Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23-05-2023 15:53
Static task
static1
General
-
Target
347dae97c50455ffe1cc13a2cb0ccb298135898ddffc27514c6e5b2ebdd116c3.exe
-
Size
1020KB
-
MD5
6ec801ca37932c2d01a28e512596d05f
-
SHA1
6bb21e725ae5ca350f8a82711fbcc15bdf235976
-
SHA256
347dae97c50455ffe1cc13a2cb0ccb298135898ddffc27514c6e5b2ebdd116c3
-
SHA512
732d88d8ed4d1a76a53a0b9bae5a3f163bff7c168a4a51aa0dffa73a3c58f813d82c656f6741d76c673451738c8f5555739d49619651c006d98821b3ceeab844
-
SSDEEP
24576:syAK+I6zbTpMsv9HK5SDYLMHk9sjxkM28dtk5YuJi:bX+bnH0UO9Eh2X3
Malware Config
Extracted
redline
lupa
83.97.73.122:19062
-
auth_value
6a764aa41830c77712442516d143bc9c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o8701927.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o8701927.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o8701927.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o8701927.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o8701927.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1512-196-0x00000000023C0000-0x0000000002404000-memory.dmp family_redline behavioral1/memory/1512-197-0x00000000049B0000-0x00000000049F0000-memory.dmp family_redline behavioral1/memory/1512-198-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-199-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-201-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-203-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-205-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-207-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-209-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-211-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-213-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-215-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-217-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-219-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-221-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-223-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-225-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-227-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-229-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-231-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1512-233-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline -
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/4272-1175-0x0000000000400000-0x00000000007FE000-memory.dmp loaderbot -
XMRig Miner payload 1 IoCs
resource yara_rule behavioral1/memory/816-1210-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 16 IoCs
pid Process 2488 z4477234.exe 2992 z8136479.exe 3944 o8701927.exe 3260 p3771481.exe 1512 r1730341.exe 3048 s3950512.exe 2924 s3950512.exe 4872 legends.exe 4960 legends.exe 3460 legends.exe 5072 full_min_cr.exe 4272 full_min_cr.exe 816 Driver.exe 216 legends.exe 4916 legends.exe 2896 legends.exe -
Loads dropped DLL 1 IoCs
pid Process 400 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o8701927.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o8701927.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 347dae97c50455ffe1cc13a2cb0ccb298135898ddffc27514c6e5b2ebdd116c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 347dae97c50455ffe1cc13a2cb0ccb298135898ddffc27514c6e5b2ebdd116c3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4477234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4477234.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8136479.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z8136479.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3048 set thread context of 2924 3048 s3950512.exe 73 PID 4872 set thread context of 3460 4872 legends.exe 76 PID 5072 set thread context of 4272 5072 full_min_cr.exe 88 PID 216 set thread context of 2896 216 legends.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4820 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3944 o8701927.exe 3944 o8701927.exe 3260 p3771481.exe 3260 p3771481.exe 1512 r1730341.exe 1512 r1730341.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe 4272 full_min_cr.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 632 Process not Found -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3944 o8701927.exe Token: SeDebugPrivilege 3260 p3771481.exe Token: SeDebugPrivilege 1512 r1730341.exe Token: SeDebugPrivilege 3048 s3950512.exe Token: SeDebugPrivilege 4872 legends.exe Token: SeDebugPrivilege 4272 full_min_cr.exe Token: SeLockMemoryPrivilege 816 Driver.exe Token: SeLockMemoryPrivilege 816 Driver.exe Token: SeDebugPrivilege 216 legends.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 s3950512.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2488 2424 347dae97c50455ffe1cc13a2cb0ccb298135898ddffc27514c6e5b2ebdd116c3.exe 66 PID 2424 wrote to memory of 2488 2424 347dae97c50455ffe1cc13a2cb0ccb298135898ddffc27514c6e5b2ebdd116c3.exe 66 PID 2424 wrote to memory of 2488 2424 347dae97c50455ffe1cc13a2cb0ccb298135898ddffc27514c6e5b2ebdd116c3.exe 66 PID 2488 wrote to memory of 2992 2488 z4477234.exe 67 PID 2488 wrote to memory of 2992 2488 z4477234.exe 67 PID 2488 wrote to memory of 2992 2488 z4477234.exe 67 PID 2992 wrote to memory of 3944 2992 z8136479.exe 68 PID 2992 wrote to memory of 3944 2992 z8136479.exe 68 PID 2992 wrote to memory of 3944 2992 z8136479.exe 68 PID 2992 wrote to memory of 3260 2992 z8136479.exe 69 PID 2992 wrote to memory of 3260 2992 z8136479.exe 69 PID 2992 wrote to memory of 3260 2992 z8136479.exe 69 PID 2488 wrote to memory of 1512 2488 z4477234.exe 71 PID 2488 wrote to memory of 1512 2488 z4477234.exe 71 PID 2488 wrote to memory of 1512 2488 z4477234.exe 71 PID 2424 wrote to memory of 3048 2424 347dae97c50455ffe1cc13a2cb0ccb298135898ddffc27514c6e5b2ebdd116c3.exe 72 PID 2424 wrote to memory of 3048 2424 347dae97c50455ffe1cc13a2cb0ccb298135898ddffc27514c6e5b2ebdd116c3.exe 72 PID 2424 wrote to memory of 3048 2424 347dae97c50455ffe1cc13a2cb0ccb298135898ddffc27514c6e5b2ebdd116c3.exe 72 PID 3048 wrote to memory of 2924 3048 s3950512.exe 73 PID 3048 wrote to memory of 2924 3048 s3950512.exe 73 PID 3048 wrote to memory of 2924 3048 s3950512.exe 73 PID 3048 wrote to memory of 2924 3048 s3950512.exe 73 PID 3048 wrote to memory of 2924 3048 s3950512.exe 73 PID 3048 wrote to memory of 2924 3048 s3950512.exe 73 PID 3048 wrote to memory of 2924 3048 s3950512.exe 73 PID 3048 wrote to memory of 2924 3048 s3950512.exe 73 PID 3048 wrote to memory of 2924 3048 s3950512.exe 73 PID 3048 wrote to memory of 2924 3048 s3950512.exe 73 PID 2924 wrote to memory of 4872 2924 s3950512.exe 74 PID 2924 wrote to memory of 4872 2924 s3950512.exe 74 PID 2924 wrote to memory of 4872 2924 s3950512.exe 74 PID 4872 wrote to memory of 4960 4872 legends.exe 75 PID 4872 wrote to memory of 4960 4872 legends.exe 75 PID 4872 wrote to memory of 4960 4872 legends.exe 75 PID 4872 wrote to memory of 4960 4872 legends.exe 75 PID 4872 wrote to memory of 3460 4872 legends.exe 76 PID 4872 wrote to memory of 3460 4872 legends.exe 76 PID 4872 wrote to memory of 3460 4872 legends.exe 76 PID 4872 wrote to memory of 3460 4872 legends.exe 76 PID 4872 wrote to memory of 3460 4872 legends.exe 76 PID 4872 wrote to memory of 3460 4872 legends.exe 76 PID 4872 wrote to memory of 3460 4872 legends.exe 76 PID 4872 wrote to memory of 3460 4872 legends.exe 76 PID 4872 wrote to memory of 3460 4872 legends.exe 76 PID 4872 wrote to memory of 3460 4872 legends.exe 76 PID 3460 wrote to memory of 4820 3460 legends.exe 77 PID 3460 wrote to memory of 4820 3460 legends.exe 77 PID 3460 wrote to memory of 4820 3460 legends.exe 77 PID 3460 wrote to memory of 4456 3460 legends.exe 79 PID 3460 wrote to memory of 4456 3460 legends.exe 79 PID 3460 wrote to memory of 4456 3460 legends.exe 79 PID 4456 wrote to memory of 5028 4456 cmd.exe 81 PID 4456 wrote to memory of 5028 4456 cmd.exe 81 PID 4456 wrote to memory of 5028 4456 cmd.exe 81 PID 4456 wrote to memory of 5084 4456 cmd.exe 82 PID 4456 wrote to memory of 5084 4456 cmd.exe 82 PID 4456 wrote to memory of 5084 4456 cmd.exe 82 PID 4456 wrote to memory of 5096 4456 cmd.exe 83 PID 4456 wrote to memory of 5096 4456 cmd.exe 83 PID 4456 wrote to memory of 5096 4456 cmd.exe 83 PID 4456 wrote to memory of 5004 4456 cmd.exe 84 PID 4456 wrote to memory of 5004 4456 cmd.exe 84 PID 4456 wrote to memory of 5004 4456 cmd.exe 84 PID 4456 wrote to memory of 4696 4456 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\347dae97c50455ffe1cc13a2cb0ccb298135898ddffc27514c6e5b2ebdd116c3.exe"C:\Users\Admin\AppData\Local\Temp\347dae97c50455ffe1cc13a2cb0ccb298135898ddffc27514c6e5b2ebdd116c3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4477234.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4477234.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8136479.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8136479.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8701927.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8701927.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3771481.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3771481.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1730341.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1730341.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3950512.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3950512.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3950512.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3950512.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Executes dropped EXE
PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F6⤵
- Creates scheduled task(s)
PID:4820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5028
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"7⤵PID:5084
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E7⤵PID:5096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5004
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"7⤵PID:4696
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E7⤵PID:4300
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000027001\full_min_cr.exe"C:\Users\Admin\AppData\Local\Temp\1000027001\full_min_cr.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\1000027001\full_min_cr.exe"{path}"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4272 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:816
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:400
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:216 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:2896
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD590acfd72f14a512712b1a7380c0faf60
SHA140ba4accb8faa75887e84fb8e38d598dc8cf0f12
SHA25620806822f0c130b340504132c1461b589261fbbc518e468f4f90733ab514cb86
SHA51229dbf85e14e60868574cb4dc9bda83d3c229fb956733d8d2557f2475ee0e690ac9c2e72f31e02284996da6906ba2dbfa382a29b04c15a2406571d8ee19ad16b9
-
Filesize
425B
MD5605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
963KB
MD5ceb69b0a5767876fdcaa0e6fde7ac9d3
SHA18da3a4e39e8f2a9d973bc276df399c50d9ea355b
SHA256552831f37a71020b327e601914f9b99f012994f5da0a8955767d2f3fed449e00
SHA5127cb0104885bae80511d65886fd0b6f078e5b342830d7faee05fea27bf4a96bd047ac9979d67522e6361ccebd179f18ed337eeea299d5aebe9d170dea827a73a5
-
Filesize
963KB
MD5ceb69b0a5767876fdcaa0e6fde7ac9d3
SHA18da3a4e39e8f2a9d973bc276df399c50d9ea355b
SHA256552831f37a71020b327e601914f9b99f012994f5da0a8955767d2f3fed449e00
SHA5127cb0104885bae80511d65886fd0b6f078e5b342830d7faee05fea27bf4a96bd047ac9979d67522e6361ccebd179f18ed337eeea299d5aebe9d170dea827a73a5
-
Filesize
963KB
MD5ceb69b0a5767876fdcaa0e6fde7ac9d3
SHA18da3a4e39e8f2a9d973bc276df399c50d9ea355b
SHA256552831f37a71020b327e601914f9b99f012994f5da0a8955767d2f3fed449e00
SHA5127cb0104885bae80511d65886fd0b6f078e5b342830d7faee05fea27bf4a96bd047ac9979d67522e6361ccebd179f18ed337eeea299d5aebe9d170dea827a73a5
-
Filesize
963KB
MD5ceb69b0a5767876fdcaa0e6fde7ac9d3
SHA18da3a4e39e8f2a9d973bc276df399c50d9ea355b
SHA256552831f37a71020b327e601914f9b99f012994f5da0a8955767d2f3fed449e00
SHA5127cb0104885bae80511d65886fd0b6f078e5b342830d7faee05fea27bf4a96bd047ac9979d67522e6361ccebd179f18ed337eeea299d5aebe9d170dea827a73a5
-
Filesize
963KB
MD5ceb69b0a5767876fdcaa0e6fde7ac9d3
SHA18da3a4e39e8f2a9d973bc276df399c50d9ea355b
SHA256552831f37a71020b327e601914f9b99f012994f5da0a8955767d2f3fed449e00
SHA5127cb0104885bae80511d65886fd0b6f078e5b342830d7faee05fea27bf4a96bd047ac9979d67522e6361ccebd179f18ed337eeea299d5aebe9d170dea827a73a5
-
Filesize
963KB
MD5ceb69b0a5767876fdcaa0e6fde7ac9d3
SHA18da3a4e39e8f2a9d973bc276df399c50d9ea355b
SHA256552831f37a71020b327e601914f9b99f012994f5da0a8955767d2f3fed449e00
SHA5127cb0104885bae80511d65886fd0b6f078e5b342830d7faee05fea27bf4a96bd047ac9979d67522e6361ccebd179f18ed337eeea299d5aebe9d170dea827a73a5
-
Filesize
963KB
MD5ceb69b0a5767876fdcaa0e6fde7ac9d3
SHA18da3a4e39e8f2a9d973bc276df399c50d9ea355b
SHA256552831f37a71020b327e601914f9b99f012994f5da0a8955767d2f3fed449e00
SHA5127cb0104885bae80511d65886fd0b6f078e5b342830d7faee05fea27bf4a96bd047ac9979d67522e6361ccebd179f18ed337eeea299d5aebe9d170dea827a73a5
-
Filesize
963KB
MD5ceb69b0a5767876fdcaa0e6fde7ac9d3
SHA18da3a4e39e8f2a9d973bc276df399c50d9ea355b
SHA256552831f37a71020b327e601914f9b99f012994f5da0a8955767d2f3fed449e00
SHA5127cb0104885bae80511d65886fd0b6f078e5b342830d7faee05fea27bf4a96bd047ac9979d67522e6361ccebd179f18ed337eeea299d5aebe9d170dea827a73a5
-
Filesize
963KB
MD5ceb69b0a5767876fdcaa0e6fde7ac9d3
SHA18da3a4e39e8f2a9d973bc276df399c50d9ea355b
SHA256552831f37a71020b327e601914f9b99f012994f5da0a8955767d2f3fed449e00
SHA5127cb0104885bae80511d65886fd0b6f078e5b342830d7faee05fea27bf4a96bd047ac9979d67522e6361ccebd179f18ed337eeea299d5aebe9d170dea827a73a5
-
Filesize
963KB
MD5ceb69b0a5767876fdcaa0e6fde7ac9d3
SHA18da3a4e39e8f2a9d973bc276df399c50d9ea355b
SHA256552831f37a71020b327e601914f9b99f012994f5da0a8955767d2f3fed449e00
SHA5127cb0104885bae80511d65886fd0b6f078e5b342830d7faee05fea27bf4a96bd047ac9979d67522e6361ccebd179f18ed337eeea299d5aebe9d170dea827a73a5
-
Filesize
963KB
MD5ceb69b0a5767876fdcaa0e6fde7ac9d3
SHA18da3a4e39e8f2a9d973bc276df399c50d9ea355b
SHA256552831f37a71020b327e601914f9b99f012994f5da0a8955767d2f3fed449e00
SHA5127cb0104885bae80511d65886fd0b6f078e5b342830d7faee05fea27bf4a96bd047ac9979d67522e6361ccebd179f18ed337eeea299d5aebe9d170dea827a73a5
-
Filesize
576KB
MD5ac10505c8770da1bec566947cf7d4d7a
SHA186ecd34e8fbf9caf0a92d2140b8ef30a6b78d941
SHA2560f3551c0b3d1bb2924934849ef30cc92fd783bac190af50ff02789ccb0e16469
SHA51284e7df919e2a97da283c962f56602bd80a4c2defc00ff2a714396924aa38685e6a9192ebe720bb0454851010c39888903a78c346bb05405093a7aef1fa75f957
-
Filesize
576KB
MD5ac10505c8770da1bec566947cf7d4d7a
SHA186ecd34e8fbf9caf0a92d2140b8ef30a6b78d941
SHA2560f3551c0b3d1bb2924934849ef30cc92fd783bac190af50ff02789ccb0e16469
SHA51284e7df919e2a97da283c962f56602bd80a4c2defc00ff2a714396924aa38685e6a9192ebe720bb0454851010c39888903a78c346bb05405093a7aef1fa75f957
-
Filesize
284KB
MD5942b44054b7f7aa09c7ae00d32b275db
SHA1697428fb8b9f8a731db90b002fbf0bb2c4ed2545
SHA256f6f52fdd552d7f50b167f50d4a1f5982f42416cbcc91ea560325b99d1f2c3dc8
SHA51292b79df8dc54cecf6587366641821e6b68fb718e49c05185a2e2613a8d7c00e5c9e35e6258c70a033b09f6c423776015a44f44a928d291afd21d925ad6a6d3a7
-
Filesize
284KB
MD5942b44054b7f7aa09c7ae00d32b275db
SHA1697428fb8b9f8a731db90b002fbf0bb2c4ed2545
SHA256f6f52fdd552d7f50b167f50d4a1f5982f42416cbcc91ea560325b99d1f2c3dc8
SHA51292b79df8dc54cecf6587366641821e6b68fb718e49c05185a2e2613a8d7c00e5c9e35e6258c70a033b09f6c423776015a44f44a928d291afd21d925ad6a6d3a7
-
Filesize
304KB
MD57ed32c6678ebc834a6bfb2e3bad3ae87
SHA18399bbabd1f4b2828d7bfb73e56dedd52e75c1a7
SHA2563eb514833e4f3e2d71393a144b5595b144aec27331050cb2c268b983fcd5dac4
SHA512d88f6591d5987a124f89638cb9dc2dbe8cbeb934af4e47dc030bce87f9d181407f301e630887a11bdd9f8b695ba0a0740a2078976d9004d385969cd6f6c93357
-
Filesize
304KB
MD57ed32c6678ebc834a6bfb2e3bad3ae87
SHA18399bbabd1f4b2828d7bfb73e56dedd52e75c1a7
SHA2563eb514833e4f3e2d71393a144b5595b144aec27331050cb2c268b983fcd5dac4
SHA512d88f6591d5987a124f89638cb9dc2dbe8cbeb934af4e47dc030bce87f9d181407f301e630887a11bdd9f8b695ba0a0740a2078976d9004d385969cd6f6c93357
-
Filesize
185KB
MD53114abb2179a9067ef783318d9b20cbb
SHA16eb8f02a220e41f1c8db9d658ffa7c10c0a708e2
SHA2560868cb3981dd12f924aaab99bf498ae88ee32c7b65e2cf74bf61207e2f2d23b6
SHA51234cac48ba3655352f4156d87a561dd44f446f1f54c671a97f2e71bf18640a0040f97e5d9eb50f64428e8ef7256bb82dcccb218807eb5b4e3ffcdc4e36d51aecd
-
Filesize
185KB
MD53114abb2179a9067ef783318d9b20cbb
SHA16eb8f02a220e41f1c8db9d658ffa7c10c0a708e2
SHA2560868cb3981dd12f924aaab99bf498ae88ee32c7b65e2cf74bf61207e2f2d23b6
SHA51234cac48ba3655352f4156d87a561dd44f446f1f54c671a97f2e71bf18640a0040f97e5d9eb50f64428e8ef7256bb82dcccb218807eb5b4e3ffcdc4e36d51aecd
-
Filesize
145KB
MD5806ee2181c5d210322fa546bc7ff8e53
SHA15bc5c47aa481a455780f92e505c3a3587b865114
SHA2562eab3bc69d0ea83e19ed44029d0e5f2ec2034779fa558100f9f713ce1be1eeed
SHA512531dcf16469ea401179b692311061aab41e2eeac276e6939eeeb7f51f8168ef82dccf5612c53c821ff1217e13b8810b7a73d947fed43d53997e919b27c6afc2d
-
Filesize
145KB
MD5806ee2181c5d210322fa546bc7ff8e53
SHA15bc5c47aa481a455780f92e505c3a3587b865114
SHA2562eab3bc69d0ea83e19ed44029d0e5f2ec2034779fa558100f9f713ce1be1eeed
SHA512531dcf16469ea401179b692311061aab41e2eeac276e6939eeeb7f51f8168ef82dccf5612c53c821ff1217e13b8810b7a73d947fed43d53997e919b27c6afc2d
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643