Analysis
-
max time kernel
76s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
reporter163.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
reporter163.exe
Resource
win10v2004-20230221-en
General
-
Target
reporter163.exe
-
Size
1021KB
-
MD5
8d76b08a5b6cc736a363681616eb8836
-
SHA1
91914721b74e4556d41e117ac98d409844c983b6
-
SHA256
9615d71b3324032d22fa07d1ab4c1b0dcc35efb75f48798f98b413eea724a5a3
-
SHA512
ec12916141e944a3d9ba3a56d7782c1d2f323db9a4bdaf93d55bb38e42c3a39499ee1bbec0c6925d9abd662f76a20678cc5ce5e8580f9b0bf1e36b058a401e8d
-
SSDEEP
24576:gy7ghSR8zUqvUWCWHHDZq4xwge1i9V4P:nZsUqv9DcUD+
Malware Config
Extracted
redline
luza
185.161.248.37:4138
-
auth_value
1261701914d508e02e8b4f25d38bc7f9
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o3340334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o3340334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o3340334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o3340334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o3340334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o3340334.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral2/memory/880-210-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-213-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-211-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-215-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-217-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-219-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-221-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-223-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-225-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-227-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-229-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-231-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-233-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-235-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-237-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-239-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-241-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-243-0x0000000002550000-0x000000000258C000-memory.dmp family_redline behavioral2/memory/880-245-0x0000000002550000-0x000000000258C000-memory.dmp family_redline -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation s8199018.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation legends.exe -
Executes dropped EXE 10 IoCs
pid Process 4756 z9888570.exe 4840 z9288150.exe 4852 o3340334.exe 228 p1716272.exe 880 r7630343.exe 1056 s8199018.exe 2560 s8199018.exe 1264 legends.exe 1312 legends.exe 4600 b2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000400000001da4c-1164.dat upx behavioral2/files/0x000400000001da4c-1175.dat upx behavioral2/files/0x000400000001da4c-1177.dat upx behavioral2/memory/4600-1178-0x00007FF76E570000-0x00007FF76F3C4000-memory.dmp upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o3340334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o3340334.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z9288150.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9288150.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce reporter163.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" reporter163.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z9888570.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9888570.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 37 ipinfo.io 39 ipinfo.io -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1056 set thread context of 2560 1056 s8199018.exe 91 PID 1264 set thread context of 1312 1264 legends.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1144 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 b2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 b2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 b2.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4852 o3340334.exe 4852 o3340334.exe 228 p1716272.exe 228 p1716272.exe 880 r7630343.exe 880 r7630343.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4852 o3340334.exe Token: SeDebugPrivilege 228 p1716272.exe Token: SeDebugPrivilege 880 r7630343.exe Token: SeDebugPrivilege 1056 s8199018.exe Token: SeDebugPrivilege 1264 legends.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 s8199018.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2712 wrote to memory of 4756 2712 reporter163.exe 84 PID 2712 wrote to memory of 4756 2712 reporter163.exe 84 PID 2712 wrote to memory of 4756 2712 reporter163.exe 84 PID 4756 wrote to memory of 4840 4756 z9888570.exe 85 PID 4756 wrote to memory of 4840 4756 z9888570.exe 85 PID 4756 wrote to memory of 4840 4756 z9888570.exe 85 PID 4840 wrote to memory of 4852 4840 z9288150.exe 86 PID 4840 wrote to memory of 4852 4840 z9288150.exe 86 PID 4840 wrote to memory of 4852 4840 z9288150.exe 86 PID 4840 wrote to memory of 228 4840 z9288150.exe 87 PID 4840 wrote to memory of 228 4840 z9288150.exe 87 PID 4840 wrote to memory of 228 4840 z9288150.exe 87 PID 4756 wrote to memory of 880 4756 z9888570.exe 89 PID 4756 wrote to memory of 880 4756 z9888570.exe 89 PID 4756 wrote to memory of 880 4756 z9888570.exe 89 PID 2712 wrote to memory of 1056 2712 reporter163.exe 90 PID 2712 wrote to memory of 1056 2712 reporter163.exe 90 PID 2712 wrote to memory of 1056 2712 reporter163.exe 90 PID 1056 wrote to memory of 2560 1056 s8199018.exe 91 PID 1056 wrote to memory of 2560 1056 s8199018.exe 91 PID 1056 wrote to memory of 2560 1056 s8199018.exe 91 PID 1056 wrote to memory of 2560 1056 s8199018.exe 91 PID 1056 wrote to memory of 2560 1056 s8199018.exe 91 PID 1056 wrote to memory of 2560 1056 s8199018.exe 91 PID 1056 wrote to memory of 2560 1056 s8199018.exe 91 PID 1056 wrote to memory of 2560 1056 s8199018.exe 91 PID 1056 wrote to memory of 2560 1056 s8199018.exe 91 PID 1056 wrote to memory of 2560 1056 s8199018.exe 91 PID 2560 wrote to memory of 1264 2560 s8199018.exe 92 PID 2560 wrote to memory of 1264 2560 s8199018.exe 92 PID 2560 wrote to memory of 1264 2560 s8199018.exe 92 PID 1264 wrote to memory of 1312 1264 legends.exe 93 PID 1264 wrote to memory of 1312 1264 legends.exe 93 PID 1264 wrote to memory of 1312 1264 legends.exe 93 PID 1264 wrote to memory of 1312 1264 legends.exe 93 PID 1264 wrote to memory of 1312 1264 legends.exe 93 PID 1264 wrote to memory of 1312 1264 legends.exe 93 PID 1264 wrote to memory of 1312 1264 legends.exe 93 PID 1264 wrote to memory of 1312 1264 legends.exe 93 PID 1264 wrote to memory of 1312 1264 legends.exe 93 PID 1264 wrote to memory of 1312 1264 legends.exe 93 PID 1312 wrote to memory of 1144 1312 legends.exe 94 PID 1312 wrote to memory of 1144 1312 legends.exe 94 PID 1312 wrote to memory of 1144 1312 legends.exe 94 PID 1312 wrote to memory of 5044 1312 legends.exe 96 PID 1312 wrote to memory of 5044 1312 legends.exe 96 PID 1312 wrote to memory of 5044 1312 legends.exe 96 PID 5044 wrote to memory of 1808 5044 cmd.exe 98 PID 5044 wrote to memory of 1808 5044 cmd.exe 98 PID 5044 wrote to memory of 1808 5044 cmd.exe 98 PID 5044 wrote to memory of 1952 5044 cmd.exe 99 PID 5044 wrote to memory of 1952 5044 cmd.exe 99 PID 5044 wrote to memory of 1952 5044 cmd.exe 99 PID 5044 wrote to memory of 524 5044 cmd.exe 100 PID 5044 wrote to memory of 524 5044 cmd.exe 100 PID 5044 wrote to memory of 524 5044 cmd.exe 100 PID 5044 wrote to memory of 2124 5044 cmd.exe 102 PID 5044 wrote to memory of 2124 5044 cmd.exe 102 PID 5044 wrote to memory of 2124 5044 cmd.exe 102 PID 5044 wrote to memory of 1892 5044 cmd.exe 101 PID 5044 wrote to memory of 1892 5044 cmd.exe 101 PID 5044 wrote to memory of 1892 5044 cmd.exe 101 PID 5044 wrote to memory of 3344 5044 cmd.exe 103 PID 5044 wrote to memory of 3344 5044 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\reporter163.exe"C:\Users\Admin\AppData\Local\Temp\reporter163.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9888570.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9888570.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9288150.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9288150.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3340334.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3340334.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1716272.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1716272.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7630343.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7630343.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8199018.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8199018.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8199018.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8199018.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F6⤵
- Creates scheduled task(s)
PID:1144
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"7⤵PID:1952
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E7⤵PID:524
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"7⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2124
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E7⤵PID:3344
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000023001\b2.exe"C:\Users\Admin\AppData\Local\Temp\1000023001\b2.exe"6⤵
- Executes dropped EXE
- Modifies system certificate store
PID:4600 -
C:\Windows\system32\curl.execurl -s ipinfo.io/country7⤵PID:1060
-
-
C:\Windows\system32\curl.execurl -s ipinfo.io/country7⤵PID:2372
-
-
C:\Windows\SYSTEM32\cmd.execmd /c7⤵PID:3776
-
-
C:\Windows\system32\curl.execurl -s ipinfo.io/country7⤵PID:5000
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD52afcac7aaede32980c96fda99c8c8677
SHA1436e83ce6882e798e5bb6d89a31913285886d3a2
SHA2561cd60650fa3e560d8f7c80d4d059e669e64486bd3ca6daed52d8fdce14d0455b
SHA5125ccba16f2b31f1271487729c6d502529fa329d56dc126f080481d567c37c7ed68760c808e7fb6559293c65cf9ea8deca67ba2670a42a806d7e158ce79a513907
-
Filesize
4.6MB
MD52afcac7aaede32980c96fda99c8c8677
SHA1436e83ce6882e798e5bb6d89a31913285886d3a2
SHA2561cd60650fa3e560d8f7c80d4d059e669e64486bd3ca6daed52d8fdce14d0455b
SHA5125ccba16f2b31f1271487729c6d502529fa329d56dc126f080481d567c37c7ed68760c808e7fb6559293c65cf9ea8deca67ba2670a42a806d7e158ce79a513907
-
Filesize
4.6MB
MD52afcac7aaede32980c96fda99c8c8677
SHA1436e83ce6882e798e5bb6d89a31913285886d3a2
SHA2561cd60650fa3e560d8f7c80d4d059e669e64486bd3ca6daed52d8fdce14d0455b
SHA5125ccba16f2b31f1271487729c6d502529fa329d56dc126f080481d567c37c7ed68760c808e7fb6559293c65cf9ea8deca67ba2670a42a806d7e158ce79a513907
-
Filesize
963KB
MD5d6d4fa67d6c5859186778f75127bc691
SHA1fdd1d219d6ea4f6c575b67236e06a373cb4318f3
SHA25642c61196101cb1c94d5c6aa200e88a91563036109b072662fcffa7cc5f4a6a08
SHA512714132f9a1443b325def83c1e81186a509a6f4be95351169528622f271485d3109183bbf34992cbf30c3f0a7cbdea98bef4c3f58e8909e0212369967ac8f167b
-
Filesize
963KB
MD5d6d4fa67d6c5859186778f75127bc691
SHA1fdd1d219d6ea4f6c575b67236e06a373cb4318f3
SHA25642c61196101cb1c94d5c6aa200e88a91563036109b072662fcffa7cc5f4a6a08
SHA512714132f9a1443b325def83c1e81186a509a6f4be95351169528622f271485d3109183bbf34992cbf30c3f0a7cbdea98bef4c3f58e8909e0212369967ac8f167b
-
Filesize
963KB
MD5d6d4fa67d6c5859186778f75127bc691
SHA1fdd1d219d6ea4f6c575b67236e06a373cb4318f3
SHA25642c61196101cb1c94d5c6aa200e88a91563036109b072662fcffa7cc5f4a6a08
SHA512714132f9a1443b325def83c1e81186a509a6f4be95351169528622f271485d3109183bbf34992cbf30c3f0a7cbdea98bef4c3f58e8909e0212369967ac8f167b
-
Filesize
963KB
MD5d6d4fa67d6c5859186778f75127bc691
SHA1fdd1d219d6ea4f6c575b67236e06a373cb4318f3
SHA25642c61196101cb1c94d5c6aa200e88a91563036109b072662fcffa7cc5f4a6a08
SHA512714132f9a1443b325def83c1e81186a509a6f4be95351169528622f271485d3109183bbf34992cbf30c3f0a7cbdea98bef4c3f58e8909e0212369967ac8f167b
-
Filesize
963KB
MD5d6d4fa67d6c5859186778f75127bc691
SHA1fdd1d219d6ea4f6c575b67236e06a373cb4318f3
SHA25642c61196101cb1c94d5c6aa200e88a91563036109b072662fcffa7cc5f4a6a08
SHA512714132f9a1443b325def83c1e81186a509a6f4be95351169528622f271485d3109183bbf34992cbf30c3f0a7cbdea98bef4c3f58e8909e0212369967ac8f167b
-
Filesize
963KB
MD5d6d4fa67d6c5859186778f75127bc691
SHA1fdd1d219d6ea4f6c575b67236e06a373cb4318f3
SHA25642c61196101cb1c94d5c6aa200e88a91563036109b072662fcffa7cc5f4a6a08
SHA512714132f9a1443b325def83c1e81186a509a6f4be95351169528622f271485d3109183bbf34992cbf30c3f0a7cbdea98bef4c3f58e8909e0212369967ac8f167b
-
Filesize
963KB
MD5d6d4fa67d6c5859186778f75127bc691
SHA1fdd1d219d6ea4f6c575b67236e06a373cb4318f3
SHA25642c61196101cb1c94d5c6aa200e88a91563036109b072662fcffa7cc5f4a6a08
SHA512714132f9a1443b325def83c1e81186a509a6f4be95351169528622f271485d3109183bbf34992cbf30c3f0a7cbdea98bef4c3f58e8909e0212369967ac8f167b
-
Filesize
577KB
MD588a49c7a91ed09d09601d17ff1dfa77e
SHA1d6fee1964685cd9b33a769cc312f9e138e0d5b8d
SHA256d42a6edde0375b7cbebdab3556d140e3a111cbc70b21178f93a5c216dd20e5bb
SHA5122dc316dde9d86073e82358576deed014a8e7c995b4f23cc2d338cda557c895118db65400cd73682db7258169d950e054093e247b39c78e65aca76c093838ffaa
-
Filesize
577KB
MD588a49c7a91ed09d09601d17ff1dfa77e
SHA1d6fee1964685cd9b33a769cc312f9e138e0d5b8d
SHA256d42a6edde0375b7cbebdab3556d140e3a111cbc70b21178f93a5c216dd20e5bb
SHA5122dc316dde9d86073e82358576deed014a8e7c995b4f23cc2d338cda557c895118db65400cd73682db7258169d950e054093e247b39c78e65aca76c093838ffaa
-
Filesize
286KB
MD51ba62e456fc93f6be9e4836b29372ad6
SHA1fdef59434ead0c13d895a37985cfab96d4455535
SHA256f393bae17c78d53b70cff3691e2fd4cf96045dfc37660af67cea84a9ea5e41d9
SHA512649fcd9fdcd296c125f6db508d0845faea1cdb9dc4a636f31baf337028e0b2b06fa16ea2265b762fc7e7ed2150428d0c2a3a547c2e49f36267ba5fb7188e08aa
-
Filesize
286KB
MD51ba62e456fc93f6be9e4836b29372ad6
SHA1fdef59434ead0c13d895a37985cfab96d4455535
SHA256f393bae17c78d53b70cff3691e2fd4cf96045dfc37660af67cea84a9ea5e41d9
SHA512649fcd9fdcd296c125f6db508d0845faea1cdb9dc4a636f31baf337028e0b2b06fa16ea2265b762fc7e7ed2150428d0c2a3a547c2e49f36267ba5fb7188e08aa
-
Filesize
305KB
MD548ee04fda51646af56997b4d0bff0e5f
SHA18bb619d9d01d6a805c97afef5183b33fea471f11
SHA256e355e4640c63a78abc503ade9a5ab6b2f2060fd13c32912ab60c81ec8f195333
SHA512d42ee8a8ab43547b7fffda2abeb1bb43c06a403833aac36e037a93bcf4f67b3a610201297f3c0c97e400e0c56e54bdd6cf66515642c0604309a314a55f4a8f51
-
Filesize
305KB
MD548ee04fda51646af56997b4d0bff0e5f
SHA18bb619d9d01d6a805c97afef5183b33fea471f11
SHA256e355e4640c63a78abc503ade9a5ab6b2f2060fd13c32912ab60c81ec8f195333
SHA512d42ee8a8ab43547b7fffda2abeb1bb43c06a403833aac36e037a93bcf4f67b3a610201297f3c0c97e400e0c56e54bdd6cf66515642c0604309a314a55f4a8f51
-
Filesize
186KB
MD51cfc7d3b6c32cccb6da0c3e26a616573
SHA1ff5fc390e7f354e621a04911b16fb9d9218b7338
SHA256ed9e3d6a9a619958d8c13488cdc6468fdba7087687b227751ed576f4c6215698
SHA512210c00525471d41f42e01d5db7df9a21e243a56d20a79b46f4b1887023e1a516b0441284c2fae0aaa72894094bda291746f598e74d9edfb70b9541c342aaa914
-
Filesize
186KB
MD51cfc7d3b6c32cccb6da0c3e26a616573
SHA1ff5fc390e7f354e621a04911b16fb9d9218b7338
SHA256ed9e3d6a9a619958d8c13488cdc6468fdba7087687b227751ed576f4c6215698
SHA512210c00525471d41f42e01d5db7df9a21e243a56d20a79b46f4b1887023e1a516b0441284c2fae0aaa72894094bda291746f598e74d9edfb70b9541c342aaa914
-
Filesize
145KB
MD576dc340c8194a6d8f8c0677474a343b2
SHA1fc586951a24db20abe415572668c6d360acdfbae
SHA25620f2d18abe303f3156ece1cfd39a85001f41f3af17cd10988cdb74aa6ff5bb49
SHA512de241594313bff89a74651ad85083c14a14d9a88a46b077f22661bce3a73a60c4407b36d469b13dffdd3545fb3b532bed2c6af85c92bb95b14bd7a6f42b7bdc1
-
Filesize
145KB
MD576dc340c8194a6d8f8c0677474a343b2
SHA1fc586951a24db20abe415572668c6d360acdfbae
SHA25620f2d18abe303f3156ece1cfd39a85001f41f3af17cd10988cdb74aa6ff5bb49
SHA512de241594313bff89a74651ad85083c14a14d9a88a46b077f22661bce3a73a60c4407b36d469b13dffdd3545fb3b532bed2c6af85c92bb95b14bd7a6f42b7bdc1