Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
06/08/2023, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
4469637f8f8be57b52ddbfd4ff3f5729d2f1ed5c18ee619fe4ebaf4ac432b512.exe
Resource
win10-20230703-en
General
-
Target
4469637f8f8be57b52ddbfd4ff3f5729d2f1ed5c18ee619fe4ebaf4ac432b512.exe
-
Size
680KB
-
MD5
52a10a0e5e32bddfa6206cf103b0d70e
-
SHA1
bd28e12e4a7d2bf989ecb7cb81067977de99f223
-
SHA256
4469637f8f8be57b52ddbfd4ff3f5729d2f1ed5c18ee619fe4ebaf4ac432b512
-
SHA512
cd93febbc5f3d87b70504361dc59ca9dffdf0e0633afabe1a77cb9e7989235515834da1fc89ff6a2131288ccd967947fed9591935b693c6397b4d8fe38a37c4a
-
SSDEEP
12288:sMrUy90i9+UBOthklQcuZvpYD1ewoCSaHOG1QVFyf2v/ttTD1PaTER:QyFOrklgLYJBzSyYHVXjP12K
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
savin
77.91.124.156:19071
-
auth_value
a1a05b810428195ab7bb63b132ea0c8d
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001b03c-148.dat healer behavioral1/files/0x000700000001b03c-149.dat healer behavioral1/memory/5036-150-0x0000000000660000-0x000000000066A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1939685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1939685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1939685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1939685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1939685.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 2624 v5018747.exe 4248 v0399902.exe 4932 v6798883.exe 5036 a1939685.exe 3192 b2340747.exe 4824 pdates.exe 3308 c8449287.exe 432 d4930000.exe 1852 pdates.exe 4892 FA59.exe -
Loads dropped DLL 3 IoCs
pid Process 5016 rundll32.exe 1104 rundll32.exe 4520 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a1939685.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4469637f8f8be57b52ddbfd4ff3f5729d2f1ed5c18ee619fe4ebaf4ac432b512.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5018747.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0399902.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v6798883.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5024 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000_Classes\Local Settings FA59.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5036 a1939685.exe 5036 a1939685.exe 3308 c8449287.exe 3308 c8449287.exe 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3184 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3308 c8449287.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 5036 a1939685.exe Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3192 b2340747.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 2624 4616 4469637f8f8be57b52ddbfd4ff3f5729d2f1ed5c18ee619fe4ebaf4ac432b512.exe 70 PID 4616 wrote to memory of 2624 4616 4469637f8f8be57b52ddbfd4ff3f5729d2f1ed5c18ee619fe4ebaf4ac432b512.exe 70 PID 4616 wrote to memory of 2624 4616 4469637f8f8be57b52ddbfd4ff3f5729d2f1ed5c18ee619fe4ebaf4ac432b512.exe 70 PID 2624 wrote to memory of 4248 2624 v5018747.exe 71 PID 2624 wrote to memory of 4248 2624 v5018747.exe 71 PID 2624 wrote to memory of 4248 2624 v5018747.exe 71 PID 4248 wrote to memory of 4932 4248 v0399902.exe 72 PID 4248 wrote to memory of 4932 4248 v0399902.exe 72 PID 4248 wrote to memory of 4932 4248 v0399902.exe 72 PID 4932 wrote to memory of 5036 4932 v6798883.exe 73 PID 4932 wrote to memory of 5036 4932 v6798883.exe 73 PID 4932 wrote to memory of 3192 4932 v6798883.exe 74 PID 4932 wrote to memory of 3192 4932 v6798883.exe 74 PID 4932 wrote to memory of 3192 4932 v6798883.exe 74 PID 3192 wrote to memory of 4824 3192 b2340747.exe 75 PID 3192 wrote to memory of 4824 3192 b2340747.exe 75 PID 3192 wrote to memory of 4824 3192 b2340747.exe 75 PID 4248 wrote to memory of 3308 4248 v0399902.exe 76 PID 4248 wrote to memory of 3308 4248 v0399902.exe 76 PID 4248 wrote to memory of 3308 4248 v0399902.exe 76 PID 4824 wrote to memory of 5024 4824 pdates.exe 77 PID 4824 wrote to memory of 5024 4824 pdates.exe 77 PID 4824 wrote to memory of 5024 4824 pdates.exe 77 PID 4824 wrote to memory of 748 4824 pdates.exe 79 PID 4824 wrote to memory of 748 4824 pdates.exe 79 PID 4824 wrote to memory of 748 4824 pdates.exe 79 PID 748 wrote to memory of 4752 748 cmd.exe 81 PID 748 wrote to memory of 4752 748 cmd.exe 81 PID 748 wrote to memory of 4752 748 cmd.exe 81 PID 748 wrote to memory of 3928 748 cmd.exe 82 PID 748 wrote to memory of 3928 748 cmd.exe 82 PID 748 wrote to memory of 3928 748 cmd.exe 82 PID 748 wrote to memory of 3244 748 cmd.exe 83 PID 748 wrote to memory of 3244 748 cmd.exe 83 PID 748 wrote to memory of 3244 748 cmd.exe 83 PID 748 wrote to memory of 1532 748 cmd.exe 84 PID 748 wrote to memory of 1532 748 cmd.exe 84 PID 748 wrote to memory of 1532 748 cmd.exe 84 PID 748 wrote to memory of 4212 748 cmd.exe 85 PID 748 wrote to memory of 4212 748 cmd.exe 85 PID 748 wrote to memory of 4212 748 cmd.exe 85 PID 748 wrote to memory of 4728 748 cmd.exe 86 PID 748 wrote to memory of 4728 748 cmd.exe 86 PID 748 wrote to memory of 4728 748 cmd.exe 86 PID 2624 wrote to memory of 432 2624 v5018747.exe 87 PID 2624 wrote to memory of 432 2624 v5018747.exe 87 PID 2624 wrote to memory of 432 2624 v5018747.exe 87 PID 4824 wrote to memory of 5016 4824 pdates.exe 89 PID 4824 wrote to memory of 5016 4824 pdates.exe 89 PID 4824 wrote to memory of 5016 4824 pdates.exe 89 PID 3184 wrote to memory of 4892 3184 Process not Found 90 PID 3184 wrote to memory of 4892 3184 Process not Found 90 PID 3184 wrote to memory of 4892 3184 Process not Found 90 PID 4892 wrote to memory of 552 4892 FA59.exe 91 PID 4892 wrote to memory of 552 4892 FA59.exe 91 PID 4892 wrote to memory of 552 4892 FA59.exe 91 PID 552 wrote to memory of 1104 552 control.exe 93 PID 552 wrote to memory of 1104 552 control.exe 93 PID 552 wrote to memory of 1104 552 control.exe 93 PID 1104 wrote to memory of 2592 1104 rundll32.exe 94 PID 1104 wrote to memory of 2592 1104 rundll32.exe 94 PID 2592 wrote to memory of 4520 2592 RunDll32.exe 95 PID 2592 wrote to memory of 4520 2592 RunDll32.exe 95 PID 2592 wrote to memory of 4520 2592 RunDll32.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4469637f8f8be57b52ddbfd4ff3f5729d2f1ed5c18ee619fe4ebaf4ac432b512.exe"C:\Users\Admin\AppData\Local\Temp\4469637f8f8be57b52ddbfd4ff3f5729d2f1ed5c18ee619fe4ebaf4ac432b512.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5018747.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5018747.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0399902.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0399902.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6798883.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6798883.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1939685.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1939685.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2340747.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2340747.exe5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F7⤵
- Creates scheduled task(s)
PID:5024
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4752
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"8⤵PID:3928
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E8⤵PID:3244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"8⤵PID:4212
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E8⤵PID:4728
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:5016
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8449287.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8449287.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3308
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4930000.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4930000.exe3⤵
- Executes dropped EXE
PID:432
-
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:1852
-
C:\Users\Admin\AppData\Local\Temp\FA59.exeC:\Users\Admin\AppData\Local\Temp\FA59.exe1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\H86hV6.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\H86hV6.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\H86hV6.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\H86hV6.CPl",5⤵
- Loads dropped DLL
PID:4520
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233KB
MD5fab215c8dcd4d753f0e60e55a3c6e0fb
SHA12a04d196ea701543f87832eca51dfbc084a560f0
SHA25696f8c88ea75f3f0e26b279f7bad2a12d2f4b3f4a6e1d897f73b04a1cd2c95ff7
SHA5124396584be6708a2ac6288d4ea49f60bd4a022d9392491d93e7d963d9efa77cb06f2ff1a0894547c41353947eaf58386d7e55e35de393a270a11d0679cdc9e880
-
Filesize
233KB
MD5fab215c8dcd4d753f0e60e55a3c6e0fb
SHA12a04d196ea701543f87832eca51dfbc084a560f0
SHA25696f8c88ea75f3f0e26b279f7bad2a12d2f4b3f4a6e1d897f73b04a1cd2c95ff7
SHA5124396584be6708a2ac6288d4ea49f60bd4a022d9392491d93e7d963d9efa77cb06f2ff1a0894547c41353947eaf58386d7e55e35de393a270a11d0679cdc9e880
-
Filesize
233KB
MD5fab215c8dcd4d753f0e60e55a3c6e0fb
SHA12a04d196ea701543f87832eca51dfbc084a560f0
SHA25696f8c88ea75f3f0e26b279f7bad2a12d2f4b3f4a6e1d897f73b04a1cd2c95ff7
SHA5124396584be6708a2ac6288d4ea49f60bd4a022d9392491d93e7d963d9efa77cb06f2ff1a0894547c41353947eaf58386d7e55e35de393a270a11d0679cdc9e880
-
Filesize
233KB
MD5fab215c8dcd4d753f0e60e55a3c6e0fb
SHA12a04d196ea701543f87832eca51dfbc084a560f0
SHA25696f8c88ea75f3f0e26b279f7bad2a12d2f4b3f4a6e1d897f73b04a1cd2c95ff7
SHA5124396584be6708a2ac6288d4ea49f60bd4a022d9392491d93e7d963d9efa77cb06f2ff1a0894547c41353947eaf58386d7e55e35de393a270a11d0679cdc9e880
-
Filesize
2.9MB
MD54406e4712cb53a5eb1e48c7b7613d5ba
SHA148038bf79b6c7f6dcd6827e8d159a3941f49ef11
SHA25649d050bc5594ef4186472d3f466ef27a0a95ef0467416e6af001fc0dfc0e44b7
SHA5123d818813c204b957c9bf3aed0362168c4d17171aa27ba2b5108502e414b442b3fa6ea5354af1542cf9d61a4571b4f0af28f5c81ad2bd0bd4a61a8eb62d66c7f2
-
Filesize
2.9MB
MD54406e4712cb53a5eb1e48c7b7613d5ba
SHA148038bf79b6c7f6dcd6827e8d159a3941f49ef11
SHA25649d050bc5594ef4186472d3f466ef27a0a95ef0467416e6af001fc0dfc0e44b7
SHA5123d818813c204b957c9bf3aed0362168c4d17171aa27ba2b5108502e414b442b3fa6ea5354af1542cf9d61a4571b4f0af28f5c81ad2bd0bd4a61a8eb62d66c7f2
-
Filesize
2.3MB
MD53ba6d83b0ead284fb3a1921ad249a6ca
SHA163e057b49d697d52928e2daa8fa7b122d8869204
SHA256608dc416f5dfe68087a1d29154fa7699724bb13e5837c5633fb65829c114fde2
SHA512be50b5798676b1e64fa2d9b9372d6abd9c281223fff9847630d29f64e9f477d01548cef30ad67374e4493b72c09610c25a3178e5e81413a889c1421472e474f9
-
Filesize
515KB
MD5c7e26637d2045ca50daa7b326882d383
SHA1a3635eeeba3cfc30dda05a5a56b08a69efa64d7f
SHA256855e464d4801b94a495d86001e9d56e6cf19ff60d66a8d4fa4b28f0d21cd3e80
SHA51249d954f10eb08fe410ffa2c67c117a80809521da43b6319c4e0a5a4bca2ce9ea698b8778274916efa8229435a1795c33e747fe0e36eb5fdc1ef075d43e5d5e3d
-
Filesize
515KB
MD5c7e26637d2045ca50daa7b326882d383
SHA1a3635eeeba3cfc30dda05a5a56b08a69efa64d7f
SHA256855e464d4801b94a495d86001e9d56e6cf19ff60d66a8d4fa4b28f0d21cd3e80
SHA51249d954f10eb08fe410ffa2c67c117a80809521da43b6319c4e0a5a4bca2ce9ea698b8778274916efa8229435a1795c33e747fe0e36eb5fdc1ef075d43e5d5e3d
-
Filesize
175KB
MD5b72f9d74be4ad7a3828aa8484f74b517
SHA174ade53aafc9deec6ec9ecc80104c90c03cbe6e7
SHA256666c043cdaf1d2e418b9012a58569796076a23300b135ec2f3e49cc9d4588d21
SHA5121f448353f1f43aabfec99d6883cc35b211bc3bfa4fe891ad95f24db0fb5d065cf3506a20ff508deea1fc7e4099f79fc3ed55e0ecf73180b7e150be3f0577b3f4
-
Filesize
175KB
MD5b72f9d74be4ad7a3828aa8484f74b517
SHA174ade53aafc9deec6ec9ecc80104c90c03cbe6e7
SHA256666c043cdaf1d2e418b9012a58569796076a23300b135ec2f3e49cc9d4588d21
SHA5121f448353f1f43aabfec99d6883cc35b211bc3bfa4fe891ad95f24db0fb5d065cf3506a20ff508deea1fc7e4099f79fc3ed55e0ecf73180b7e150be3f0577b3f4
-
Filesize
359KB
MD5c6d204e08587c7845a10a36c545e9751
SHA1b234a3389644de352cb33b00fe611f7682e13da4
SHA256d0946386d6962268c4de43fa288a3f08c171900c21e61da386c34aa6c48d402d
SHA5128c68c4d69ccd01305d8632b16ad25ab3ff8362846b69fb3e2ffb03cc60c836f085f399957ebd2e816275a4555e74abba69bbd83ee7b4c448ae131b29a3f59636
-
Filesize
359KB
MD5c6d204e08587c7845a10a36c545e9751
SHA1b234a3389644de352cb33b00fe611f7682e13da4
SHA256d0946386d6962268c4de43fa288a3f08c171900c21e61da386c34aa6c48d402d
SHA5128c68c4d69ccd01305d8632b16ad25ab3ff8362846b69fb3e2ffb03cc60c836f085f399957ebd2e816275a4555e74abba69bbd83ee7b4c448ae131b29a3f59636
-
Filesize
41KB
MD58e2f180f62f2d4ba568663fe80219f67
SHA1f9af9a3a4b3d4d9203de9b035569341e1d01ce72
SHA2568f9a9265c28c16b1795e9d4977660d5224f3f77a97f2a9abef24d78fea609bdb
SHA512d7fb6f20e6982c36711975b531c2ae0cd916c5e269cbb4555f975208dae4c262ea673c2809ee615a8e68a3bf5aba1d6300aa36a8179ee609e6e9ae557d9bf2db
-
Filesize
41KB
MD58e2f180f62f2d4ba568663fe80219f67
SHA1f9af9a3a4b3d4d9203de9b035569341e1d01ce72
SHA2568f9a9265c28c16b1795e9d4977660d5224f3f77a97f2a9abef24d78fea609bdb
SHA512d7fb6f20e6982c36711975b531c2ae0cd916c5e269cbb4555f975208dae4c262ea673c2809ee615a8e68a3bf5aba1d6300aa36a8179ee609e6e9ae557d9bf2db
-
Filesize
234KB
MD5af83e21252787abb30780a9195b8682b
SHA1f2f42b9ab4e7f432fdeafaabe4df274209fdf1af
SHA2563b73685ab0f46197b643ff15e5ab0c7c65b0e7c24c98d3623a1334269d7098cd
SHA51243ec81532f8f2f5b25c14de4c34f1cbd45feda1801ff3ecf3c8c721dcf66d549945c96dcf67ac398abe6478dab0dd3f20556cbe3eee7036a7e5b08a46dd50627
-
Filesize
234KB
MD5af83e21252787abb30780a9195b8682b
SHA1f2f42b9ab4e7f432fdeafaabe4df274209fdf1af
SHA2563b73685ab0f46197b643ff15e5ab0c7c65b0e7c24c98d3623a1334269d7098cd
SHA51243ec81532f8f2f5b25c14de4c34f1cbd45feda1801ff3ecf3c8c721dcf66d549945c96dcf67ac398abe6478dab0dd3f20556cbe3eee7036a7e5b08a46dd50627
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
233KB
MD5fab215c8dcd4d753f0e60e55a3c6e0fb
SHA12a04d196ea701543f87832eca51dfbc084a560f0
SHA25696f8c88ea75f3f0e26b279f7bad2a12d2f4b3f4a6e1d897f73b04a1cd2c95ff7
SHA5124396584be6708a2ac6288d4ea49f60bd4a022d9392491d93e7d963d9efa77cb06f2ff1a0894547c41353947eaf58386d7e55e35de393a270a11d0679cdc9e880
-
Filesize
233KB
MD5fab215c8dcd4d753f0e60e55a3c6e0fb
SHA12a04d196ea701543f87832eca51dfbc084a560f0
SHA25696f8c88ea75f3f0e26b279f7bad2a12d2f4b3f4a6e1d897f73b04a1cd2c95ff7
SHA5124396584be6708a2ac6288d4ea49f60bd4a022d9392491d93e7d963d9efa77cb06f2ff1a0894547c41353947eaf58386d7e55e35de393a270a11d0679cdc9e880
-
Filesize
89KB
MD52392b231cf4a80739b5cb09bf808127d
SHA141b5cf81c50884954911d96444fe83cfd0da465b
SHA2562244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f
SHA51219ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34
-
Filesize
89KB
MD52392b231cf4a80739b5cb09bf808127d
SHA141b5cf81c50884954911d96444fe83cfd0da465b
SHA2562244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f
SHA51219ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34
-
Filesize
273B
MD59851b884bf4aadfade57d911a3f03332
SHA1aaadd1c1856c22844bb9fbb030cf4f586ed8866a
SHA25603afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f
SHA512a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327
-
Filesize
2.3MB
MD53ba6d83b0ead284fb3a1921ad249a6ca
SHA163e057b49d697d52928e2daa8fa7b122d8869204
SHA256608dc416f5dfe68087a1d29154fa7699724bb13e5837c5633fb65829c114fde2
SHA512be50b5798676b1e64fa2d9b9372d6abd9c281223fff9847630d29f64e9f477d01548cef30ad67374e4493b72c09610c25a3178e5e81413a889c1421472e474f9
-
Filesize
2.3MB
MD53ba6d83b0ead284fb3a1921ad249a6ca
SHA163e057b49d697d52928e2daa8fa7b122d8869204
SHA256608dc416f5dfe68087a1d29154fa7699724bb13e5837c5633fb65829c114fde2
SHA512be50b5798676b1e64fa2d9b9372d6abd9c281223fff9847630d29f64e9f477d01548cef30ad67374e4493b72c09610c25a3178e5e81413a889c1421472e474f9
-
Filesize
89KB
MD52392b231cf4a80739b5cb09bf808127d
SHA141b5cf81c50884954911d96444fe83cfd0da465b
SHA2562244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f
SHA51219ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34