Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2022 13:13
Static task
static1
Behavioral task
behavioral1
Sample
7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exe
Resource
win10v2004-20220812-en
General
-
Target
7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exe
-
Size
427KB
-
MD5
c34729173ecc820eb7674431597d78be
-
SHA1
884f343876a8bb0ebac63c28191c22c6f69590f8
-
SHA256
7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0
-
SHA512
f9c93a0c6f55217016fe5ba550e9948662901b9240662708ac93074bf9692427b73ce10864927026b118aeb6622a47cfa04976bbc9b482a31aef21a5c96786a0
-
SSDEEP
3072:yvGyYiSDnt1Et5CmPo8VGAnxoctr6Byd4TUISI:24UCp6n756BmlI
Malware Config
Extracted
redline
Nigh
80.66.87.20:80
-
auth_value
dab8506635d1dc134af4ebaedf4404eb
Signatures
-
Detects Smokeloader packer 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2368-168-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/2368-170-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/2368-171-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2024-150-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
Processes:
SETUP_~1.EXEHwqujbjwlyvggktrainingadministrator_s.exeSETUP_~1.EXEHwqujbjwlyvggktrainingadministrator_s.exe110D.exe1A75.exepid process 4884 SETUP_~1.EXE 1900 Hwqujbjwlyvggktrainingadministrator_s.exe 2024 SETUP_~1.EXE 2368 Hwqujbjwlyvggktrainingadministrator_s.exe 4936 110D.exe 4320 1A75.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SETUP_~1.EXEHwqujbjwlyvggktrainingadministrator_s.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation SETUP_~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Hwqujbjwlyvggktrainingadministrator_s.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce 7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
SETUP_~1.EXEHwqujbjwlyvggktrainingadministrator_s.exedescription pid process target process PID 4884 set thread context of 2024 4884 SETUP_~1.EXE SETUP_~1.EXE PID 1900 set thread context of 2368 1900 Hwqujbjwlyvggktrainingadministrator_s.exe Hwqujbjwlyvggktrainingadministrator_s.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Hwqujbjwlyvggktrainingadministrator_s.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Hwqujbjwlyvggktrainingadministrator_s.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Hwqujbjwlyvggktrainingadministrator_s.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Hwqujbjwlyvggktrainingadministrator_s.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exeSETUP_~1.EXEHwqujbjwlyvggktrainingadministrator_s.exepid process 320 powershell.exe 320 powershell.exe 3816 powershell.exe 3816 powershell.exe 2024 SETUP_~1.EXE 2024 SETUP_~1.EXE 2368 Hwqujbjwlyvggktrainingadministrator_s.exe 2368 Hwqujbjwlyvggktrainingadministrator_s.exe 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Hwqujbjwlyvggktrainingadministrator_s.exepid process 2368 Hwqujbjwlyvggktrainingadministrator_s.exe 2824 2824 2824 2824 -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
SETUP_~1.EXEpowershell.exeHwqujbjwlyvggktrainingadministrator_s.exepowershell.exeSETUP_~1.EXE110D.exedescription pid process Token: SeDebugPrivilege 4884 SETUP_~1.EXE Token: SeDebugPrivilege 320 powershell.exe Token: SeDebugPrivilege 1900 Hwqujbjwlyvggktrainingadministrator_s.exe Token: SeDebugPrivilege 3816 powershell.exe Token: SeDebugPrivilege 2024 SETUP_~1.EXE Token: SeDebugPrivilege 4936 110D.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exeSETUP_~1.EXEHwqujbjwlyvggktrainingadministrator_s.exedescription pid process target process PID 2444 wrote to memory of 4884 2444 7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exe SETUP_~1.EXE PID 2444 wrote to memory of 4884 2444 7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exe SETUP_~1.EXE PID 2444 wrote to memory of 4884 2444 7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exe SETUP_~1.EXE PID 4884 wrote to memory of 320 4884 SETUP_~1.EXE powershell.exe PID 4884 wrote to memory of 320 4884 SETUP_~1.EXE powershell.exe PID 4884 wrote to memory of 320 4884 SETUP_~1.EXE powershell.exe PID 4884 wrote to memory of 1900 4884 SETUP_~1.EXE Hwqujbjwlyvggktrainingadministrator_s.exe PID 4884 wrote to memory of 1900 4884 SETUP_~1.EXE Hwqujbjwlyvggktrainingadministrator_s.exe PID 4884 wrote to memory of 1900 4884 SETUP_~1.EXE Hwqujbjwlyvggktrainingadministrator_s.exe PID 4884 wrote to memory of 2024 4884 SETUP_~1.EXE SETUP_~1.EXE PID 4884 wrote to memory of 2024 4884 SETUP_~1.EXE SETUP_~1.EXE PID 4884 wrote to memory of 2024 4884 SETUP_~1.EXE SETUP_~1.EXE PID 4884 wrote to memory of 2024 4884 SETUP_~1.EXE SETUP_~1.EXE PID 4884 wrote to memory of 2024 4884 SETUP_~1.EXE SETUP_~1.EXE PID 4884 wrote to memory of 2024 4884 SETUP_~1.EXE SETUP_~1.EXE PID 4884 wrote to memory of 2024 4884 SETUP_~1.EXE SETUP_~1.EXE PID 4884 wrote to memory of 2024 4884 SETUP_~1.EXE SETUP_~1.EXE PID 1900 wrote to memory of 3816 1900 Hwqujbjwlyvggktrainingadministrator_s.exe powershell.exe PID 1900 wrote to memory of 3816 1900 Hwqujbjwlyvggktrainingadministrator_s.exe powershell.exe PID 1900 wrote to memory of 3816 1900 Hwqujbjwlyvggktrainingadministrator_s.exe powershell.exe PID 1900 wrote to memory of 2368 1900 Hwqujbjwlyvggktrainingadministrator_s.exe Hwqujbjwlyvggktrainingadministrator_s.exe PID 1900 wrote to memory of 2368 1900 Hwqujbjwlyvggktrainingadministrator_s.exe Hwqujbjwlyvggktrainingadministrator_s.exe PID 1900 wrote to memory of 2368 1900 Hwqujbjwlyvggktrainingadministrator_s.exe Hwqujbjwlyvggktrainingadministrator_s.exe PID 1900 wrote to memory of 2368 1900 Hwqujbjwlyvggktrainingadministrator_s.exe Hwqujbjwlyvggktrainingadministrator_s.exe PID 1900 wrote to memory of 2368 1900 Hwqujbjwlyvggktrainingadministrator_s.exe Hwqujbjwlyvggktrainingadministrator_s.exe PID 1900 wrote to memory of 2368 1900 Hwqujbjwlyvggktrainingadministrator_s.exe Hwqujbjwlyvggktrainingadministrator_s.exe PID 2824 wrote to memory of 4936 2824 110D.exe PID 2824 wrote to memory of 4936 2824 110D.exe PID 2824 wrote to memory of 4320 2824 1A75.exe PID 2824 wrote to memory of 4320 2824 1A75.exe PID 2824 wrote to memory of 4224 2824 explorer.exe PID 2824 wrote to memory of 4224 2824 explorer.exe PID 2824 wrote to memory of 4224 2824 explorer.exe PID 2824 wrote to memory of 4224 2824 explorer.exe PID 2824 wrote to memory of 5060 2824 explorer.exe PID 2824 wrote to memory of 5060 2824 explorer.exe PID 2824 wrote to memory of 5060 2824 explorer.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exe"C:\Users\Admin\AppData\Local\Temp\7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Users\Admin\AppData\Local\Temp\Hwqujbjwlyvggktrainingadministrator_s.exe"C:\Users\Admin\AppData\Local\Temp\Hwqujbjwlyvggktrainingadministrator_s.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Users\Admin\AppData\Local\Temp\Hwqujbjwlyvggktrainingadministrator_s.exeC:\Users\Admin\AppData\Local\Temp\Hwqujbjwlyvggktrainingadministrator_s.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
-
C:\Users\Admin\AppData\Local\Temp\110D.exeC:\Users\Admin\AppData\Local\Temp\110D.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4936 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA2AA==2⤵PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\1A75.exeC:\Users\Admin\AppData\Local\Temp\1A75.exe1⤵
- Executes dropped EXE
PID:4320 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==2⤵PID:3748
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4224
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e87e48b105757e1c7563d1c719059733
SHA128a3f2b2e0672da2b531f4757d2b20b53032dafc
SHA2560aaf22dc84cc3fcfe53de7ccfed8e662247dfb7f1a9967032c88790d0c663461
SHA512bf19c5743143aee914a453c41189c722c9b90a5b8bf299cecf3e1f97656d32cd209ecb74da8aebc89bb41c27d189f73aaaabbc64fe383410c95dc76ad4218968
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD5b9391200d17147d244cbbd251f242ca9
SHA195487ffd9a11fa9577f6e56c98f98b38af2eb831
SHA256eb09b63f134b1c49710728639ff493c6671472adb266f0fcb381957f35fb0f05
SHA51274e8c119030c72949283928f46abde907fc8bd5da8eadfdca1fbace7fb57a48d84ad6a01117c0295d203a4f9062df2780ff5de78383aa89179c7763086441e51
-
Filesize
15KB
MD5d487add1d989dabd1604ff1e817bfce8
SHA11f0132ebc4f2e84f103ad4e4706856d0e2a17ee9
SHA2569271b2023c4bbf05484080bc43ac3669a00864d8d438b58c38a040ad6c78deca
SHA51232294efc650111c66dfe37d25e4b2a4762d4bd058506c0f4d77401d1eee58e87be32189103cdbe2cf4b834c33b9783cc85c9f9afb87852db9ecbbcac9f92333a
-
Filesize
5KB
MD5a2f8e03e3c173ca5375b211ff4129d88
SHA19963026e9aa2a26f220ec88a7168895131dee6f3
SHA25652daa06f3b8f61e4f564ca96eda06911460e187b8d99e492e57e7e3e0c6b28dc
SHA5121d7dcff402f848779534b6db55064b784cf64b99afaca929dd5c02645873f71b3d7229199e6ebf74b0eb8b61b1fcae4d62c2d6404e22f52b3333155b57c743f5
-
Filesize
5KB
MD5a2f8e03e3c173ca5375b211ff4129d88
SHA19963026e9aa2a26f220ec88a7168895131dee6f3
SHA25652daa06f3b8f61e4f564ca96eda06911460e187b8d99e492e57e7e3e0c6b28dc
SHA5121d7dcff402f848779534b6db55064b784cf64b99afaca929dd5c02645873f71b3d7229199e6ebf74b0eb8b61b1fcae4d62c2d6404e22f52b3333155b57c743f5
-
Filesize
2.3MB
MD5fafdf59aed55dd1722f9aff24b573d6f
SHA1f6a9f61e547f23d9794c396da0bf5b696e5eeb05
SHA256a07b14225d793feae931a1802ced0c28da489e18072313586ec6c7df83d2c3bf
SHA51252b1b7281da803b7fca4cd6e2295e82165fd9bdbc96d70dbf2e87b12188e21eaaa59bc27611ac07fe7dfd099140d4cf7576895201abc27ae0a3d40d23417fff1
-
Filesize
2.3MB
MD5fafdf59aed55dd1722f9aff24b573d6f
SHA1f6a9f61e547f23d9794c396da0bf5b696e5eeb05
SHA256a07b14225d793feae931a1802ced0c28da489e18072313586ec6c7df83d2c3bf
SHA51252b1b7281da803b7fca4cd6e2295e82165fd9bdbc96d70dbf2e87b12188e21eaaa59bc27611ac07fe7dfd099140d4cf7576895201abc27ae0a3d40d23417fff1
-
Filesize
6KB
MD5d0b53e53092311bc055630adf3e4ccdc
SHA1bf66777607a1d968e3194fe047f9a0e03f249f28
SHA2560cdff2f53a06a63f46dd3e773c3ae99f1d29826975295407046d2d87f609fc3e
SHA51234ecfda7dcad85b6e29fe4a51d7798517d1c2432879eee547e254d251c7f21a52616af58c1a5ce6d50a6a505cf2d03a8e46a3d3a441ca18df1aa86ed9bc546c6
-
Filesize
6KB
MD5d0b53e53092311bc055630adf3e4ccdc
SHA1bf66777607a1d968e3194fe047f9a0e03f249f28
SHA2560cdff2f53a06a63f46dd3e773c3ae99f1d29826975295407046d2d87f609fc3e
SHA51234ecfda7dcad85b6e29fe4a51d7798517d1c2432879eee547e254d251c7f21a52616af58c1a5ce6d50a6a505cf2d03a8e46a3d3a441ca18df1aa86ed9bc546c6
-
Filesize
6KB
MD5d0b53e53092311bc055630adf3e4ccdc
SHA1bf66777607a1d968e3194fe047f9a0e03f249f28
SHA2560cdff2f53a06a63f46dd3e773c3ae99f1d29826975295407046d2d87f609fc3e
SHA51234ecfda7dcad85b6e29fe4a51d7798517d1c2432879eee547e254d251c7f21a52616af58c1a5ce6d50a6a505cf2d03a8e46a3d3a441ca18df1aa86ed9bc546c6
-
Filesize
214.6MB
MD54786de75433835fdc9d3d08edf8116ca
SHA12c6843f4b1992eeb9215c4d582a94c4ceb7284f9
SHA256d70c8ccf220b6424009b114c1af14df7e472b368f3c72b186322eeb86604b4eb
SHA512e828ee36882c3d95c4c86ee0bd396527d3eb89f036c706f6f108e2caf8c2e87f946dbaddfb71db9a386cb7c111622cbcdbe46feff0563a7f4cb4fd59f32c9ad9
-
Filesize
214.6MB
MD54786de75433835fdc9d3d08edf8116ca
SHA12c6843f4b1992eeb9215c4d582a94c4ceb7284f9
SHA256d70c8ccf220b6424009b114c1af14df7e472b368f3c72b186322eeb86604b4eb
SHA512e828ee36882c3d95c4c86ee0bd396527d3eb89f036c706f6f108e2caf8c2e87f946dbaddfb71db9a386cb7c111622cbcdbe46feff0563a7f4cb4fd59f32c9ad9
-
Filesize
214.6MB
MD54786de75433835fdc9d3d08edf8116ca
SHA12c6843f4b1992eeb9215c4d582a94c4ceb7284f9
SHA256d70c8ccf220b6424009b114c1af14df7e472b368f3c72b186322eeb86604b4eb
SHA512e828ee36882c3d95c4c86ee0bd396527d3eb89f036c706f6f108e2caf8c2e87f946dbaddfb71db9a386cb7c111622cbcdbe46feff0563a7f4cb4fd59f32c9ad9