Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04/07/2023, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
fotod45exe.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
fotod45exe.exe
Resource
win10v2004-20230703-en
General
-
Target
fotod45exe.exe
-
Size
526KB
-
MD5
cd7322963f1f07dc6095e8a914e9ad16
-
SHA1
612c3edc4f39f512a9e74230da170476957bb24a
-
SHA256
021db315b4e08ed4f9f2662afe07276ec5e282229becd2716750acfd49603b10
-
SHA512
30426ebb319a9ba9f218fb4f27050a160c74710095b179fb8d74dd46b07573caf57278c66bbbb14dcf199a278c3e2de4253b54d966f074fa577ad04c6fcbc4a0
-
SSDEEP
6144:wI3Xzg5ULmBh0OY5P3m88BtK3wxdJWqi9y6vP0G/0qNekfPP/AvjoQ+54F08U6f8:wkg5RjQ2PBsUJc7/tNAcQhFk6fbA
Malware Config
Extracted
redline
nowa
77.91.124.49:19073
-
auth_value
6bc6b0617aa32bcd971aef4a2cf49647
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/1736-83-0x0000000000020000-0x000000000002A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0048264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0048264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0048264.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k0048264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0048264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0048264.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 2364 y4577927.exe 1736 k0048264.exe 632 l5039692.exe 2784 n7293187.exe 2584 rugen.exe 1996 rugen.exe -
Loads dropped DLL 14 IoCs
pid Process 1384 fotod45exe.exe 2364 y4577927.exe 2364 y4577927.exe 2364 y4577927.exe 1736 k0048264.exe 2364 y4577927.exe 2364 y4577927.exe 632 l5039692.exe 1384 fotod45exe.exe 2784 n7293187.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k0048264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0048264.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fotod45exe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4577927.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4577927.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce fotod45exe.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1736 k0048264.exe 1736 k0048264.exe 632 l5039692.exe 632 l5039692.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1736 k0048264.exe Token: SeDebugPrivilege 632 l5039692.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 n7293187.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 2364 1384 fotod45exe.exe 29 PID 1384 wrote to memory of 2364 1384 fotod45exe.exe 29 PID 1384 wrote to memory of 2364 1384 fotod45exe.exe 29 PID 1384 wrote to memory of 2364 1384 fotod45exe.exe 29 PID 1384 wrote to memory of 2364 1384 fotod45exe.exe 29 PID 1384 wrote to memory of 2364 1384 fotod45exe.exe 29 PID 1384 wrote to memory of 2364 1384 fotod45exe.exe 29 PID 2364 wrote to memory of 1736 2364 y4577927.exe 30 PID 2364 wrote to memory of 1736 2364 y4577927.exe 30 PID 2364 wrote to memory of 1736 2364 y4577927.exe 30 PID 2364 wrote to memory of 1736 2364 y4577927.exe 30 PID 2364 wrote to memory of 1736 2364 y4577927.exe 30 PID 2364 wrote to memory of 1736 2364 y4577927.exe 30 PID 2364 wrote to memory of 1736 2364 y4577927.exe 30 PID 2364 wrote to memory of 632 2364 y4577927.exe 32 PID 2364 wrote to memory of 632 2364 y4577927.exe 32 PID 2364 wrote to memory of 632 2364 y4577927.exe 32 PID 2364 wrote to memory of 632 2364 y4577927.exe 32 PID 2364 wrote to memory of 632 2364 y4577927.exe 32 PID 2364 wrote to memory of 632 2364 y4577927.exe 32 PID 2364 wrote to memory of 632 2364 y4577927.exe 32 PID 1384 wrote to memory of 2784 1384 fotod45exe.exe 35 PID 1384 wrote to memory of 2784 1384 fotod45exe.exe 35 PID 1384 wrote to memory of 2784 1384 fotod45exe.exe 35 PID 1384 wrote to memory of 2784 1384 fotod45exe.exe 35 PID 2784 wrote to memory of 2584 2784 n7293187.exe 36 PID 2784 wrote to memory of 2584 2784 n7293187.exe 36 PID 2784 wrote to memory of 2584 2784 n7293187.exe 36 PID 2784 wrote to memory of 2584 2784 n7293187.exe 36 PID 2584 wrote to memory of 2596 2584 rugen.exe 37 PID 2584 wrote to memory of 2596 2584 rugen.exe 37 PID 2584 wrote to memory of 2596 2584 rugen.exe 37 PID 2584 wrote to memory of 2596 2584 rugen.exe 37 PID 2584 wrote to memory of 2484 2584 rugen.exe 39 PID 2584 wrote to memory of 2484 2584 rugen.exe 39 PID 2584 wrote to memory of 2484 2584 rugen.exe 39 PID 2584 wrote to memory of 2484 2584 rugen.exe 39 PID 2484 wrote to memory of 2604 2484 cmd.exe 41 PID 2484 wrote to memory of 2604 2484 cmd.exe 41 PID 2484 wrote to memory of 2604 2484 cmd.exe 41 PID 2484 wrote to memory of 2604 2484 cmd.exe 41 PID 2484 wrote to memory of 3000 2484 cmd.exe 42 PID 2484 wrote to memory of 3000 2484 cmd.exe 42 PID 2484 wrote to memory of 3000 2484 cmd.exe 42 PID 2484 wrote to memory of 3000 2484 cmd.exe 42 PID 2484 wrote to memory of 3016 2484 cmd.exe 43 PID 2484 wrote to memory of 3016 2484 cmd.exe 43 PID 2484 wrote to memory of 3016 2484 cmd.exe 43 PID 2484 wrote to memory of 3016 2484 cmd.exe 43 PID 2484 wrote to memory of 2524 2484 cmd.exe 44 PID 2484 wrote to memory of 2524 2484 cmd.exe 44 PID 2484 wrote to memory of 2524 2484 cmd.exe 44 PID 2484 wrote to memory of 2524 2484 cmd.exe 44 PID 2484 wrote to memory of 2324 2484 cmd.exe 45 PID 2484 wrote to memory of 2324 2484 cmd.exe 45 PID 2484 wrote to memory of 2324 2484 cmd.exe 45 PID 2484 wrote to memory of 2324 2484 cmd.exe 45 PID 2484 wrote to memory of 2256 2484 cmd.exe 46 PID 2484 wrote to memory of 2256 2484 cmd.exe 46 PID 2484 wrote to memory of 2256 2484 cmd.exe 46 PID 2484 wrote to memory of 2256 2484 cmd.exe 46 PID 2716 wrote to memory of 1996 2716 taskeng.exe 49 PID 2716 wrote to memory of 1996 2716 taskeng.exe 49 PID 2716 wrote to memory of 1996 2716 taskeng.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\fotod45exe.exe"C:\Users\Admin\AppData\Local\Temp\fotod45exe.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4577927.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4577927.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0048264.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0048264.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5039692.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5039692.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7293187.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7293187.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:2596
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:3000
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:3016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2524
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:2324
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:2256
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1692
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {022DA998-450C-4FAD-89E4-119A19814F5F} S-1-5-21-264077997-199365141-898621884-1000:KOSNGVQI\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe2⤵
- Executes dropped EXE
PID:1996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
264KB
MD5889c69689bf742dbafb2e97ac2e21c55
SHA12550b88d5442631714bbfc6d5c8eef062317590c
SHA2566faf6451c9a3837c1845dbe40ae88f0bf0e00ba53bacb5a953cdbf305993ba73
SHA512eb7faf9bce512baade45ac6fecf72dab86329a6c72d4313ec3a7ca8ebf9f595e16365cda9f841a60b072da4337543fbad395360cffdf06513de32d8ae1daa15b
-
Filesize
264KB
MD5889c69689bf742dbafb2e97ac2e21c55
SHA12550b88d5442631714bbfc6d5c8eef062317590c
SHA2566faf6451c9a3837c1845dbe40ae88f0bf0e00ba53bacb5a953cdbf305993ba73
SHA512eb7faf9bce512baade45ac6fecf72dab86329a6c72d4313ec3a7ca8ebf9f595e16365cda9f841a60b072da4337543fbad395360cffdf06513de32d8ae1daa15b
-
Filesize
101KB
MD5ca35ab7e1d87d789f82aa6b629586ffc
SHA175c2897564075d685bcf653de214177a974b0119
SHA2564507dfba041e4c0633e1101ad4d9a2e9e2c18f8cc627c101a6592a8db82b22e7
SHA5125206a2b666a005cbd4229b3b77875dc4b48b46a8806a87437dca4e699d2811c4616b4ec4d463b9cd5d329c2c9d6c84597c655f5987676ce985346443c1295b37
-
Filesize
101KB
MD5ca35ab7e1d87d789f82aa6b629586ffc
SHA175c2897564075d685bcf653de214177a974b0119
SHA2564507dfba041e4c0633e1101ad4d9a2e9e2c18f8cc627c101a6592a8db82b22e7
SHA5125206a2b666a005cbd4229b3b77875dc4b48b46a8806a87437dca4e699d2811c4616b4ec4d463b9cd5d329c2c9d6c84597c655f5987676ce985346443c1295b37
-
Filesize
101KB
MD5ca35ab7e1d87d789f82aa6b629586ffc
SHA175c2897564075d685bcf653de214177a974b0119
SHA2564507dfba041e4c0633e1101ad4d9a2e9e2c18f8cc627c101a6592a8db82b22e7
SHA5125206a2b666a005cbd4229b3b77875dc4b48b46a8806a87437dca4e699d2811c4616b4ec4d463b9cd5d329c2c9d6c84597c655f5987676ce985346443c1295b37
-
Filesize
262KB
MD51bde4d5b827fbeaf5a2866d2380adf0b
SHA1a9f66c1a6f49bf15e50227fca4e27ab69103cc60
SHA256a0ebda51204198de29bca3c5bb53475a1a090de35eb6c7de9e48b0a9473acc9d
SHA512337f0f42e01bb2558250e1b3ef7ea82c6c231ff6afd8eae8d233701375a787762efcb5db978564458fc50ca61e3f5040177518614f7e6c64640a3566856babe4
-
Filesize
262KB
MD51bde4d5b827fbeaf5a2866d2380adf0b
SHA1a9f66c1a6f49bf15e50227fca4e27ab69103cc60
SHA256a0ebda51204198de29bca3c5bb53475a1a090de35eb6c7de9e48b0a9473acc9d
SHA512337f0f42e01bb2558250e1b3ef7ea82c6c231ff6afd8eae8d233701375a787762efcb5db978564458fc50ca61e3f5040177518614f7e6c64640a3566856babe4
-
Filesize
262KB
MD51bde4d5b827fbeaf5a2866d2380adf0b
SHA1a9f66c1a6f49bf15e50227fca4e27ab69103cc60
SHA256a0ebda51204198de29bca3c5bb53475a1a090de35eb6c7de9e48b0a9473acc9d
SHA512337f0f42e01bb2558250e1b3ef7ea82c6c231ff6afd8eae8d233701375a787762efcb5db978564458fc50ca61e3f5040177518614f7e6c64640a3566856babe4
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
264KB
MD5889c69689bf742dbafb2e97ac2e21c55
SHA12550b88d5442631714bbfc6d5c8eef062317590c
SHA2566faf6451c9a3837c1845dbe40ae88f0bf0e00ba53bacb5a953cdbf305993ba73
SHA512eb7faf9bce512baade45ac6fecf72dab86329a6c72d4313ec3a7ca8ebf9f595e16365cda9f841a60b072da4337543fbad395360cffdf06513de32d8ae1daa15b
-
Filesize
264KB
MD5889c69689bf742dbafb2e97ac2e21c55
SHA12550b88d5442631714bbfc6d5c8eef062317590c
SHA2566faf6451c9a3837c1845dbe40ae88f0bf0e00ba53bacb5a953cdbf305993ba73
SHA512eb7faf9bce512baade45ac6fecf72dab86329a6c72d4313ec3a7ca8ebf9f595e16365cda9f841a60b072da4337543fbad395360cffdf06513de32d8ae1daa15b
-
Filesize
101KB
MD5ca35ab7e1d87d789f82aa6b629586ffc
SHA175c2897564075d685bcf653de214177a974b0119
SHA2564507dfba041e4c0633e1101ad4d9a2e9e2c18f8cc627c101a6592a8db82b22e7
SHA5125206a2b666a005cbd4229b3b77875dc4b48b46a8806a87437dca4e699d2811c4616b4ec4d463b9cd5d329c2c9d6c84597c655f5987676ce985346443c1295b37
-
Filesize
101KB
MD5ca35ab7e1d87d789f82aa6b629586ffc
SHA175c2897564075d685bcf653de214177a974b0119
SHA2564507dfba041e4c0633e1101ad4d9a2e9e2c18f8cc627c101a6592a8db82b22e7
SHA5125206a2b666a005cbd4229b3b77875dc4b48b46a8806a87437dca4e699d2811c4616b4ec4d463b9cd5d329c2c9d6c84597c655f5987676ce985346443c1295b37
-
Filesize
101KB
MD5ca35ab7e1d87d789f82aa6b629586ffc
SHA175c2897564075d685bcf653de214177a974b0119
SHA2564507dfba041e4c0633e1101ad4d9a2e9e2c18f8cc627c101a6592a8db82b22e7
SHA5125206a2b666a005cbd4229b3b77875dc4b48b46a8806a87437dca4e699d2811c4616b4ec4d463b9cd5d329c2c9d6c84597c655f5987676ce985346443c1295b37
-
Filesize
262KB
MD51bde4d5b827fbeaf5a2866d2380adf0b
SHA1a9f66c1a6f49bf15e50227fca4e27ab69103cc60
SHA256a0ebda51204198de29bca3c5bb53475a1a090de35eb6c7de9e48b0a9473acc9d
SHA512337f0f42e01bb2558250e1b3ef7ea82c6c231ff6afd8eae8d233701375a787762efcb5db978564458fc50ca61e3f5040177518614f7e6c64640a3566856babe4
-
Filesize
262KB
MD51bde4d5b827fbeaf5a2866d2380adf0b
SHA1a9f66c1a6f49bf15e50227fca4e27ab69103cc60
SHA256a0ebda51204198de29bca3c5bb53475a1a090de35eb6c7de9e48b0a9473acc9d
SHA512337f0f42e01bb2558250e1b3ef7ea82c6c231ff6afd8eae8d233701375a787762efcb5db978564458fc50ca61e3f5040177518614f7e6c64640a3566856babe4
-
Filesize
262KB
MD51bde4d5b827fbeaf5a2866d2380adf0b
SHA1a9f66c1a6f49bf15e50227fca4e27ab69103cc60
SHA256a0ebda51204198de29bca3c5bb53475a1a090de35eb6c7de9e48b0a9473acc9d
SHA512337f0f42e01bb2558250e1b3ef7ea82c6c231ff6afd8eae8d233701375a787762efcb5db978564458fc50ca61e3f5040177518614f7e6c64640a3566856babe4
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf