Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
03/07/2023, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230621-en
General
-
Target
file.exe
-
Size
813KB
-
MD5
f10a2753f6ba71d1543f9ecf5f32773e
-
SHA1
c81c4e7d2b430ee2f35fc3100997bd91ed09f2e5
-
SHA256
db9de2b62ce2f83bcf2df36952c46cc6f7d6483e3188c55b4bde73c32e4b5f9e
-
SHA512
e8f5a1976b0dd5d7ea2bdd7922c18557f83bf86334c139ca82795ca7e2fe17808a7beb71c5e10e6153084a20ab0485e0a2e3f75b0f7b562c9f310e1a68b7dbbf
-
SSDEEP
12288:c2yR8OGHTtBCdLKPHd6DRHrZ/7Z+RZrzoZW/eBJx5p/tn0P7paG2Fu:cJyrChKPdmr57ZuZ4ZPBJXJGFF2u
Malware Config
Extracted
redline
jako
77.91.124.49:19073
-
auth_value
3db90f2679ab2890874898c7c6d65799
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/984-103-0x0000000000020000-0x000000000002A000-memory.dmp healer behavioral1/files/0x000700000001314a-108.dat healer behavioral1/files/0x000700000001314a-110.dat healer behavioral1/files/0x000700000001314a-111.dat healer behavioral1/memory/2932-112-0x00000000012F0000-0x00000000012FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5313417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b4028736.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5313417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5313417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5313417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b4028736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b4028736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b4028736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5313417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5313417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b4028736.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 11 IoCs
pid Process 3024 v7666454.exe 2264 v4217877.exe 2168 v5045945.exe 984 a5313417.exe 2932 b4028736.exe 3044 c8056940.exe 2856 d0581278.exe 2536 e1205834.exe 1356 rugen.exe 2840 rugen.exe 2452 rugen.exe -
Loads dropped DLL 22 IoCs
pid Process 2272 file.exe 3024 v7666454.exe 3024 v7666454.exe 2264 v4217877.exe 2264 v4217877.exe 2168 v5045945.exe 2168 v5045945.exe 2168 v5045945.exe 984 a5313417.exe 2168 v5045945.exe 2264 v4217877.exe 2264 v4217877.exe 3044 c8056940.exe 3024 v7666454.exe 3024 v7666454.exe 2856 d0581278.exe 2272 file.exe 2536 e1205834.exe 2020 rundll32.exe 2020 rundll32.exe 2020 rundll32.exe 2020 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features b4028736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b4028736.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features a5313417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5313417.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7666454.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4217877.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4217877.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5045945.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5045945.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7666454.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d0581278.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d0581278.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d0581278.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 984 a5313417.exe 984 a5313417.exe 2932 b4028736.exe 2932 b4028736.exe 3044 c8056940.exe 3044 c8056940.exe 2856 d0581278.exe 2856 d0581278.exe 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1260 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2856 d0581278.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 984 a5313417.exe Token: SeDebugPrivilege 2932 b4028736.exe Token: SeDebugPrivilege 3044 c8056940.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 e1205834.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 3024 2272 file.exe 29 PID 2272 wrote to memory of 3024 2272 file.exe 29 PID 2272 wrote to memory of 3024 2272 file.exe 29 PID 2272 wrote to memory of 3024 2272 file.exe 29 PID 2272 wrote to memory of 3024 2272 file.exe 29 PID 2272 wrote to memory of 3024 2272 file.exe 29 PID 2272 wrote to memory of 3024 2272 file.exe 29 PID 3024 wrote to memory of 2264 3024 v7666454.exe 30 PID 3024 wrote to memory of 2264 3024 v7666454.exe 30 PID 3024 wrote to memory of 2264 3024 v7666454.exe 30 PID 3024 wrote to memory of 2264 3024 v7666454.exe 30 PID 3024 wrote to memory of 2264 3024 v7666454.exe 30 PID 3024 wrote to memory of 2264 3024 v7666454.exe 30 PID 3024 wrote to memory of 2264 3024 v7666454.exe 30 PID 2264 wrote to memory of 2168 2264 v4217877.exe 31 PID 2264 wrote to memory of 2168 2264 v4217877.exe 31 PID 2264 wrote to memory of 2168 2264 v4217877.exe 31 PID 2264 wrote to memory of 2168 2264 v4217877.exe 31 PID 2264 wrote to memory of 2168 2264 v4217877.exe 31 PID 2264 wrote to memory of 2168 2264 v4217877.exe 31 PID 2264 wrote to memory of 2168 2264 v4217877.exe 31 PID 2168 wrote to memory of 984 2168 v5045945.exe 32 PID 2168 wrote to memory of 984 2168 v5045945.exe 32 PID 2168 wrote to memory of 984 2168 v5045945.exe 32 PID 2168 wrote to memory of 984 2168 v5045945.exe 32 PID 2168 wrote to memory of 984 2168 v5045945.exe 32 PID 2168 wrote to memory of 984 2168 v5045945.exe 32 PID 2168 wrote to memory of 984 2168 v5045945.exe 32 PID 2168 wrote to memory of 2932 2168 v5045945.exe 34 PID 2168 wrote to memory of 2932 2168 v5045945.exe 34 PID 2168 wrote to memory of 2932 2168 v5045945.exe 34 PID 2168 wrote to memory of 2932 2168 v5045945.exe 34 PID 2168 wrote to memory of 2932 2168 v5045945.exe 34 PID 2168 wrote to memory of 2932 2168 v5045945.exe 34 PID 2168 wrote to memory of 2932 2168 v5045945.exe 34 PID 2264 wrote to memory of 3044 2264 v4217877.exe 35 PID 2264 wrote to memory of 3044 2264 v4217877.exe 35 PID 2264 wrote to memory of 3044 2264 v4217877.exe 35 PID 2264 wrote to memory of 3044 2264 v4217877.exe 35 PID 2264 wrote to memory of 3044 2264 v4217877.exe 35 PID 2264 wrote to memory of 3044 2264 v4217877.exe 35 PID 2264 wrote to memory of 3044 2264 v4217877.exe 35 PID 3024 wrote to memory of 2856 3024 v7666454.exe 38 PID 3024 wrote to memory of 2856 3024 v7666454.exe 38 PID 3024 wrote to memory of 2856 3024 v7666454.exe 38 PID 3024 wrote to memory of 2856 3024 v7666454.exe 38 PID 3024 wrote to memory of 2856 3024 v7666454.exe 38 PID 3024 wrote to memory of 2856 3024 v7666454.exe 38 PID 3024 wrote to memory of 2856 3024 v7666454.exe 38 PID 2272 wrote to memory of 2536 2272 file.exe 39 PID 2272 wrote to memory of 2536 2272 file.exe 39 PID 2272 wrote to memory of 2536 2272 file.exe 39 PID 2272 wrote to memory of 2536 2272 file.exe 39 PID 2536 wrote to memory of 1356 2536 e1205834.exe 40 PID 2536 wrote to memory of 1356 2536 e1205834.exe 40 PID 2536 wrote to memory of 1356 2536 e1205834.exe 40 PID 2536 wrote to memory of 1356 2536 e1205834.exe 40 PID 1356 wrote to memory of 1076 1356 rugen.exe 41 PID 1356 wrote to memory of 1076 1356 rugen.exe 41 PID 1356 wrote to memory of 1076 1356 rugen.exe 41 PID 1356 wrote to memory of 1076 1356 rugen.exe 41 PID 1356 wrote to memory of 1128 1356 rugen.exe 43 PID 1356 wrote to memory of 1128 1356 rugen.exe 43 PID 1356 wrote to memory of 1128 1356 rugen.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7666454.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7666454.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4217877.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4217877.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5045945.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5045945.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5313417.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5313417.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4028736.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4028736.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8056940.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8056940.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d0581278.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d0581278.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e1205834.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e1205834.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:1076
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵PID:1128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:340
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:1480
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:1740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2208
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:1688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:1168
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2020
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0DFC901F-C21D-4E4A-BCD3-259E1DDFF6AC} S-1-5-21-1305762978-1813183296-1799492538-1000:CQOQSKLT\Admin:Interactive:[1]1⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe2⤵
- Executes dropped EXE
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe2⤵
- Executes dropped EXE
PID:2452
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
539KB
MD53a3c622cfa5912477cab52cf41733cff
SHA1ce65ccd1069e990aaaf986b831f3c786f09358a1
SHA25657e23c42097f6466454224d39cfe926eef2eb5e201ffc34d380c8e123b1f04c5
SHA51287795107e14eeefe445d10992f391ff88a2af2ef1aa930a6c09327013f5480e6a48b8da3ade5aa42f554a25a6b5bb27d5a6d2be4575081d4824f0ba9730c1738
-
Filesize
539KB
MD53a3c622cfa5912477cab52cf41733cff
SHA1ce65ccd1069e990aaaf986b831f3c786f09358a1
SHA25657e23c42097f6466454224d39cfe926eef2eb5e201ffc34d380c8e123b1f04c5
SHA51287795107e14eeefe445d10992f391ff88a2af2ef1aa930a6c09327013f5480e6a48b8da3ade5aa42f554a25a6b5bb27d5a6d2be4575081d4824f0ba9730c1738
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
415KB
MD5952a4632a5df795cf5ae42e7b4e3b033
SHA197ae7a85319c2a7be3a5cf8d26c1cff5a8cddcdf
SHA256cef9ac03057f2558aaa7ad519ce569492e75ed6fb35f4310c6f41c6123a9870b
SHA512b68dfb6352fa246b3fe5cec3459d2cbb3210976693238d5befe5d903556969a8918734a93d399b6e8d3cca25d602d28d4a06c2601e49bf6281571a876fe53beb
-
Filesize
415KB
MD5952a4632a5df795cf5ae42e7b4e3b033
SHA197ae7a85319c2a7be3a5cf8d26c1cff5a8cddcdf
SHA256cef9ac03057f2558aaa7ad519ce569492e75ed6fb35f4310c6f41c6123a9870b
SHA512b68dfb6352fa246b3fe5cec3459d2cbb3210976693238d5befe5d903556969a8918734a93d399b6e8d3cca25d602d28d4a06c2601e49bf6281571a876fe53beb
-
Filesize
274KB
MD5d3e36009bd7c4a4fcdff973bdc31fa0c
SHA1a3d992362d21493844b371b97dc05018ffbc958d
SHA256e88c426160009b63aa38a2a19d20520c9d1e6bdb62f04f9fe1dd7437f6834933
SHA512a5e42121fe2a9dab3ee4b536015bb1fcf8fb20072704586822932d4f375e0dfd3ed5f947835d718d4a22b6e8e021daa14967a37d16b1ef81b6038490a37787bb
-
Filesize
274KB
MD5d3e36009bd7c4a4fcdff973bdc31fa0c
SHA1a3d992362d21493844b371b97dc05018ffbc958d
SHA256e88c426160009b63aa38a2a19d20520c9d1e6bdb62f04f9fe1dd7437f6834933
SHA512a5e42121fe2a9dab3ee4b536015bb1fcf8fb20072704586822932d4f375e0dfd3ed5f947835d718d4a22b6e8e021daa14967a37d16b1ef81b6038490a37787bb
-
Filesize
274KB
MD5d3e36009bd7c4a4fcdff973bdc31fa0c
SHA1a3d992362d21493844b371b97dc05018ffbc958d
SHA256e88c426160009b63aa38a2a19d20520c9d1e6bdb62f04f9fe1dd7437f6834933
SHA512a5e42121fe2a9dab3ee4b536015bb1fcf8fb20072704586822932d4f375e0dfd3ed5f947835d718d4a22b6e8e021daa14967a37d16b1ef81b6038490a37787bb
-
Filesize
206KB
MD549615ba13e65170a1af563ed5d321fd7
SHA1229ecad45a5b030be56a7811998c4bf6a749a068
SHA256dde7e579a4261bbde482ecedf7c6b4d704496e7d3052627bc435ede40ecb735c
SHA5129bbd4ae842177d2c61e093376a65d72aa939655392ffa0658b2e1e5531e9cf51a835af6b16f88cb975a2d7b84598b761fbb11550460770f7407dc84c20aa0fcd
-
Filesize
206KB
MD549615ba13e65170a1af563ed5d321fd7
SHA1229ecad45a5b030be56a7811998c4bf6a749a068
SHA256dde7e579a4261bbde482ecedf7c6b4d704496e7d3052627bc435ede40ecb735c
SHA5129bbd4ae842177d2c61e093376a65d72aa939655392ffa0658b2e1e5531e9cf51a835af6b16f88cb975a2d7b84598b761fbb11550460770f7407dc84c20aa0fcd
-
Filesize
113KB
MD52fc76aff8fc18204efd5369d99533617
SHA19e151663f99bf71c5547d13e90e8ad95357b8709
SHA256c9bfb194888cf34292399bf82c2f909681a0e0337761c97cc2a26a291d551c97
SHA512ad4df9c685e42a3869a94d73c88ad9de3a568eef2f56d6593214ecbb072f1b4901caa38431e9e2925a2c54c7aea58dd52871a837a64afd6062cfc18803260401
-
Filesize
113KB
MD52fc76aff8fc18204efd5369d99533617
SHA19e151663f99bf71c5547d13e90e8ad95357b8709
SHA256c9bfb194888cf34292399bf82c2f909681a0e0337761c97cc2a26a291d551c97
SHA512ad4df9c685e42a3869a94d73c88ad9de3a568eef2f56d6593214ecbb072f1b4901caa38431e9e2925a2c54c7aea58dd52871a837a64afd6062cfc18803260401
-
Filesize
113KB
MD52fc76aff8fc18204efd5369d99533617
SHA19e151663f99bf71c5547d13e90e8ad95357b8709
SHA256c9bfb194888cf34292399bf82c2f909681a0e0337761c97cc2a26a291d551c97
SHA512ad4df9c685e42a3869a94d73c88ad9de3a568eef2f56d6593214ecbb072f1b4901caa38431e9e2925a2c54c7aea58dd52871a837a64afd6062cfc18803260401
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
539KB
MD53a3c622cfa5912477cab52cf41733cff
SHA1ce65ccd1069e990aaaf986b831f3c786f09358a1
SHA25657e23c42097f6466454224d39cfe926eef2eb5e201ffc34d380c8e123b1f04c5
SHA51287795107e14eeefe445d10992f391ff88a2af2ef1aa930a6c09327013f5480e6a48b8da3ade5aa42f554a25a6b5bb27d5a6d2be4575081d4824f0ba9730c1738
-
Filesize
539KB
MD53a3c622cfa5912477cab52cf41733cff
SHA1ce65ccd1069e990aaaf986b831f3c786f09358a1
SHA25657e23c42097f6466454224d39cfe926eef2eb5e201ffc34d380c8e123b1f04c5
SHA51287795107e14eeefe445d10992f391ff88a2af2ef1aa930a6c09327013f5480e6a48b8da3ade5aa42f554a25a6b5bb27d5a6d2be4575081d4824f0ba9730c1738
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
415KB
MD5952a4632a5df795cf5ae42e7b4e3b033
SHA197ae7a85319c2a7be3a5cf8d26c1cff5a8cddcdf
SHA256cef9ac03057f2558aaa7ad519ce569492e75ed6fb35f4310c6f41c6123a9870b
SHA512b68dfb6352fa246b3fe5cec3459d2cbb3210976693238d5befe5d903556969a8918734a93d399b6e8d3cca25d602d28d4a06c2601e49bf6281571a876fe53beb
-
Filesize
415KB
MD5952a4632a5df795cf5ae42e7b4e3b033
SHA197ae7a85319c2a7be3a5cf8d26c1cff5a8cddcdf
SHA256cef9ac03057f2558aaa7ad519ce569492e75ed6fb35f4310c6f41c6123a9870b
SHA512b68dfb6352fa246b3fe5cec3459d2cbb3210976693238d5befe5d903556969a8918734a93d399b6e8d3cca25d602d28d4a06c2601e49bf6281571a876fe53beb
-
Filesize
274KB
MD5d3e36009bd7c4a4fcdff973bdc31fa0c
SHA1a3d992362d21493844b371b97dc05018ffbc958d
SHA256e88c426160009b63aa38a2a19d20520c9d1e6bdb62f04f9fe1dd7437f6834933
SHA512a5e42121fe2a9dab3ee4b536015bb1fcf8fb20072704586822932d4f375e0dfd3ed5f947835d718d4a22b6e8e021daa14967a37d16b1ef81b6038490a37787bb
-
Filesize
274KB
MD5d3e36009bd7c4a4fcdff973bdc31fa0c
SHA1a3d992362d21493844b371b97dc05018ffbc958d
SHA256e88c426160009b63aa38a2a19d20520c9d1e6bdb62f04f9fe1dd7437f6834933
SHA512a5e42121fe2a9dab3ee4b536015bb1fcf8fb20072704586822932d4f375e0dfd3ed5f947835d718d4a22b6e8e021daa14967a37d16b1ef81b6038490a37787bb
-
Filesize
274KB
MD5d3e36009bd7c4a4fcdff973bdc31fa0c
SHA1a3d992362d21493844b371b97dc05018ffbc958d
SHA256e88c426160009b63aa38a2a19d20520c9d1e6bdb62f04f9fe1dd7437f6834933
SHA512a5e42121fe2a9dab3ee4b536015bb1fcf8fb20072704586822932d4f375e0dfd3ed5f947835d718d4a22b6e8e021daa14967a37d16b1ef81b6038490a37787bb
-
Filesize
206KB
MD549615ba13e65170a1af563ed5d321fd7
SHA1229ecad45a5b030be56a7811998c4bf6a749a068
SHA256dde7e579a4261bbde482ecedf7c6b4d704496e7d3052627bc435ede40ecb735c
SHA5129bbd4ae842177d2c61e093376a65d72aa939655392ffa0658b2e1e5531e9cf51a835af6b16f88cb975a2d7b84598b761fbb11550460770f7407dc84c20aa0fcd
-
Filesize
206KB
MD549615ba13e65170a1af563ed5d321fd7
SHA1229ecad45a5b030be56a7811998c4bf6a749a068
SHA256dde7e579a4261bbde482ecedf7c6b4d704496e7d3052627bc435ede40ecb735c
SHA5129bbd4ae842177d2c61e093376a65d72aa939655392ffa0658b2e1e5531e9cf51a835af6b16f88cb975a2d7b84598b761fbb11550460770f7407dc84c20aa0fcd
-
Filesize
113KB
MD52fc76aff8fc18204efd5369d99533617
SHA19e151663f99bf71c5547d13e90e8ad95357b8709
SHA256c9bfb194888cf34292399bf82c2f909681a0e0337761c97cc2a26a291d551c97
SHA512ad4df9c685e42a3869a94d73c88ad9de3a568eef2f56d6593214ecbb072f1b4901caa38431e9e2925a2c54c7aea58dd52871a837a64afd6062cfc18803260401
-
Filesize
113KB
MD52fc76aff8fc18204efd5369d99533617
SHA19e151663f99bf71c5547d13e90e8ad95357b8709
SHA256c9bfb194888cf34292399bf82c2f909681a0e0337761c97cc2a26a291d551c97
SHA512ad4df9c685e42a3869a94d73c88ad9de3a568eef2f56d6593214ecbb072f1b4901caa38431e9e2925a2c54c7aea58dd52871a837a64afd6062cfc18803260401
-
Filesize
113KB
MD52fc76aff8fc18204efd5369d99533617
SHA19e151663f99bf71c5547d13e90e8ad95357b8709
SHA256c9bfb194888cf34292399bf82c2f909681a0e0337761c97cc2a26a291d551c97
SHA512ad4df9c685e42a3869a94d73c88ad9de3a568eef2f56d6593214ecbb072f1b4901caa38431e9e2925a2c54c7aea58dd52871a837a64afd6062cfc18803260401
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf