Analysis
-
max time kernel
101s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2023, 03:28
Static task
static1
General
-
Target
bc47601fd88e757ca07e86f30e053b3f15d0a0786f3e6409d4153b43ba3d8b4b.exe
-
Size
722KB
-
MD5
4d6016626e7ee8d2f2cf386df31e479d
-
SHA1
9c445995a5755858d142d677933092da2892a8af
-
SHA256
bc47601fd88e757ca07e86f30e053b3f15d0a0786f3e6409d4153b43ba3d8b4b
-
SHA512
e66d7960152ecb65a9ef7e094c2f421e0d5d5c20b031e49b9d5e42c16479e690be9615c0d93b9bb3cda04031ea4bfabef2193649a89900c0e7cf4ffc480e1330
-
SSDEEP
12288:bMrVy90aVbY0OAlppB1eYYu4L/VcFiAR8vFuUQRsk3uRa7S6XP7fbsR6z/NmPaD:iy7bYGpB1ZJFLR8ARswus26f7Dz/NfD
Malware Config
Extracted
redline
dana
83.97.73.130:19061
-
auth_value
da2d1691db653e49676d799e1eae2673
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
joker
83.97.73.130:19061
-
auth_value
a98d303cc28bb3b32a23c59214ae3bc0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7970358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7970358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7970358.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection j5091240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" j5091240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" j5091240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" j5091240.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k7970358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7970358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7970358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" j5091240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" j5091240.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m6287563.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 11 IoCs
pid Process 2612 y1740159.exe 1588 y7589507.exe 4452 y1378063.exe 4116 j5091240.exe 4572 k7970358.exe 800 l6468427.exe 3224 m6287563.exe 4472 rugen.exe 3660 n4866998.exe 4640 rugen.exe 2156 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 2120 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features j5091240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" j5091240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k7970358.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1740159.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1740159.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7589507.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y7589507.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1378063.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y1378063.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bc47601fd88e757ca07e86f30e053b3f15d0a0786f3e6409d4153b43ba3d8b4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bc47601fd88e757ca07e86f30e053b3f15d0a0786f3e6409d4153b43ba3d8b4b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4116 j5091240.exe 4116 j5091240.exe 4572 k7970358.exe 4572 k7970358.exe 800 l6468427.exe 800 l6468427.exe 3660 n4866998.exe 3660 n4866998.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4116 j5091240.exe Token: SeDebugPrivilege 4572 k7970358.exe Token: SeDebugPrivilege 800 l6468427.exe Token: SeDebugPrivilege 3660 n4866998.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3224 m6287563.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2612 1976 bc47601fd88e757ca07e86f30e053b3f15d0a0786f3e6409d4153b43ba3d8b4b.exe 83 PID 1976 wrote to memory of 2612 1976 bc47601fd88e757ca07e86f30e053b3f15d0a0786f3e6409d4153b43ba3d8b4b.exe 83 PID 1976 wrote to memory of 2612 1976 bc47601fd88e757ca07e86f30e053b3f15d0a0786f3e6409d4153b43ba3d8b4b.exe 83 PID 2612 wrote to memory of 1588 2612 y1740159.exe 84 PID 2612 wrote to memory of 1588 2612 y1740159.exe 84 PID 2612 wrote to memory of 1588 2612 y1740159.exe 84 PID 1588 wrote to memory of 4452 1588 y7589507.exe 85 PID 1588 wrote to memory of 4452 1588 y7589507.exe 85 PID 1588 wrote to memory of 4452 1588 y7589507.exe 85 PID 4452 wrote to memory of 4116 4452 y1378063.exe 86 PID 4452 wrote to memory of 4116 4452 y1378063.exe 86 PID 4452 wrote to memory of 4116 4452 y1378063.exe 86 PID 4452 wrote to memory of 4572 4452 y1378063.exe 88 PID 4452 wrote to memory of 4572 4452 y1378063.exe 88 PID 1588 wrote to memory of 800 1588 y7589507.exe 89 PID 1588 wrote to memory of 800 1588 y7589507.exe 89 PID 1588 wrote to memory of 800 1588 y7589507.exe 89 PID 2612 wrote to memory of 3224 2612 y1740159.exe 92 PID 2612 wrote to memory of 3224 2612 y1740159.exe 92 PID 2612 wrote to memory of 3224 2612 y1740159.exe 92 PID 3224 wrote to memory of 4472 3224 m6287563.exe 93 PID 3224 wrote to memory of 4472 3224 m6287563.exe 93 PID 3224 wrote to memory of 4472 3224 m6287563.exe 93 PID 1976 wrote to memory of 3660 1976 bc47601fd88e757ca07e86f30e053b3f15d0a0786f3e6409d4153b43ba3d8b4b.exe 94 PID 1976 wrote to memory of 3660 1976 bc47601fd88e757ca07e86f30e053b3f15d0a0786f3e6409d4153b43ba3d8b4b.exe 94 PID 1976 wrote to memory of 3660 1976 bc47601fd88e757ca07e86f30e053b3f15d0a0786f3e6409d4153b43ba3d8b4b.exe 94 PID 4472 wrote to memory of 3760 4472 rugen.exe 96 PID 4472 wrote to memory of 3760 4472 rugen.exe 96 PID 4472 wrote to memory of 3760 4472 rugen.exe 96 PID 4472 wrote to memory of 3272 4472 rugen.exe 98 PID 4472 wrote to memory of 3272 4472 rugen.exe 98 PID 4472 wrote to memory of 3272 4472 rugen.exe 98 PID 3272 wrote to memory of 2196 3272 cmd.exe 100 PID 3272 wrote to memory of 2196 3272 cmd.exe 100 PID 3272 wrote to memory of 2196 3272 cmd.exe 100 PID 3272 wrote to memory of 3480 3272 cmd.exe 101 PID 3272 wrote to memory of 3480 3272 cmd.exe 101 PID 3272 wrote to memory of 3480 3272 cmd.exe 101 PID 3272 wrote to memory of 1188 3272 cmd.exe 102 PID 3272 wrote to memory of 1188 3272 cmd.exe 102 PID 3272 wrote to memory of 1188 3272 cmd.exe 102 PID 3272 wrote to memory of 4432 3272 cmd.exe 103 PID 3272 wrote to memory of 4432 3272 cmd.exe 103 PID 3272 wrote to memory of 4432 3272 cmd.exe 103 PID 3272 wrote to memory of 1548 3272 cmd.exe 104 PID 3272 wrote to memory of 1548 3272 cmd.exe 104 PID 3272 wrote to memory of 1548 3272 cmd.exe 104 PID 3272 wrote to memory of 4348 3272 cmd.exe 105 PID 3272 wrote to memory of 4348 3272 cmd.exe 105 PID 3272 wrote to memory of 4348 3272 cmd.exe 105 PID 4472 wrote to memory of 2120 4472 rugen.exe 107 PID 4472 wrote to memory of 2120 4472 rugen.exe 107 PID 4472 wrote to memory of 2120 4472 rugen.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc47601fd88e757ca07e86f30e053b3f15d0a0786f3e6409d4153b43ba3d8b4b.exe"C:\Users\Admin\AppData\Local\Temp\bc47601fd88e757ca07e86f30e053b3f15d0a0786f3e6409d4153b43ba3d8b4b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1740159.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1740159.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7589507.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7589507.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y1378063.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y1378063.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j5091240.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j5091240.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k7970358.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k7970358.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6468427.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6468427.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6287563.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6287563.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:3760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2196
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:3480
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:1188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4432
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:1548
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:4348
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2120
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4866998.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4866998.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4640
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:2156
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
205KB
MD534d9a6bbe292d18ec2ba4f96380f0c43
SHA1cbc07a37958f6617f7b28558368404b05a062db1
SHA25631ccbd3bb656f3172e3d01fcbdea5cf0729aa6b10272445de92b6dd053124d2d
SHA512cac1dbadc2b084c94e0233046a0d541a0571ce1594622273bac82ad1f800328a3d0408b3750abce2d018b14d2dc0e4f54babcb4291d2c7c14ac805aa7acec997
-
Filesize
205KB
MD534d9a6bbe292d18ec2ba4f96380f0c43
SHA1cbc07a37958f6617f7b28558368404b05a062db1
SHA25631ccbd3bb656f3172e3d01fcbdea5cf0729aa6b10272445de92b6dd053124d2d
SHA512cac1dbadc2b084c94e0233046a0d541a0571ce1594622273bac82ad1f800328a3d0408b3750abce2d018b14d2dc0e4f54babcb4291d2c7c14ac805aa7acec997
-
Filesize
205KB
MD534d9a6bbe292d18ec2ba4f96380f0c43
SHA1cbc07a37958f6617f7b28558368404b05a062db1
SHA25631ccbd3bb656f3172e3d01fcbdea5cf0729aa6b10272445de92b6dd053124d2d
SHA512cac1dbadc2b084c94e0233046a0d541a0571ce1594622273bac82ad1f800328a3d0408b3750abce2d018b14d2dc0e4f54babcb4291d2c7c14ac805aa7acec997
-
Filesize
205KB
MD534d9a6bbe292d18ec2ba4f96380f0c43
SHA1cbc07a37958f6617f7b28558368404b05a062db1
SHA25631ccbd3bb656f3172e3d01fcbdea5cf0729aa6b10272445de92b6dd053124d2d
SHA512cac1dbadc2b084c94e0233046a0d541a0571ce1594622273bac82ad1f800328a3d0408b3750abce2d018b14d2dc0e4f54babcb4291d2c7c14ac805aa7acec997
-
Filesize
205KB
MD534d9a6bbe292d18ec2ba4f96380f0c43
SHA1cbc07a37958f6617f7b28558368404b05a062db1
SHA25631ccbd3bb656f3172e3d01fcbdea5cf0729aa6b10272445de92b6dd053124d2d
SHA512cac1dbadc2b084c94e0233046a0d541a0571ce1594622273bac82ad1f800328a3d0408b3750abce2d018b14d2dc0e4f54babcb4291d2c7c14ac805aa7acec997
-
Filesize
256KB
MD5f1a0f9e62bce50ecb7e68e2d1d899180
SHA130d10acfc6ae3e7aaa7d5abb0f82eb5378288955
SHA2566bb1146ccc542add6af2c6750a051012595608fbca65fb558386eeac5f67d132
SHA51278095748eb36ec8f00e7d8bded7ad2c8dd37f2361546e5574fa7063809ff00c330c2eb6f869b377fcd3b92ed2831b3e545250e0876f6a97bfd550638c63a48a4
-
Filesize
256KB
MD5f1a0f9e62bce50ecb7e68e2d1d899180
SHA130d10acfc6ae3e7aaa7d5abb0f82eb5378288955
SHA2566bb1146ccc542add6af2c6750a051012595608fbca65fb558386eeac5f67d132
SHA51278095748eb36ec8f00e7d8bded7ad2c8dd37f2361546e5574fa7063809ff00c330c2eb6f869b377fcd3b92ed2831b3e545250e0876f6a97bfd550638c63a48a4
-
Filesize
523KB
MD54bbc0942ee9c68352bb84605013eb4a1
SHA1aeb8ae23b50f30ec686fd24edcd8ef39d18a780c
SHA256d2dfb81f838f17fbfe765e6bfbce83248c76865e361c5bc00fc6450ecb4f3140
SHA5126c03669fbcfd0862a9ea14c984889b35083f2c82ac11b4d440d7f5439bfed06afd152c9befd80d522cdf9a388bc51507501dcb31f763476e6648cbd14f0b31b0
-
Filesize
523KB
MD54bbc0942ee9c68352bb84605013eb4a1
SHA1aeb8ae23b50f30ec686fd24edcd8ef39d18a780c
SHA256d2dfb81f838f17fbfe765e6bfbce83248c76865e361c5bc00fc6450ecb4f3140
SHA5126c03669fbcfd0862a9ea14c984889b35083f2c82ac11b4d440d7f5439bfed06afd152c9befd80d522cdf9a388bc51507501dcb31f763476e6648cbd14f0b31b0
-
Filesize
205KB
MD534d9a6bbe292d18ec2ba4f96380f0c43
SHA1cbc07a37958f6617f7b28558368404b05a062db1
SHA25631ccbd3bb656f3172e3d01fcbdea5cf0729aa6b10272445de92b6dd053124d2d
SHA512cac1dbadc2b084c94e0233046a0d541a0571ce1594622273bac82ad1f800328a3d0408b3750abce2d018b14d2dc0e4f54babcb4291d2c7c14ac805aa7acec997
-
Filesize
205KB
MD534d9a6bbe292d18ec2ba4f96380f0c43
SHA1cbc07a37958f6617f7b28558368404b05a062db1
SHA25631ccbd3bb656f3172e3d01fcbdea5cf0729aa6b10272445de92b6dd053124d2d
SHA512cac1dbadc2b084c94e0233046a0d541a0571ce1594622273bac82ad1f800328a3d0408b3750abce2d018b14d2dc0e4f54babcb4291d2c7c14ac805aa7acec997
-
Filesize
351KB
MD50eb730dd71ffc80b9824eda44538fcd0
SHA13b5b9ce33e91f46bba382aee0706742e114b5db5
SHA2565dcf3319537bcb790d8251736432383a92b8b4b47014ae2d13be4c7283a270fc
SHA512a500b94b3e71b58354c93f64eddcfe9403c1d6165d3f716d54c47fd96ba9c2a09878ff781c65f5175359aae4f1ae10fa78c13b89fcdb34e40395fc0e15a61663
-
Filesize
351KB
MD50eb730dd71ffc80b9824eda44538fcd0
SHA13b5b9ce33e91f46bba382aee0706742e114b5db5
SHA2565dcf3319537bcb790d8251736432383a92b8b4b47014ae2d13be4c7283a270fc
SHA512a500b94b3e71b58354c93f64eddcfe9403c1d6165d3f716d54c47fd96ba9c2a09878ff781c65f5175359aae4f1ae10fa78c13b89fcdb34e40395fc0e15a61663
-
Filesize
173KB
MD584b5c645b52d49eed7aa15f9cedf098f
SHA1459489ca1762bee7612d37404df4f6c45bf23ee2
SHA256678c3cd9b27a9212bb71e4882ad9d6e886c1f0763a1efa9cde24eafc525e36e4
SHA51230c5ebea98828756b0c5990acfe68d91d1857c0b30d7186bee2dcae1e599c5798a98252456ee108d38d684bc41b3257be681f960589e16f5cc855190d6c6e126
-
Filesize
173KB
MD584b5c645b52d49eed7aa15f9cedf098f
SHA1459489ca1762bee7612d37404df4f6c45bf23ee2
SHA256678c3cd9b27a9212bb71e4882ad9d6e886c1f0763a1efa9cde24eafc525e36e4
SHA51230c5ebea98828756b0c5990acfe68d91d1857c0b30d7186bee2dcae1e599c5798a98252456ee108d38d684bc41b3257be681f960589e16f5cc855190d6c6e126
-
Filesize
196KB
MD5d2d28bc9adfd8d0a600939dd72d7503b
SHA11dd4141d9b01963ba0f5e9330e6e54af20cda5ab
SHA25646d0da61baaf27e1e3ebef208848ef0cbbeaa8e9f2df000dd02a8530897f9034
SHA512ec1cbd55aeedcb12c07f851dfe05953f64f14ab2403c8d6db18a082fba3a2e1746c144a6b667efd41caefd3b740fd6dde41d51323b0f4efa56ee42ee6ea9a85c
-
Filesize
196KB
MD5d2d28bc9adfd8d0a600939dd72d7503b
SHA11dd4141d9b01963ba0f5e9330e6e54af20cda5ab
SHA25646d0da61baaf27e1e3ebef208848ef0cbbeaa8e9f2df000dd02a8530897f9034
SHA512ec1cbd55aeedcb12c07f851dfe05953f64f14ab2403c8d6db18a082fba3a2e1746c144a6b667efd41caefd3b740fd6dde41d51323b0f4efa56ee42ee6ea9a85c
-
Filesize
94KB
MD598d5bc91ae08c5009519ae7ef0a38445
SHA13196f60e517bd14c3e2bfb4ab5ccd19c9f446679
SHA2568f5a6ef701964ba95c1c2d2cf74d13392ac06e3a2152842dc1eb86cc3cd89ebb
SHA51222914f76d5373154307ae628636529d99e3775951b048bcee4d83d2fe38c38c8bc0a8ad8775b7553c6a59b38aa717acb701f91021d4aadf75fb50bd9ccdba591
-
Filesize
94KB
MD598d5bc91ae08c5009519ae7ef0a38445
SHA13196f60e517bd14c3e2bfb4ab5ccd19c9f446679
SHA2568f5a6ef701964ba95c1c2d2cf74d13392ac06e3a2152842dc1eb86cc3cd89ebb
SHA51222914f76d5373154307ae628636529d99e3775951b048bcee4d83d2fe38c38c8bc0a8ad8775b7553c6a59b38aa717acb701f91021d4aadf75fb50bd9ccdba591
-
Filesize
11KB
MD54fd9c93c320ae8b1cce22919de97d7bc
SHA10cb9358cec7545e1b02411151db5b5aac490d202
SHA25691304d353f0a65c5dec191baee663f640c6750750fdc17a0b46cc116c7983173
SHA51235cc280be010bf92689a63c20c3ccc4eae4de33744c64d3a02bf562025d8567b222ffd0083098da74f10deff122d1a72d10451e140747b595a5bdcd616f525b7
-
Filesize
11KB
MD54fd9c93c320ae8b1cce22919de97d7bc
SHA10cb9358cec7545e1b02411151db5b5aac490d202
SHA25691304d353f0a65c5dec191baee663f640c6750750fdc17a0b46cc116c7983173
SHA51235cc280be010bf92689a63c20c3ccc4eae4de33744c64d3a02bf562025d8567b222ffd0083098da74f10deff122d1a72d10451e140747b595a5bdcd616f525b7
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5