Analysis
-
max time kernel
101s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
23-06-2023 07:39
Static task
static1
Behavioral task
behavioral1
Sample
07941099.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
07941099.exe
Resource
win10v2004-20230621-en
General
-
Target
07941099.exe
-
Size
736KB
-
MD5
4875bbb4da8ac597c5af153471225b45
-
SHA1
ae602d908e0cb1c94663ae2d41970298bd0f94a0
-
SHA256
307fc7edc0054a9ae8149641a8ae9c4767b2ecc2ba22e7e966ebd14772f776d8
-
SHA512
402e84bdda2d42e528e23fa9382ebbfbfb65ebde763682c45f1f1e4522ff76e7ec13a90d737b9fc728c7614a4d7d7d88f803f06637fc55b46cbe948ea4536e4f
-
SSDEEP
12288:6NvqURiAU0V6hwAphMWHxznz3Z0FsDMbFh1vuAltgkDoYqtu3ZsI:6QEU0GhzZAuCbk5u3S
Malware Config
Extracted
redline
furga
83.97.73.128:19071
-
auth_value
1b7af6db7a79a3475798fcf494818be7
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Processes:
k6351457.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k6351457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6351457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6351457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6351457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6351457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6351457.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
y8357323.exek6351457.exel4517762.exen4864069.exerugen.exerugen.exerugen.exepid process 1100 y8357323.exe 1508 k6351457.exe 1408 l4517762.exe 1600 n4864069.exe 2012 rugen.exe 628 rugen.exe 1744 rugen.exe -
Loads dropped DLL 14 IoCs
Processes:
07941099.exey8357323.exek6351457.exel4517762.exen4864069.exerundll32.exepid process 1824 07941099.exe 1100 y8357323.exe 1100 y8357323.exe 1100 y8357323.exe 1508 k6351457.exe 1100 y8357323.exe 1100 y8357323.exe 1408 l4517762.exe 1824 07941099.exe 1600 n4864069.exe 1100 rundll32.exe 1100 rundll32.exe 1100 rundll32.exe 1100 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
k6351457.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k6351457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k6351457.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
07941099.exey8357323.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 07941099.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 07941099.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8357323.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8357323.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
k6351457.exel4517762.exepid process 1508 k6351457.exe 1508 k6351457.exe 1408 l4517762.exe 1408 l4517762.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
k6351457.exel4517762.exedescription pid process Token: SeDebugPrivilege 1508 k6351457.exe Token: SeDebugPrivilege 1408 l4517762.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
n4864069.exepid process 1600 n4864069.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
07941099.exey8357323.exen4864069.exerugen.execmd.exetaskeng.exedescription pid process target process PID 1824 wrote to memory of 1100 1824 07941099.exe y8357323.exe PID 1824 wrote to memory of 1100 1824 07941099.exe y8357323.exe PID 1824 wrote to memory of 1100 1824 07941099.exe y8357323.exe PID 1824 wrote to memory of 1100 1824 07941099.exe y8357323.exe PID 1824 wrote to memory of 1100 1824 07941099.exe y8357323.exe PID 1824 wrote to memory of 1100 1824 07941099.exe y8357323.exe PID 1824 wrote to memory of 1100 1824 07941099.exe y8357323.exe PID 1100 wrote to memory of 1508 1100 y8357323.exe k6351457.exe PID 1100 wrote to memory of 1508 1100 y8357323.exe k6351457.exe PID 1100 wrote to memory of 1508 1100 y8357323.exe k6351457.exe PID 1100 wrote to memory of 1508 1100 y8357323.exe k6351457.exe PID 1100 wrote to memory of 1508 1100 y8357323.exe k6351457.exe PID 1100 wrote to memory of 1508 1100 y8357323.exe k6351457.exe PID 1100 wrote to memory of 1508 1100 y8357323.exe k6351457.exe PID 1100 wrote to memory of 1408 1100 y8357323.exe l4517762.exe PID 1100 wrote to memory of 1408 1100 y8357323.exe l4517762.exe PID 1100 wrote to memory of 1408 1100 y8357323.exe l4517762.exe PID 1100 wrote to memory of 1408 1100 y8357323.exe l4517762.exe PID 1100 wrote to memory of 1408 1100 y8357323.exe l4517762.exe PID 1100 wrote to memory of 1408 1100 y8357323.exe l4517762.exe PID 1100 wrote to memory of 1408 1100 y8357323.exe l4517762.exe PID 1824 wrote to memory of 1600 1824 07941099.exe n4864069.exe PID 1824 wrote to memory of 1600 1824 07941099.exe n4864069.exe PID 1824 wrote to memory of 1600 1824 07941099.exe n4864069.exe PID 1824 wrote to memory of 1600 1824 07941099.exe n4864069.exe PID 1600 wrote to memory of 2012 1600 n4864069.exe rugen.exe PID 1600 wrote to memory of 2012 1600 n4864069.exe rugen.exe PID 1600 wrote to memory of 2012 1600 n4864069.exe rugen.exe PID 1600 wrote to memory of 2012 1600 n4864069.exe rugen.exe PID 2012 wrote to memory of 868 2012 rugen.exe schtasks.exe PID 2012 wrote to memory of 868 2012 rugen.exe schtasks.exe PID 2012 wrote to memory of 868 2012 rugen.exe schtasks.exe PID 2012 wrote to memory of 868 2012 rugen.exe schtasks.exe PID 2012 wrote to memory of 1620 2012 rugen.exe cmd.exe PID 2012 wrote to memory of 1620 2012 rugen.exe cmd.exe PID 2012 wrote to memory of 1620 2012 rugen.exe cmd.exe PID 2012 wrote to memory of 1620 2012 rugen.exe cmd.exe PID 1620 wrote to memory of 648 1620 cmd.exe cmd.exe PID 1620 wrote to memory of 648 1620 cmd.exe cmd.exe PID 1620 wrote to memory of 648 1620 cmd.exe cmd.exe PID 1620 wrote to memory of 648 1620 cmd.exe cmd.exe PID 1620 wrote to memory of 268 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 268 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 268 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 268 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 1312 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 1312 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 1312 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 1312 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 1796 1620 cmd.exe cmd.exe PID 1620 wrote to memory of 1796 1620 cmd.exe cmd.exe PID 1620 wrote to memory of 1796 1620 cmd.exe cmd.exe PID 1620 wrote to memory of 1796 1620 cmd.exe cmd.exe PID 1620 wrote to memory of 1712 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 1712 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 1712 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 1712 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 880 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 880 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 880 1620 cmd.exe cacls.exe PID 1620 wrote to memory of 880 1620 cmd.exe cacls.exe PID 1780 wrote to memory of 628 1780 taskeng.exe rugen.exe PID 1780 wrote to memory of 628 1780 taskeng.exe rugen.exe PID 1780 wrote to memory of 628 1780 taskeng.exe rugen.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07941099.exe"C:\Users\Admin\AppData\Local\Temp\07941099.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8357323.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8357323.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6351457.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6351457.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4517762.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4517762.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4864069.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4864069.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:868
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:268
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:1312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1796
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:1712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:880
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1100
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {EDE23D0D-22A1-452D-A653-2E03ACBBF5FC} S-1-5-21-4102714285-680558483-2379744688-1000:ZKKYSKKQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe2⤵
- Executes dropped EXE
PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe2⤵
- Executes dropped EXE
PID:1744
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
334KB
MD50ea80a0cdfcb4e2ac58f9da9c4562de7
SHA199478a7ca3942556a288a9e5920d76e8aaf05801
SHA2568b8cd82f9ad2a064dd02ccb9c10bc43d5986342559f9aa8ce816597a2fc32bb8
SHA512976beba9a454467335526589f610c980c2dbb72b80d2e190f61c636466fb58dc81cdddc754f3c69aef5be21d762f49661c11634ed5121d3b4296d8244c9f157e
-
Filesize
334KB
MD50ea80a0cdfcb4e2ac58f9da9c4562de7
SHA199478a7ca3942556a288a9e5920d76e8aaf05801
SHA2568b8cd82f9ad2a064dd02ccb9c10bc43d5986342559f9aa8ce816597a2fc32bb8
SHA512976beba9a454467335526589f610c980c2dbb72b80d2e190f61c636466fb58dc81cdddc754f3c69aef5be21d762f49661c11634ed5121d3b4296d8244c9f157e
-
Filesize
240KB
MD5c23f9734316e37cbe8e6e9e738f95051
SHA163326d08d29fbf3f4ff490fc5371f2063ca9f4a0
SHA256d0e96b5f8977566cad079e869a63fabfb46cde77127a6264d0c9173525cb8f6f
SHA51219e589ffc604fe44c107f1da15124e9210b66fa8c29b904343b2e086bea730146d7b9fc2961db729b3fb9cd34e46a932fbd3cd702831d314077d4e63207ea851
-
Filesize
240KB
MD5c23f9734316e37cbe8e6e9e738f95051
SHA163326d08d29fbf3f4ff490fc5371f2063ca9f4a0
SHA256d0e96b5f8977566cad079e869a63fabfb46cde77127a6264d0c9173525cb8f6f
SHA51219e589ffc604fe44c107f1da15124e9210b66fa8c29b904343b2e086bea730146d7b9fc2961db729b3fb9cd34e46a932fbd3cd702831d314077d4e63207ea851
-
Filesize
240KB
MD5c23f9734316e37cbe8e6e9e738f95051
SHA163326d08d29fbf3f4ff490fc5371f2063ca9f4a0
SHA256d0e96b5f8977566cad079e869a63fabfb46cde77127a6264d0c9173525cb8f6f
SHA51219e589ffc604fe44c107f1da15124e9210b66fa8c29b904343b2e086bea730146d7b9fc2961db729b3fb9cd34e46a932fbd3cd702831d314077d4e63207ea851
-
Filesize
402KB
MD54effe510d0c7cc90668903834daf8735
SHA1e53046a1e6f730aba0ff19271f49f6b068b556fd
SHA25675ff5137e990cd557f991cd703d088440278f1460c462be00701232d87e75e71
SHA5129df6dba9f71f5be40c0de85a5998ffc7abcfe7499065106a3a70ef26a78d0fc75dbabf271c2a318c54a65af51b260c041d3a6ebeff08feca4deec1c4b15c8a9d
-
Filesize
402KB
MD54effe510d0c7cc90668903834daf8735
SHA1e53046a1e6f730aba0ff19271f49f6b068b556fd
SHA25675ff5137e990cd557f991cd703d088440278f1460c462be00701232d87e75e71
SHA5129df6dba9f71f5be40c0de85a5998ffc7abcfe7499065106a3a70ef26a78d0fc75dbabf271c2a318c54a65af51b260c041d3a6ebeff08feca4deec1c4b15c8a9d
-
Filesize
402KB
MD54effe510d0c7cc90668903834daf8735
SHA1e53046a1e6f730aba0ff19271f49f6b068b556fd
SHA25675ff5137e990cd557f991cd703d088440278f1460c462be00701232d87e75e71
SHA5129df6dba9f71f5be40c0de85a5998ffc7abcfe7499065106a3a70ef26a78d0fc75dbabf271c2a318c54a65af51b260c041d3a6ebeff08feca4deec1c4b15c8a9d
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
334KB
MD50ea80a0cdfcb4e2ac58f9da9c4562de7
SHA199478a7ca3942556a288a9e5920d76e8aaf05801
SHA2568b8cd82f9ad2a064dd02ccb9c10bc43d5986342559f9aa8ce816597a2fc32bb8
SHA512976beba9a454467335526589f610c980c2dbb72b80d2e190f61c636466fb58dc81cdddc754f3c69aef5be21d762f49661c11634ed5121d3b4296d8244c9f157e
-
Filesize
334KB
MD50ea80a0cdfcb4e2ac58f9da9c4562de7
SHA199478a7ca3942556a288a9e5920d76e8aaf05801
SHA2568b8cd82f9ad2a064dd02ccb9c10bc43d5986342559f9aa8ce816597a2fc32bb8
SHA512976beba9a454467335526589f610c980c2dbb72b80d2e190f61c636466fb58dc81cdddc754f3c69aef5be21d762f49661c11634ed5121d3b4296d8244c9f157e
-
Filesize
240KB
MD5c23f9734316e37cbe8e6e9e738f95051
SHA163326d08d29fbf3f4ff490fc5371f2063ca9f4a0
SHA256d0e96b5f8977566cad079e869a63fabfb46cde77127a6264d0c9173525cb8f6f
SHA51219e589ffc604fe44c107f1da15124e9210b66fa8c29b904343b2e086bea730146d7b9fc2961db729b3fb9cd34e46a932fbd3cd702831d314077d4e63207ea851
-
Filesize
240KB
MD5c23f9734316e37cbe8e6e9e738f95051
SHA163326d08d29fbf3f4ff490fc5371f2063ca9f4a0
SHA256d0e96b5f8977566cad079e869a63fabfb46cde77127a6264d0c9173525cb8f6f
SHA51219e589ffc604fe44c107f1da15124e9210b66fa8c29b904343b2e086bea730146d7b9fc2961db729b3fb9cd34e46a932fbd3cd702831d314077d4e63207ea851
-
Filesize
240KB
MD5c23f9734316e37cbe8e6e9e738f95051
SHA163326d08d29fbf3f4ff490fc5371f2063ca9f4a0
SHA256d0e96b5f8977566cad079e869a63fabfb46cde77127a6264d0c9173525cb8f6f
SHA51219e589ffc604fe44c107f1da15124e9210b66fa8c29b904343b2e086bea730146d7b9fc2961db729b3fb9cd34e46a932fbd3cd702831d314077d4e63207ea851
-
Filesize
402KB
MD54effe510d0c7cc90668903834daf8735
SHA1e53046a1e6f730aba0ff19271f49f6b068b556fd
SHA25675ff5137e990cd557f991cd703d088440278f1460c462be00701232d87e75e71
SHA5129df6dba9f71f5be40c0de85a5998ffc7abcfe7499065106a3a70ef26a78d0fc75dbabf271c2a318c54a65af51b260c041d3a6ebeff08feca4deec1c4b15c8a9d
-
Filesize
402KB
MD54effe510d0c7cc90668903834daf8735
SHA1e53046a1e6f730aba0ff19271f49f6b068b556fd
SHA25675ff5137e990cd557f991cd703d088440278f1460c462be00701232d87e75e71
SHA5129df6dba9f71f5be40c0de85a5998ffc7abcfe7499065106a3a70ef26a78d0fc75dbabf271c2a318c54a65af51b260c041d3a6ebeff08feca4deec1c4b15c8a9d
-
Filesize
402KB
MD54effe510d0c7cc90668903834daf8735
SHA1e53046a1e6f730aba0ff19271f49f6b068b556fd
SHA25675ff5137e990cd557f991cd703d088440278f1460c462be00701232d87e75e71
SHA5129df6dba9f71f5be40c0de85a5998ffc7abcfe7499065106a3a70ef26a78d0fc75dbabf271c2a318c54a65af51b260c041d3a6ebeff08feca4deec1c4b15c8a9d
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf