrote to memory of 680 564 cmd.exe 33 PID 564 wrote to memory of 680 564 cmd.exe 33 PID 564 wrote to memory of 680 564 cmd.exe 33 PID 564 wrote to memory of 680 564 cmd.exe 33 PID 564 wrote to memory of 1984 564 cmd.exe 34 PID 564 wrote to memory of 1984 564 cmd.exe 34 PID 564 wrote to memory of 1984 564 cmd.exe 34 PID 564 wrote to memory of 1984 564 cmd.exe 34 PID 564 wrote to memory of 876 564 cmd.exe 35 PID 564 wrote to memory of 876 564 cmd.exe 35 PID 564 wrote to memory of 876 564 cmd.exe 35 PID 564 wrote to memory of 876 564 cmd.exe 35 PID 564 wrote to memory of 936 564 cmd.exe 36 PID 564 wrote to memory of 936 564 cmd.exe 36 PID 564 wrote to memory of 936 564 cmd.exe 36 PID 564 wrote to memory of 936 564 cmd.exe 36 PID 564 wrote to memory of 712 564 cmd.exe 37 PID 564 wrote to memory of 712 564 cmd.exe 37 PID 564 wrote to memory of 712 564 cmd.exe 37 PID 564 wrote to memory of 712 564 cmd.exe 37 PID 564 wrote to memory of 904 564 cmd.exe 38 PID 564 wrote to memory of 904 564 cmd.exe 38 PID 564 wrote to memory of 904 564 cmd.exe 38 PID 564 wrote to memory of 904 564 cmd.exe 38 PID 2040 wrote to memory of 1960 2040 gntuud.exe 41 PID 2040 wrote to memory of 1960 2040 gntuud.exe 41 PID 2040 wrote to memory of 1960 2040 gntuud.exe 41 PID 2040 wrote to memory of 1960 2040 gntuud.exe 41 PID 1960 wrote to memory of 1544 1960 linda5.exe 42 PID 1960 wrote to memory of 1544 1960 linda5.exe 42 PID 1960 wrote to memory of 1544 1960 linda5.exe 42 PID 1960 wrote to memory of 1544 1960 linda5.exe 42 PID 1544 wrote to memory of 1176 1544 control.exe 43 PID 1544 wrote to memory of 1176 1544 control.exe 43 PID 1544 wrote to memory of 1176 1544 control.exe 43 PID 1544 wrote to memory of 1176 1544 control.exe 43 PID 1544 wrote to memory of 1176 1544 control.exe 43 PID 1544 wrote to memory of 1176 1544 control.exe 43 PID 1544 wrote to memory of 1176 1544 control.exe 43 PID 2040 wrote to memory of 1636 2040 gntuud.exe 44 PID 2040 wrote to memory of 1636 2040 gntuud.exe 44 PID 2040 wrote to memory of 1636 2040 gntuud.exe 44 PID 2040 wrote to memory of 1636 2040 gntuud.exe 44 PID 1176 wrote to memory of 268 1176 rundll32.exe 45 PID 1176 wrote to memory of 268 1176 rundll32.exe 45 PID 1176 wrote to memory of 268 1176 rundll32.exe 45 PID 1176 wrote to memory of 268 1176 rundll32.exe 45 PID 268 wrote to memory of 1496 268 RunDll32.exe 46 PID 268 wrote to memory of 1496 268 RunDll32.exe 46 PID 268 wrote to memory of 1496 268 RunDll32.exe 46 PID 268 wrote to memory of 1496 268 RunDll32.exe 46 PID 268 wrote to memory of 1496 268 RunDll32.exe 46 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023.exe"C:\Users\Admin\AppData\Local\Temp\5514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:560
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\9c69749b54" /P "Admin:N"&&CACLS "..\9c69749b54" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:680
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:N"4⤵PID:1984
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:R" /E4⤵PID:876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:936
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\9c69749b54" /P "Admin:N"4⤵PID:712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\9c69749b54" /P "Admin:R" /E4⤵PID:904
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\linda5.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\linda5.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\DNiQ.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DNiQ.CPl",5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DNiQ.CPl",6⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\DNiQ.CPl",7⤵
- Loads dropped DLL
PID:1496
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000021001\ladia.exe"C:\Users\Admin\AppData\Local\Temp\1000021001\ladia.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\85f469ce401df1\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:2032
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BD872D7C-65DF-4137-831B-212911CF4A4B} S-1-5-21-1214520366-621468234-4062160515-1000:VDWSWJJD\Admin:Interactive:[1]1⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exeC:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe2⤵
- Executes dropped EXE
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exeC:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe2⤵
- Executes dropped EXE
PID:396
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD51eeacea8b9aa738477b666c9226b1318
SHA16be5369fd5daee09332eb66468a14dbd07e25322
SHA256bba7d719129244665a3aebd437e4cbb25a3e2129b153e2316b45d72e2fc4fb31
SHA51241126da021ce9d3ca3592546bc815705113a9670b909e38162297e3c265e4780269ccbd21e94c5fe682d675d0842595b18aec234f3c46ecf04bebd4fda2087b3
-
Filesize
1.7MB
MD51eeacea8b9aa738477b666c9226b1318
SHA16be5369fd5daee09332eb66468a14dbd07e25322
SHA256bba7d719129244665a3aebd437e4cbb25a3e2129b153e2316b45d72e2fc4fb31
SHA51241126da021ce9d3ca3592546bc815705113a9670b909e38162297e3c265e4780269ccbd21e94c5fe682d675d0842595b18aec234f3c46ecf04bebd4fda2087b3
-
Filesize
404KB
MD56747e23236494ef0a33899575c078f49
SHA1a55660a38b76454388d02d719e8b3aa819887030
SHA2565646ec98ad856716379feaf6005b17904ac7960b1cd22279481bf99254829d23
SHA512bf67e452bb609fbec2836225d418e888b79e9db8c2bed3f98e160e40ff6c73daab2027a15e7ff5a706f16859883b0825a474cdd2f5b03cb4fcf06f9c242bd5f0
-
Filesize
272KB
MD50c569e87bcb0d34c7c7c8426ab7ae6d7
SHA13467ee4c23aaa4c49764d817c221e8a70fd5a4bd
SHA2565514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023
SHA51214639b276932a926151badd5c88364072d86785fcfdef35e3231e5bba20de2ee83db2e82b5fc55950a24af9a0bf392900a11c34b4b7ebc7f18f7402d505b99cc
-
Filesize
272KB
MD50c569e87bcb0d34c7c7c8426ab7ae6d7
SHA13467ee4c23aaa4c49764d817c221e8a70fd5a4bd
SHA2565514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023
SHA51214639b276932a926151badd5c88364072d86785fcfdef35e3231e5bba20de2ee83db2e82b5fc55950a24af9a0bf392900a11c34b4b7ebc7f18f7402d505b99cc
-
Filesize
272KB
MD50c569e87bcb0d34c7c7c8426ab7ae6d7
SHA13467ee4c23aaa4c49764d817c221e8a70fd5a4bd
SHA2565514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023
SHA51214639b276932a926151badd5c88364072d86785fcfdef35e3231e5bba20de2ee83db2e82b5fc55950a24af9a0bf392900a11c34b4b7ebc7f18f7402d505b99cc
-
Filesize
272KB
MD50c569e87bcb0d34c7c7c8426ab7ae6d7
SHA13467ee4c23aaa4c49764d817c221e8a70fd5a4bd
SHA2565514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023
SHA51214639b276932a926151badd5c88364072d86785fcfdef35e3231e5bba20de2ee83db2e82b5fc55950a24af9a0bf392900a11c34b4b7ebc7f18f7402d505b99cc
-
Filesize
2.0MB
MD5ba748bd0187d6215740729c09c7d16e8
SHA160276802196a67e63ca7832db2bced79af7a4cee
SHA256ac11ad2da3db916631ca38d68101622aa375ae5ee7d6847e2e8dbc43cdb5d92b
SHA512792a6797c4c48bde842d6a769f2ffce0f5e55ccdee135277b6133b633418e2da6fabaafde7edc792ab2d91f79ffe4d870a306f2a7866476feaa9ef64eb29ef75
-
Filesize
126KB
MD5c0fd0167e213b6148333351bd16ed1fb
SHA11cfb2b42686557656dead53e02d1db3f2a848026
SHA256c7d804e8fb096769b0e199102bdf8efa97dfae1a9b57a479819971146877368b
SHA512d514f35e62a5380b4ad96a3e0cddf82b53b1cf273e5ac542f040f30a75efd3c246fa2194e4bb273572cd2436a435a608e2b919f6df9fa4ebbf452b0d297b0cf9
-
Filesize
1.7MB
MD51eeacea8b9aa738477b666c9226b1318
SHA16be5369fd5daee09332eb66468a14dbd07e25322
SHA256bba7d719129244665a3aebd437e4cbb25a3e2129b153e2316b45d72e2fc4fb31
SHA51241126da021ce9d3ca3592546bc815705113a9670b909e38162297e3c265e4780269ccbd21e94c5fe682d675d0842595b18aec234f3c46ecf04bebd4fda2087b3
-
Filesize
404KB
MD56747e23236494ef0a33899575c078f49
SHA1a55660a38b76454388d02d719e8b3aa819887030
SHA2565646ec98ad856716379feaf6005b17904ac7960b1cd22279481bf99254829d23
SHA512bf67e452bb609fbec2836225d418e888b79e9db8c2bed3f98e160e40ff6c73daab2027a15e7ff5a706f16859883b0825a474cdd2f5b03cb4fcf06f9c242bd5f0
-
Filesize
404KB
MD56747e23236494ef0a33899575c078f49
SHA1a55660a38b76454388d02d719e8b3aa819887030
SHA2565646ec98ad856716379feaf6005b17904ac7960b1cd22279481bf99254829d23
SHA512bf67e452bb609fbec2836225d418e888b79e9db8c2bed3f98e160e40ff6c73daab2027a15e7ff5a706f16859883b0825a474cdd2f5b03cb4fcf06f9c242bd5f0
-
Filesize
272KB
MD50c569e87bcb0d34c7c7c8426ab7ae6d7
SHA13467ee4c23aaa4c49764d817c221e8a70fd5a4bd
SHA2565514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023
SHA51214639b276932a926151badd5c88364072d86785fcfdef35e3231e5bba20de2ee83db2e82b5fc55950a24af9a0bf392900a11c34b4b7ebc7f18f7402d505b99cc
-
Filesize
272KB
MD50c569e87bcb0d34c7c7c8426ab7ae6d7
SHA13467ee4c23aaa4c49764d817c221e8a70fd5a4bd
SHA2565514508f6c2fedd1bfa1a363661d579661c11974339f9bda6d53cf4ce5658023
SHA51214639b276932a926151badd5c88364072d86785fcfdef35e3231e5bba20de2ee83db2e82b5fc55950a24af9a0bf392900a11c34b4b7ebc7f18f7402d505b99cc
-
Filesize
2.0MB
MD5ba748bd0187d6215740729c09c7d16e8
SHA160276802196a67e63ca7832db2bced79af7a4cee
SHA256ac11ad2da3db916631ca38d68101622aa375ae5ee7d6847e2e8dbc43cdb5d92b
SHA512792a6797c4c48bde842d6a769f2ffce0f5e55ccdee135277b6133b633418e2da6fabaafde7edc792ab2d91f79ffe4d870a306f2a7866476feaa9ef64eb29ef75
-
Filesize
2.0MB
MD5ba748bd0187d6215740729c09c7d16e8
SHA160276802196a67e63ca7832db2bced79af7a4cee
SHA256ac11ad2da3db916631ca38d68101622aa375ae5ee7d6847e2e8dbc43cdb5d92b
SHA512792a6797c4c48bde842d6a769f2ffce0f5e55ccdee135277b6133b633418e2da6fabaafde7edc792ab2d91f79ffe4d870a306f2a7866476feaa9ef64eb29ef75
-
Filesize
2.0MB
MD5ba748bd0187d6215740729c09c7d16e8
SHA160276802196a67e63ca7832db2bced79af7a4cee
SHA256ac11ad2da3db916631ca38d68101622aa375ae5ee7d6847e2e8dbc43cdb5d92b
SHA512792a6797c4c48bde842d6a769f2ffce0f5e55ccdee135277b6133b633418e2da6fabaafde7edc792ab2d91f79ffe4d870a306f2a7866476feaa9ef64eb29ef75
-
Filesize
2.0MB
MD5ba748bd0187d6215740729c09c7d16e8
SHA160276802196a67e63ca7832db2bced79af7a4cee
SHA256ac11ad2da3db916631ca38d68101622aa375ae5ee7d6847e2e8dbc43cdb5d92b
SHA512792a6797c4c48bde842d6a769f2ffce0f5e55ccdee135277b6133b633418e2da6fabaafde7edc792ab2d91f79ffe4d870a306f2a7866476feaa9ef64eb29ef75
-
Filesize
2.0MB
MD5ba748bd0187d6215740729c09c7d16e8
SHA160276802196a67e63ca7832db2bced79af7a4cee
SHA256ac11ad2da3db916631ca38d68101622aa375ae5ee7d6847e2e8dbc43cdb5d92b
SHA512792a6797c4c48bde842d6a769f2ffce0f5e55ccdee135277b6133b633418e2da6fabaafde7edc792ab2d91f79ffe4d870a306f2a7866476feaa9ef64eb29ef75
-
Filesize
2.0MB
MD5ba748bd0187d6215740729c09c7d16e8
SHA160276802196a67e63ca7832db2bced79af7a4cee
SHA256ac11ad2da3db916631ca38d68101622aa375ae5ee7d6847e2e8dbc43cdb5d92b
SHA512792a6797c4c48bde842d6a769f2ffce0f5e55ccdee135277b6133b633418e2da6fabaafde7edc792ab2d91f79ffe4d870a306f2a7866476feaa9ef64eb29ef75
-
Filesize
2.0MB
MD5ba748bd0187d6215740729c09c7d16e8
SHA160276802196a67e63ca7832db2bced79af7a4cee
SHA256ac11ad2da3db916631ca38d68101622aa375ae5ee7d6847e2e8dbc43cdb5d92b
SHA512792a6797c4c48bde842d6a769f2ffce0f5e55ccdee135277b6133b633418e2da6fabaafde7edc792ab2d91f79ffe4d870a306f2a7866476feaa9ef64eb29ef75
-
Filesize
2.0MB
MD5ba748bd0187d6215740729c09c7d16e8
SHA160276802196a67e63ca7832db2bced79af7a4cee
SHA256ac11ad2da3db916631ca38d68101622aa375ae5ee7d6847e2e8dbc43cdb5d92b
SHA512792a6797c4c48bde842d6a769f2ffce0f5e55ccdee135277b6133b633418e2da6fabaafde7edc792ab2d91f79ffe4d870a306f2a7866476feaa9ef64eb29ef75
-
Filesize
126KB
MD5c0fd0167e213b6148333351bd16ed1fb
SHA11cfb2b42686557656dead53e02d1db3f2a848026
SHA256c7d804e8fb096769b0e199102bdf8efa97dfae1a9b57a479819971146877368b
SHA512d514f35e62a5380b4ad96a3e0cddf82b53b1cf273e5ac542f040f30a75efd3c246fa2194e4bb273572cd2436a435a608e2b919f6df9fa4ebbf452b0d297b0cf9
-
Filesize
126KB
MD5c0fd0167e213b6148333351bd16ed1fb
SHA11cfb2b42686557656dead53e02d1db3f2a848026
SHA256c7d804e8fb096769b0e199102bdf8efa97dfae1a9b57a479819971146877368b
SHA512d514f35e62a5380b4ad96a3e0cddf82b53b1cf273e5ac542f040f30a75efd3c246fa2194e4bb273572cd2436a435a608e2b919f6df9fa4ebbf452b0d297b0cf9
-
Filesize
126KB
MD5c0fd0167e213b6148333351bd16ed1fb
SHA11cfb2b42686557656dead53e02d1db3f2a848026
SHA256c7d804e8fb096769b0e199102bdf8efa97dfae1a9b57a479819971146877368b
SHA512d514f35e62a5380b4ad96a3e0cddf82b53b1cf273e5ac542f040f30a75efd3c246fa2194e4bb273572cd2436a435a608e2b919f6df9fa4ebbf452b0d297b0cf9
-
Filesize
126KB
MD5c0fd0167e213b6148333351bd16ed1fb
SHA11cfb2b42686557656dead53e02d1db3f2a848026
SHA256c7d804e8fb096769b0e199102bdf8efa97dfae1a9b57a479819971146877368b
SHA512d514f35e62a5380b4ad96a3e0cddf82b53b1cf273e5ac542f040f30a75efd3c246fa2194e4bb273572cd2436a435a608e2b919f6df9fa4ebbf452b0d297b0cf9