Analysis
-
max time kernel
144s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2023 01:31
Static task
static1
Behavioral task
behavioral1
Sample
497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb.exe
Resource
win7-20230220-en
General
-
Target
497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb.exe
-
Size
787KB
-
MD5
68d8bd660ae36f0dcd4df4301491a49f
-
SHA1
a514e8a226b3db2979899d60469c500fd0562c59
-
SHA256
497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb
-
SHA512
03da332b0df7ae16abcf3e44af5887226eff595c01ba86838297f73e270b5a2d11ebedd417fe666c13b434f52a60d3109ea416bd7d30099f68338424f234a2c5
-
SSDEEP
12288:jMrEy90hg0B/wK+I0a/GNus5THgYaQ4Q2eJPoSUejGDlcUUndcwEhsli:jyH0Bl70ak5DgGdvoSUejGDlMndchso
Malware Config
Extracted
redline
rovno
83.97.73.130:19061
-
auth_value
88306b072bfae0d9e44ed86a222b439d
Extracted
redline
maxi
83.97.73.130:19061
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Processes:
b4132921.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b4132921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b4132921.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection b4132921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b4132921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b4132921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b4132921.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d8050857.exerugen.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation d8050857.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 11 IoCs
Processes:
v4833239.exev3962061.exev4978460.exea7799278.exeb4132921.exec7182530.exed8050857.exerugen.exee7893310.exerugen.exerugen.exepid process 2632 v4833239.exe 4844 v3962061.exe 2184 v4978460.exe 4164 a7799278.exe 1548 b4132921.exe 3368 c7182530.exe 4272 d8050857.exe 2180 rugen.exe 4824 e7893310.exe 4168 rugen.exe 3724 rugen.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2452 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
b4132921.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b4132921.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b4132921.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb.exev4833239.exev3962061.exev4978460.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4833239.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4833239.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3962061.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3962061.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4978460.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4978460.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
a7799278.exeb4132921.exec7182530.exee7893310.exepid process 4164 a7799278.exe 4164 a7799278.exe 1548 b4132921.exe 1548 b4132921.exe 3368 c7182530.exe 3368 c7182530.exe 4824 e7893310.exe 4824 e7893310.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
a7799278.exeb4132921.exec7182530.exee7893310.exedescription pid process Token: SeDebugPrivilege 4164 a7799278.exe Token: SeDebugPrivilege 1548 b4132921.exe Token: SeDebugPrivilege 3368 c7182530.exe Token: SeDebugPrivilege 4824 e7893310.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
d8050857.exepid process 4272 d8050857.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb.exev4833239.exev3962061.exev4978460.exed8050857.exerugen.execmd.exedescription pid process target process PID 3940 wrote to memory of 2632 3940 497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb.exe v4833239.exe PID 3940 wrote to memory of 2632 3940 497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb.exe v4833239.exe PID 3940 wrote to memory of 2632 3940 497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb.exe v4833239.exe PID 2632 wrote to memory of 4844 2632 v4833239.exe v3962061.exe PID 2632 wrote to memory of 4844 2632 v4833239.exe v3962061.exe PID 2632 wrote to memory of 4844 2632 v4833239.exe v3962061.exe PID 4844 wrote to memory of 2184 4844 v3962061.exe v4978460.exe PID 4844 wrote to memory of 2184 4844 v3962061.exe v4978460.exe PID 4844 wrote to memory of 2184 4844 v3962061.exe v4978460.exe PID 2184 wrote to memory of 4164 2184 v4978460.exe a7799278.exe PID 2184 wrote to memory of 4164 2184 v4978460.exe a7799278.exe PID 2184 wrote to memory of 4164 2184 v4978460.exe a7799278.exe PID 2184 wrote to memory of 1548 2184 v4978460.exe b4132921.exe PID 2184 wrote to memory of 1548 2184 v4978460.exe b4132921.exe PID 2184 wrote to memory of 1548 2184 v4978460.exe b4132921.exe PID 4844 wrote to memory of 3368 4844 v3962061.exe c7182530.exe PID 4844 wrote to memory of 3368 4844 v3962061.exe c7182530.exe PID 4844 wrote to memory of 3368 4844 v3962061.exe c7182530.exe PID 2632 wrote to memory of 4272 2632 v4833239.exe d8050857.exe PID 2632 wrote to memory of 4272 2632 v4833239.exe d8050857.exe PID 2632 wrote to memory of 4272 2632 v4833239.exe d8050857.exe PID 4272 wrote to memory of 2180 4272 d8050857.exe rugen.exe PID 4272 wrote to memory of 2180 4272 d8050857.exe rugen.exe PID 4272 wrote to memory of 2180 4272 d8050857.exe rugen.exe PID 3940 wrote to memory of 4824 3940 497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb.exe e7893310.exe PID 3940 wrote to memory of 4824 3940 497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb.exe e7893310.exe PID 3940 wrote to memory of 4824 3940 497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb.exe e7893310.exe PID 2180 wrote to memory of 1556 2180 rugen.exe schtasks.exe PID 2180 wrote to memory of 1556 2180 rugen.exe schtasks.exe PID 2180 wrote to memory of 1556 2180 rugen.exe schtasks.exe PID 2180 wrote to memory of 3720 2180 rugen.exe cmd.exe PID 2180 wrote to memory of 3720 2180 rugen.exe cmd.exe PID 2180 wrote to memory of 3720 2180 rugen.exe cmd.exe PID 3720 wrote to memory of 2464 3720 cmd.exe cmd.exe PID 3720 wrote to memory of 2464 3720 cmd.exe cmd.exe PID 3720 wrote to memory of 2464 3720 cmd.exe cmd.exe PID 3720 wrote to memory of 2696 3720 cmd.exe cacls.exe PID 3720 wrote to memory of 2696 3720 cmd.exe cacls.exe PID 3720 wrote to memory of 2696 3720 cmd.exe cacls.exe PID 3720 wrote to memory of 2612 3720 cmd.exe cacls.exe PID 3720 wrote to memory of 2612 3720 cmd.exe cacls.exe PID 3720 wrote to memory of 2612 3720 cmd.exe cacls.exe PID 3720 wrote to memory of 3392 3720 cmd.exe cmd.exe PID 3720 wrote to memory of 3392 3720 cmd.exe cmd.exe PID 3720 wrote to memory of 3392 3720 cmd.exe cmd.exe PID 3720 wrote to memory of 4584 3720 cmd.exe cacls.exe PID 3720 wrote to memory of 4584 3720 cmd.exe cacls.exe PID 3720 wrote to memory of 4584 3720 cmd.exe cacls.exe PID 3720 wrote to memory of 4052 3720 cmd.exe cacls.exe PID 3720 wrote to memory of 4052 3720 cmd.exe cacls.exe PID 3720 wrote to memory of 4052 3720 cmd.exe cacls.exe PID 2180 wrote to memory of 2452 2180 rugen.exe rundll32.exe PID 2180 wrote to memory of 2452 2180 rugen.exe rundll32.exe PID 2180 wrote to memory of 2452 2180 rugen.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb.exe"C:\Users\Admin\AppData\Local\Temp\497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4833239.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4833239.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3962061.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3962061.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4978460.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4978460.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7799278.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7799278.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4132921.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4132921.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7182530.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7182530.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8050857.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8050857.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:1556
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:2696
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:2612
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:4584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:4052
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2452
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e7893310.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e7893310.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4168
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59b756bc85e5324eb8f87a69e3f9959ab
SHA11778b2e2d6a00c421578a284db1e743931611d66
SHA256e347a39e49ca8c835cc47d3f039230969e7c4156089f2e83e8a0aed1df88016e
SHA512c897af3307e3c3163762021f49934ac5fbeab27f123e814bc390bdf1f0ed46671afeadcc87a8a4b18ddf13f4abd0d8ef00343af91ff999d7d447c96505d866d8
-
Filesize
205KB
MD5d07ba8a664d4975c09c5f3f7466d63b2
SHA118000001c51e5ae6331fe0af325ab7afe3be3805
SHA256b14b683234bd237221ad730c33a2053a7606dcc3396ffc6cb6853f9fdde3123d
SHA512e0869634f2f3da631dd4584ee0af7c52ea881408434714a3ce5eb5eda39ddf1be94a9418d727950c7db5231c616c8dcaacb3652d28b7069865fbbe18a9639f8b
-
Filesize
205KB
MD5d07ba8a664d4975c09c5f3f7466d63b2
SHA118000001c51e5ae6331fe0af325ab7afe3be3805
SHA256b14b683234bd237221ad730c33a2053a7606dcc3396ffc6cb6853f9fdde3123d
SHA512e0869634f2f3da631dd4584ee0af7c52ea881408434714a3ce5eb5eda39ddf1be94a9418d727950c7db5231c616c8dcaacb3652d28b7069865fbbe18a9639f8b
-
Filesize
205KB
MD5d07ba8a664d4975c09c5f3f7466d63b2
SHA118000001c51e5ae6331fe0af325ab7afe3be3805
SHA256b14b683234bd237221ad730c33a2053a7606dcc3396ffc6cb6853f9fdde3123d
SHA512e0869634f2f3da631dd4584ee0af7c52ea881408434714a3ce5eb5eda39ddf1be94a9418d727950c7db5231c616c8dcaacb3652d28b7069865fbbe18a9639f8b
-
Filesize
205KB
MD5d07ba8a664d4975c09c5f3f7466d63b2
SHA118000001c51e5ae6331fe0af325ab7afe3be3805
SHA256b14b683234bd237221ad730c33a2053a7606dcc3396ffc6cb6853f9fdde3123d
SHA512e0869634f2f3da631dd4584ee0af7c52ea881408434714a3ce5eb5eda39ddf1be94a9418d727950c7db5231c616c8dcaacb3652d28b7069865fbbe18a9639f8b
-
Filesize
205KB
MD5d07ba8a664d4975c09c5f3f7466d63b2
SHA118000001c51e5ae6331fe0af325ab7afe3be3805
SHA256b14b683234bd237221ad730c33a2053a7606dcc3396ffc6cb6853f9fdde3123d
SHA512e0869634f2f3da631dd4584ee0af7c52ea881408434714a3ce5eb5eda39ddf1be94a9418d727950c7db5231c616c8dcaacb3652d28b7069865fbbe18a9639f8b
-
Filesize
255KB
MD5ce0fa4a6a2738ca934076ceee984d8a5
SHA1f0b082a70cd05730b5da45917145e69ebe7ed5de
SHA2565109f9343cfb707886f307849cacb4bccf7cc22aca9287acc37226a5d937cef7
SHA512617504bda52d75f3877e0515f473873c033217d803058f600a46177dcfb440803fd80a3f871d5ad523c7f954f018854b6ed587bfcefbd194e04d30ada1100935
-
Filesize
255KB
MD5ce0fa4a6a2738ca934076ceee984d8a5
SHA1f0b082a70cd05730b5da45917145e69ebe7ed5de
SHA2565109f9343cfb707886f307849cacb4bccf7cc22aca9287acc37226a5d937cef7
SHA512617504bda52d75f3877e0515f473873c033217d803058f600a46177dcfb440803fd80a3f871d5ad523c7f954f018854b6ed587bfcefbd194e04d30ada1100935
-
Filesize
588KB
MD53a77675e8366a62779d5353dda580d3a
SHA1aef0b123829ddb58ebb140be86bdcc14d7a346ab
SHA256267450f7e17b8e31771f78e91890bd863d9bb3a9ebb91adf5287f969c4cef46f
SHA512592017a44f6531dd81ed1067cb403604503a505e8840af4ed5013dc96d6af7fb7c755ffdb65610b3997487ab28090aa320ee8d70146a64d72548fdc958da02aa
-
Filesize
588KB
MD53a77675e8366a62779d5353dda580d3a
SHA1aef0b123829ddb58ebb140be86bdcc14d7a346ab
SHA256267450f7e17b8e31771f78e91890bd863d9bb3a9ebb91adf5287f969c4cef46f
SHA512592017a44f6531dd81ed1067cb403604503a505e8840af4ed5013dc96d6af7fb7c755ffdb65610b3997487ab28090aa320ee8d70146a64d72548fdc958da02aa
-
Filesize
205KB
MD5d07ba8a664d4975c09c5f3f7466d63b2
SHA118000001c51e5ae6331fe0af325ab7afe3be3805
SHA256b14b683234bd237221ad730c33a2053a7606dcc3396ffc6cb6853f9fdde3123d
SHA512e0869634f2f3da631dd4584ee0af7c52ea881408434714a3ce5eb5eda39ddf1be94a9418d727950c7db5231c616c8dcaacb3652d28b7069865fbbe18a9639f8b
-
Filesize
205KB
MD5d07ba8a664d4975c09c5f3f7466d63b2
SHA118000001c51e5ae6331fe0af325ab7afe3be3805
SHA256b14b683234bd237221ad730c33a2053a7606dcc3396ffc6cb6853f9fdde3123d
SHA512e0869634f2f3da631dd4584ee0af7c52ea881408434714a3ce5eb5eda39ddf1be94a9418d727950c7db5231c616c8dcaacb3652d28b7069865fbbe18a9639f8b
-
Filesize
416KB
MD5813fe8ae13a4dab9e3c7e0191a0a4d97
SHA14542686f24e1ac4e35c64868ea55ba36addd0ceb
SHA25611c88e0bbf8da709f505d0808d9b8803a34444000b1de9dfa87378b6795c6afd
SHA512acce79661b3ce2a1e5b700a26afc9a67bf4501c1161fc0ac8084e1ae4cbb9e83b3d452fad880f04620f437e259e8545602a60c8bd258724c2046796ee7e9595b
-
Filesize
416KB
MD5813fe8ae13a4dab9e3c7e0191a0a4d97
SHA14542686f24e1ac4e35c64868ea55ba36addd0ceb
SHA25611c88e0bbf8da709f505d0808d9b8803a34444000b1de9dfa87378b6795c6afd
SHA512acce79661b3ce2a1e5b700a26afc9a67bf4501c1161fc0ac8084e1ae4cbb9e83b3d452fad880f04620f437e259e8545602a60c8bd258724c2046796ee7e9595b
-
Filesize
172KB
MD561f8b015e0f0be1a253e6d1ff61568d8
SHA1512ee7da17e5f30b06fd9f6c94300af00598aa4e
SHA256be5f01fabfc4a6eeda42cfe3e043021538134859e0706d85ad7e3f133c2743ea
SHA5126df11477b4e9a64199a04241a1dd2e395fe1c045ee689b82d3945f8288557c46866454f2529701ed0a1b9a98e0274e163db6eee12e99056e1eb807ef1cdc897f
-
Filesize
172KB
MD561f8b015e0f0be1a253e6d1ff61568d8
SHA1512ee7da17e5f30b06fd9f6c94300af00598aa4e
SHA256be5f01fabfc4a6eeda42cfe3e043021538134859e0706d85ad7e3f133c2743ea
SHA5126df11477b4e9a64199a04241a1dd2e395fe1c045ee689b82d3945f8288557c46866454f2529701ed0a1b9a98e0274e163db6eee12e99056e1eb807ef1cdc897f
-
Filesize
261KB
MD5becd14a2a888653bbedf2e3b40cf3ffd
SHA148e29027f6d29383adad75efa068a202a5cc29ff
SHA2564e852f7942524676e911909438759e3c984c2caf5b0e576895dfed2eb2863459
SHA5124c1c01e7904ed6ac7b1fbdd05c2d85040273b1e76924c5f72bae1d6aca384a34ef66fd39f174a1b6112a4f9b1dc7ad81c37bc559ab49433ac1885f4a9f1692e3
-
Filesize
261KB
MD5becd14a2a888653bbedf2e3b40cf3ffd
SHA148e29027f6d29383adad75efa068a202a5cc29ff
SHA2564e852f7942524676e911909438759e3c984c2caf5b0e576895dfed2eb2863459
SHA5124c1c01e7904ed6ac7b1fbdd05c2d85040273b1e76924c5f72bae1d6aca384a34ef66fd39f174a1b6112a4f9b1dc7ad81c37bc559ab49433ac1885f4a9f1692e3
-
Filesize
255KB
MD533569735b87a9c6bebc5632c59197486
SHA12ee77cdaa4d4c9b482e43a9df24b85fd24ac00e9
SHA256e4a50f334784e31370a4a1a4ab6b3fa37ad50f6e2c14192edd9fb074cb5abf06
SHA512c018531f6b9315e3ac03cd349cf5283ae4d1de112f24167324cf57781551f0901617882f639d63ad1b198a54160541f4b08d5d82a2f99169c5dcc11e5dc0ba21
-
Filesize
255KB
MD533569735b87a9c6bebc5632c59197486
SHA12ee77cdaa4d4c9b482e43a9df24b85fd24ac00e9
SHA256e4a50f334784e31370a4a1a4ab6b3fa37ad50f6e2c14192edd9fb074cb5abf06
SHA512c018531f6b9315e3ac03cd349cf5283ae4d1de112f24167324cf57781551f0901617882f639d63ad1b198a54160541f4b08d5d82a2f99169c5dcc11e5dc0ba21
-
Filesize
255KB
MD533569735b87a9c6bebc5632c59197486
SHA12ee77cdaa4d4c9b482e43a9df24b85fd24ac00e9
SHA256e4a50f334784e31370a4a1a4ab6b3fa37ad50f6e2c14192edd9fb074cb5abf06
SHA512c018531f6b9315e3ac03cd349cf5283ae4d1de112f24167324cf57781551f0901617882f639d63ad1b198a54160541f4b08d5d82a2f99169c5dcc11e5dc0ba21
-
Filesize
94KB
MD56842c862d3abeace146bee9bb131c364
SHA166432a635c01662a3121c0d0cc7f7d65c86a0701
SHA25658fc05aa4283ed9854d3d41044a00e39738f5c95732e8117950a700c1be7b297
SHA5121d43a38ed81795a919f74d4fb6acd70b46b234f14196f44edfb1a9cb8aa40621fbb4642af88d235405dc198334d1d5670e3850011c54dc7cb91b48e3f93f1a1b
-
Filesize
94KB
MD56842c862d3abeace146bee9bb131c364
SHA166432a635c01662a3121c0d0cc7f7d65c86a0701
SHA25658fc05aa4283ed9854d3d41044a00e39738f5c95732e8117950a700c1be7b297
SHA5121d43a38ed81795a919f74d4fb6acd70b46b234f14196f44edfb1a9cb8aa40621fbb4642af88d235405dc198334d1d5670e3850011c54dc7cb91b48e3f93f1a1b
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5