Analysis
-
max time kernel
105s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
70d8adf11ebf2f9573f9b3f963cfea91.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
70d8adf11ebf2f9573f9b3f963cfea91.exe
Resource
win10v2004-20230703-en
General
-
Target
70d8adf11ebf2f9573f9b3f963cfea91.exe
-
Size
3.9MB
-
MD5
70d8adf11ebf2f9573f9b3f963cfea91
-
SHA1
4c42b8658ed99e940171b9687d52be7035279c19
-
SHA256
f0cc3a62309f533d0fba15d83b530f107e4c5c46c5148728125fced89eff64a2
-
SHA512
f33ceb1f6247151758955f0fcb43ca5afc1974d678d7d8508ea345ac5d3bc8c5f2dc45b0c7f8e423cc6a6b693cd25f9717bb0c68648a022db5b564bfc777f566
-
SSDEEP
49152:jaVw79IWxDvE+DomnkzYAsY0srHyVFlWYhUAPlPhxr0jIFusQv2E+2Nx3dub4EAY:uC1S0ZUwPbaIUs22O49PpL
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/324-83-0x0000000000020000-0x000000000002A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6312491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6312491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6312491.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k6312491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6312491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6312491.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1428 y8499338.exe 324 k6312491.exe 2708 l1487667.exe 2592 n8524197.exe 2668 rugen.exe 1136 rugen.exe 1940 rugen.exe -
Loads dropped DLL 14 IoCs
pid Process 2936 70d8adf11ebf2f9573f9b3f963cfea91.exe 1428 y8499338.exe 1428 y8499338.exe 1428 y8499338.exe 324 k6312491.exe 1428 y8499338.exe 1428 y8499338.exe 2708 l1487667.exe 2936 70d8adf11ebf2f9573f9b3f963cfea91.exe 2592 n8524197.exe 992 rundll32.exe 992 rundll32.exe 992 rundll32.exe 992 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k6312491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k6312491.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 70d8adf11ebf2f9573f9b3f963cfea91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 70d8adf11ebf2f9573f9b3f963cfea91.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8499338.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8499338.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2744 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 324 k6312491.exe 324 k6312491.exe 2708 l1487667.exe 2708 l1487667.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 324 k6312491.exe Token: SeDebugPrivilege 2708 l1487667.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2592 n8524197.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2936 wrote to memory of 1428 2936 70d8adf11ebf2f9573f9b3f963cfea91.exe 29 PID 2936 wrote to memory of 1428 2936 70d8adf11ebf2f9573f9b3f963cfea91.exe 29 PID 2936 wrote to memory of 1428 2936 70d8adf11ebf2f9573f9b3f963cfea91.exe 29 PID 2936 wrote to memory of 1428 2936 70d8adf11ebf2f9573f9b3f963cfea91.exe 29 PID 2936 wrote to memory of 1428 2936 70d8adf11ebf2f9573f9b3f963cfea91.exe 29 PID 2936 wrote to memory of 1428 2936 70d8adf11ebf2f9573f9b3f963cfea91.exe 29 PID 2936 wrote to memory of 1428 2936 70d8adf11ebf2f9573f9b3f963cfea91.exe 29 PID 1428 wrote to memory of 324 1428 y8499338.exe 30 PID 1428 wrote to memory of 324 1428 y8499338.exe 30 PID 1428 wrote to memory of 324 1428 y8499338.exe 30 PID 1428 wrote to memory of 324 1428 y8499338.exe 30 PID 1428 wrote to memory of 324 1428 y8499338.exe 30 PID 1428 wrote to memory of 324 1428 y8499338.exe 30 PID 1428 wrote to memory of 324 1428 y8499338.exe 30 PID 1428 wrote to memory of 2708 1428 y8499338.exe 32 PID 1428 wrote to memory of 2708 1428 y8499338.exe 32 PID 1428 wrote to memory of 2708 1428 y8499338.exe 32 PID 1428 wrote to memory of 2708 1428 y8499338.exe 32 PID 1428 wrote to memory of 2708 1428 y8499338.exe 32 PID 1428 wrote to memory of 2708 1428 y8499338.exe 32 PID 1428 wrote to memory of 2708 1428 y8499338.exe 32 PID 2936 wrote to memory of 2592 2936 70d8adf11ebf2f9573f9b3f963cfea91.exe 35 PID 2936 wrote to memory of 2592 2936 70d8adf11ebf2f9573f9b3f963cfea91.exe 35 PID 2936 wrote to memory of 2592 2936 70d8adf11ebf2f9573f9b3f963cfea91.exe 35 PID 2936 wrote to memory of 2592 2936 70d8adf11ebf2f9573f9b3f963cfea91.exe 35 PID 2592 wrote to memory of 2668 2592 n8524197.exe 36 PID 2592 wrote to memory of 2668 2592 n8524197.exe 36 PID 2592 wrote to memory of 2668 2592 n8524197.exe 36 PID 2592 wrote to memory of 2668 2592 n8524197.exe 36 PID 2668 wrote to memory of 2744 2668 rugen.exe 37 PID 2668 wrote to memory of 2744 2668 rugen.exe 37 PID 2668 wrote to memory of 2744 2668 rugen.exe 37 PID 2668 wrote to memory of 2744 2668 rugen.exe 37 PID 2668 wrote to memory of 2488 2668 rugen.exe 39 PID 2668 wrote to memory of 2488 2668 rugen.exe 39 PID 2668 wrote to memory of 2488 2668 rugen.exe 39 PID 2668 wrote to memory of 2488 2668 rugen.exe 39 PID 2488 wrote to memory of 524 2488 cmd.exe 41 PID 2488 wrote to memory of 524 2488 cmd.exe 41 PID 2488 wrote to memory of 524 2488 cmd.exe 41 PID 2488 wrote to memory of 524 2488 cmd.exe 41 PID 2488 wrote to memory of 2628 2488 cmd.exe 42 PID 2488 wrote to memory of 2628 2488 cmd.exe 42 PID 2488 wrote to memory of 2628 2488 cmd.exe 42 PID 2488 wrote to memory of 2628 2488 cmd.exe 42 PID 2488 wrote to memory of 2524 2488 cmd.exe 43 PID 2488 wrote to memory of 2524 2488 cmd.exe 43 PID 2488 wrote to memory of 2524 2488 cmd.exe 43 PID 2488 wrote to memory of 2524 2488 cmd.exe 43 PID 2488 wrote to memory of 2464 2488 cmd.exe 44 PID 2488 wrote to memory of 2464 2488 cmd.exe 44 PID 2488 wrote to memory of 2464 2488 cmd.exe 44 PID 2488 wrote to memory of 2464 2488 cmd.exe 44 PID 2488 wrote to memory of 2472 2488 cmd.exe 45 PID 2488 wrote to memory of 2472 2488 cmd.exe 45 PID 2488 wrote to memory of 2472 2488 cmd.exe 45 PID 2488 wrote to memory of 2472 2488 cmd.exe 45 PID 2488 wrote to memory of 2516 2488 cmd.exe 46 PID 2488 wrote to memory of 2516 2488 cmd.exe 46 PID 2488 wrote to memory of 2516 2488 cmd.exe 46 PID 2488 wrote to memory of 2516 2488 cmd.exe 46 PID 1028 wrote to memory of 1136 1028 taskeng.exe 49 PID 1028 wrote to memory of 1136 1028 taskeng.exe 49 PID 1028 wrote to memory of 1136 1028 taskeng.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\70d8adf11ebf2f9573f9b3f963cfea91.exe"C:\Users\Admin\AppData\Local\Temp\70d8adf11ebf2f9573f9b3f963cfea91.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8499338.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8499338.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6312491.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6312491.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1487667.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1487667.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8524197.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8524197.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:2744
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:524
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:2628
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:2524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:2472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:2516
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:992
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {FD21C1F6-4F73-47B9-BAA7-F4A9ACC3BE96} S-1-5-21-1724861073-2584418204-2594431177-1000:RXPFQWTW\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe2⤵
- Executes dropped EXE
PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe2⤵
- Executes dropped EXE
PID:1940
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
400KB
MD5e4208eb1ec020dbc13a5b890ca328366
SHA1202bcb391ba1ef8f0447d88a9219560cd8ff1d24
SHA25651c4177bfd5fc786fb05ccd397238241894c1259013f20b11a956c220547dc3e
SHA512d12f194390066c84f609dc2bd02033a3673a440a1224a47a1cd4cf85ba3eadc4e73391aef5ebec71628d34ef6d2d8f96c061acdd3fcf6fcba47b82ea727a08f4
-
Filesize
400KB
MD5e4208eb1ec020dbc13a5b890ca328366
SHA1202bcb391ba1ef8f0447d88a9219560cd8ff1d24
SHA25651c4177bfd5fc786fb05ccd397238241894c1259013f20b11a956c220547dc3e
SHA512d12f194390066c84f609dc2bd02033a3673a440a1224a47a1cd4cf85ba3eadc4e73391aef5ebec71628d34ef6d2d8f96c061acdd3fcf6fcba47b82ea727a08f4
-
Filesize
185KB
MD5fdd00ec20a23884f539cebb0666882c0
SHA11dc9e89fb89b8eb6ea08e7840e66831ea023efa5
SHA256aa52395cce50a5c4b2b5aa3bf3ea7425de2d53b963b935bdf25f5667c2b9c82c
SHA512b128470a11cab184746c039cb4bf72ab736c4b3fb5349134bb97a855986cd4744c47922cfff816a5fe694191fd3ecd076493718af108ba8118e8b5f2ea7dddd6
-
Filesize
185KB
MD5fdd00ec20a23884f539cebb0666882c0
SHA11dc9e89fb89b8eb6ea08e7840e66831ea023efa5
SHA256aa52395cce50a5c4b2b5aa3bf3ea7425de2d53b963b935bdf25f5667c2b9c82c
SHA512b128470a11cab184746c039cb4bf72ab736c4b3fb5349134bb97a855986cd4744c47922cfff816a5fe694191fd3ecd076493718af108ba8118e8b5f2ea7dddd6
-
Filesize
185KB
MD5fdd00ec20a23884f539cebb0666882c0
SHA11dc9e89fb89b8eb6ea08e7840e66831ea023efa5
SHA256aa52395cce50a5c4b2b5aa3bf3ea7425de2d53b963b935bdf25f5667c2b9c82c
SHA512b128470a11cab184746c039cb4bf72ab736c4b3fb5349134bb97a855986cd4744c47922cfff816a5fe694191fd3ecd076493718af108ba8118e8b5f2ea7dddd6
-
Filesize
1.3MB
MD555532aa1df272e9d5a22d63bd6b7cada
SHA18c8e13cc17aa785637f2346129ddbb3cf05fedb7
SHA2567a1e5c88bd7f89e4f655765aadaafbd2647043bf571ee5864b75761bef317d33
SHA512f4d5fab2c3e289c2459607a82363676579f0506d8cb90ea05ae84b6697d7fc245b0f308fcf65d5847298b816cee8840160511070ef1fe5ae94205baf5972105d
-
Filesize
1.3MB
MD555532aa1df272e9d5a22d63bd6b7cada
SHA18c8e13cc17aa785637f2346129ddbb3cf05fedb7
SHA2567a1e5c88bd7f89e4f655765aadaafbd2647043bf571ee5864b75761bef317d33
SHA512f4d5fab2c3e289c2459607a82363676579f0506d8cb90ea05ae84b6697d7fc245b0f308fcf65d5847298b816cee8840160511070ef1fe5ae94205baf5972105d
-
Filesize
1.3MB
MD555532aa1df272e9d5a22d63bd6b7cada
SHA18c8e13cc17aa785637f2346129ddbb3cf05fedb7
SHA2567a1e5c88bd7f89e4f655765aadaafbd2647043bf571ee5864b75761bef317d33
SHA512f4d5fab2c3e289c2459607a82363676579f0506d8cb90ea05ae84b6697d7fc245b0f308fcf65d5847298b816cee8840160511070ef1fe5ae94205baf5972105d
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
400KB
MD5e4208eb1ec020dbc13a5b890ca328366
SHA1202bcb391ba1ef8f0447d88a9219560cd8ff1d24
SHA25651c4177bfd5fc786fb05ccd397238241894c1259013f20b11a956c220547dc3e
SHA512d12f194390066c84f609dc2bd02033a3673a440a1224a47a1cd4cf85ba3eadc4e73391aef5ebec71628d34ef6d2d8f96c061acdd3fcf6fcba47b82ea727a08f4
-
Filesize
400KB
MD5e4208eb1ec020dbc13a5b890ca328366
SHA1202bcb391ba1ef8f0447d88a9219560cd8ff1d24
SHA25651c4177bfd5fc786fb05ccd397238241894c1259013f20b11a956c220547dc3e
SHA512d12f194390066c84f609dc2bd02033a3673a440a1224a47a1cd4cf85ba3eadc4e73391aef5ebec71628d34ef6d2d8f96c061acdd3fcf6fcba47b82ea727a08f4
-
Filesize
185KB
MD5fdd00ec20a23884f539cebb0666882c0
SHA11dc9e89fb89b8eb6ea08e7840e66831ea023efa5
SHA256aa52395cce50a5c4b2b5aa3bf3ea7425de2d53b963b935bdf25f5667c2b9c82c
SHA512b128470a11cab184746c039cb4bf72ab736c4b3fb5349134bb97a855986cd4744c47922cfff816a5fe694191fd3ecd076493718af108ba8118e8b5f2ea7dddd6
-
Filesize
185KB
MD5fdd00ec20a23884f539cebb0666882c0
SHA11dc9e89fb89b8eb6ea08e7840e66831ea023efa5
SHA256aa52395cce50a5c4b2b5aa3bf3ea7425de2d53b963b935bdf25f5667c2b9c82c
SHA512b128470a11cab184746c039cb4bf72ab736c4b3fb5349134bb97a855986cd4744c47922cfff816a5fe694191fd3ecd076493718af108ba8118e8b5f2ea7dddd6
-
Filesize
185KB
MD5fdd00ec20a23884f539cebb0666882c0
SHA11dc9e89fb89b8eb6ea08e7840e66831ea023efa5
SHA256aa52395cce50a5c4b2b5aa3bf3ea7425de2d53b963b935bdf25f5667c2b9c82c
SHA512b128470a11cab184746c039cb4bf72ab736c4b3fb5349134bb97a855986cd4744c47922cfff816a5fe694191fd3ecd076493718af108ba8118e8b5f2ea7dddd6
-
Filesize
1.3MB
MD555532aa1df272e9d5a22d63bd6b7cada
SHA18c8e13cc17aa785637f2346129ddbb3cf05fedb7
SHA2567a1e5c88bd7f89e4f655765aadaafbd2647043bf571ee5864b75761bef317d33
SHA512f4d5fab2c3e289c2459607a82363676579f0506d8cb90ea05ae84b6697d7fc245b0f308fcf65d5847298b816cee8840160511070ef1fe5ae94205baf5972105d
-
Filesize
1.3MB
MD555532aa1df272e9d5a22d63bd6b7cada
SHA18c8e13cc17aa785637f2346129ddbb3cf05fedb7
SHA2567a1e5c88bd7f89e4f655765aadaafbd2647043bf571ee5864b75761bef317d33
SHA512f4d5fab2c3e289c2459607a82363676579f0506d8cb90ea05ae84b6697d7fc245b0f308fcf65d5847298b816cee8840160511070ef1fe5ae94205baf5972105d
-
Filesize
1.3MB
MD555532aa1df272e9d5a22d63bd6b7cada
SHA18c8e13cc17aa785637f2346129ddbb3cf05fedb7
SHA2567a1e5c88bd7f89e4f655765aadaafbd2647043bf571ee5864b75761bef317d33
SHA512f4d5fab2c3e289c2459607a82363676579f0506d8cb90ea05ae84b6697d7fc245b0f308fcf65d5847298b816cee8840160511070ef1fe5ae94205baf5972105d
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf