Analysis
-
max time kernel
139s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 20:10
Static task
static1
Behavioral task
behavioral1
Sample
a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33.exe
Resource
win10v2004-20220812-en
General
-
Target
a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33.exe
-
Size
226KB
-
MD5
167dac22fcf52c27fe9e917b3be43e11
-
SHA1
8dad4942ae8c1b2b2730aff14d488337c505132e
-
SHA256
a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33
-
SHA512
d8f5eea165878839c1a2ef8b65ff876b28fbee9ad8b0ef96f0c4a3b628eedae684197b773717d62d06ad2cdc393196df856fbde9eb2a16e17c191175048ecce0
-
SSDEEP
3072:BobRJES5uMEDzS5GcuMZ1PEKtgLqKkw9k+/aqK+mYwTyrT6XlofQJwpskI2b:a+cNED7TMZ1aLqKk2k+SqK6cnJrkI
Malware Config
Extracted
amadey
3.50
31.41.244.17/hfk3vK9/index.php
Extracted
redline
pops
31.41.244.14:4694
-
auth_value
c377eb074ac3f12f85b0ff38d543b16d
Extracted
laplas
clipper.guru
-
api_key
ace492e9661223449782fcc8096dc6ef6289032d08d03a7b0a92179622c35bdb
Signatures
-
Detect Amadey credential stealer module 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll amadey_cred_module C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000002001\laba.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000002001\laba.exe family_redline behavioral1/memory/2272-155-0x00000000003B0000-0x00000000003D8000-memory.dmp family_redline -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 40 1904 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
Processes:
gntuud.exelaba.exelinda5.exegala.exegntuud.exeanon.exegntuud.exeJnEdxrtoRb.exepid process 176 gntuud.exe 2272 laba.exe 1244 linda5.exe 4492 gala.exe 4644 gntuud.exe 2916 anon.exe 3100 gntuud.exe 4840 JnEdxrtoRb.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33.exegntuud.exelinda5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation gntuud.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation linda5.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 2580 rundll32.exe 1904 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
gntuud.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\laba.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000002001\\laba.exe" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\linda5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000003001\\linda5.exe" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gala.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000004001\\gala.exe" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\anon.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\anon.exe" gntuud.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1000 4876 WerFault.exe a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33.exe 4448 4644 WerFault.exe gntuud.exe 5096 2916 WerFault.exe anon.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1124 schtasks.exe 1524 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 45 Go-http-client/1.1 -
Modifies registry class 1 IoCs
Processes:
linda5.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings linda5.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
rundll32.exelaba.exeanon.exepid process 1904 rundll32.exe 1904 rundll32.exe 1904 rundll32.exe 1904 rundll32.exe 2272 laba.exe 2916 anon.exe 2272 laba.exe 2916 anon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
anon.exelaba.exedescription pid process Token: SeDebugPrivilege 2916 anon.exe Token: SeDebugPrivilege 2272 laba.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33.exegntuud.exelinda5.execontrol.exegala.execmd.exedescription pid process target process PID 4876 wrote to memory of 176 4876 a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33.exe gntuud.exe PID 4876 wrote to memory of 176 4876 a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33.exe gntuud.exe PID 4876 wrote to memory of 176 4876 a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33.exe gntuud.exe PID 176 wrote to memory of 1124 176 gntuud.exe schtasks.exe PID 176 wrote to memory of 1124 176 gntuud.exe schtasks.exe PID 176 wrote to memory of 1124 176 gntuud.exe schtasks.exe PID 176 wrote to memory of 2272 176 gntuud.exe laba.exe PID 176 wrote to memory of 2272 176 gntuud.exe laba.exe PID 176 wrote to memory of 2272 176 gntuud.exe laba.exe PID 176 wrote to memory of 1244 176 gntuud.exe linda5.exe PID 176 wrote to memory of 1244 176 gntuud.exe linda5.exe PID 176 wrote to memory of 1244 176 gntuud.exe linda5.exe PID 176 wrote to memory of 4492 176 gntuud.exe gala.exe PID 176 wrote to memory of 4492 176 gntuud.exe gala.exe PID 176 wrote to memory of 4492 176 gntuud.exe gala.exe PID 1244 wrote to memory of 4652 1244 linda5.exe control.exe PID 1244 wrote to memory of 4652 1244 linda5.exe control.exe PID 1244 wrote to memory of 4652 1244 linda5.exe control.exe PID 4652 wrote to memory of 2580 4652 control.exe rundll32.exe PID 4652 wrote to memory of 2580 4652 control.exe rundll32.exe PID 4652 wrote to memory of 2580 4652 control.exe rundll32.exe PID 176 wrote to memory of 2916 176 gntuud.exe anon.exe PID 176 wrote to memory of 2916 176 gntuud.exe anon.exe PID 176 wrote to memory of 2916 176 gntuud.exe anon.exe PID 4492 wrote to memory of 3372 4492 gala.exe cmd.exe PID 4492 wrote to memory of 3372 4492 gala.exe cmd.exe PID 4492 wrote to memory of 3372 4492 gala.exe cmd.exe PID 3372 wrote to memory of 1524 3372 cmd.exe schtasks.exe PID 3372 wrote to memory of 1524 3372 cmd.exe schtasks.exe PID 3372 wrote to memory of 1524 3372 cmd.exe schtasks.exe PID 176 wrote to memory of 1904 176 gntuud.exe rundll32.exe PID 176 wrote to memory of 1904 176 gntuud.exe rundll32.exe PID 176 wrote to memory of 1904 176 gntuud.exe rundll32.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33.exe"C:\Users\Admin\AppData\Local\Temp\a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:176 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\1000002001\laba.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\laba.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\1000003001\linda5.exe"C:\Users\Admin\AppData\Local\Temp\1000003001\linda5.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\CJSFuUPf.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\CJSFuUPf.cpl",5⤵
- Loads dropped DLL
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\1000004001\gala.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\gala.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /create /tn KaAOqfgxzZ /tr C:\Users\Admin\AppData\Roaming\KaAOqfgxzZ\JnEdxrtoRb.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f4⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn KaAOqfgxzZ /tr C:\Users\Admin\AppData\Roaming\KaAOqfgxzZ\JnEdxrtoRb.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f5⤵
- Creates scheduled task(s)
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\1000005001\anon.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\anon.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 12324⤵
- Program crash
PID:5096 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 11362⤵
- Program crash
PID:1000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4876 -ip 48761⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:4644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 4162⤵
- Program crash
PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4644 -ip 46441⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2916 -ip 29161⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:3100
-
C:\Users\Admin\AppData\Roaming\KaAOqfgxzZ\JnEdxrtoRb.exeC:\Users\Admin\AppData\Roaming\KaAOqfgxzZ\JnEdxrtoRb.exe1⤵
- Executes dropped EXE
PID:4840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD59299834655f07e6896b1ff0b9e92c7b4
SHA1acba1e9262b4aebf020758e30326afdc99c714ad
SHA256fe105a23e4bee42b0401669d6ce9d34dbc7816a6cbef7c7108e11adc3c339257
SHA5127ab23ac1eedb82044946bb9e6afb308580d434be45f3ebd18c5fc90cd98281738e4f50e75a3506315785e60d93e90cc4facc285fe7760985dfe0fd47771bc650
-
Filesize
137KB
MD59299834655f07e6896b1ff0b9e92c7b4
SHA1acba1e9262b4aebf020758e30326afdc99c714ad
SHA256fe105a23e4bee42b0401669d6ce9d34dbc7816a6cbef7c7108e11adc3c339257
SHA5127ab23ac1eedb82044946bb9e6afb308580d434be45f3ebd18c5fc90cd98281738e4f50e75a3506315785e60d93e90cc4facc285fe7760985dfe0fd47771bc650
-
Filesize
1.6MB
MD531ef3fa7b104bcd73b5a600da1978721
SHA1e98d7ae14aa77e7774f2f9c445d7d446ac277456
SHA25661ede14e113e459e312b7de1a9b5058ff774a62628403a8dc5fa0429dbf63997
SHA512d8a2d836227289c33994feb727f413979aef2b37ddf559b62a62aaca7005e3bd957fe73a8521b16c0d6f1f4c420bed70d0f940c83cf98b1f0292cc3263cae640
-
Filesize
1.6MB
MD531ef3fa7b104bcd73b5a600da1978721
SHA1e98d7ae14aa77e7774f2f9c445d7d446ac277456
SHA25661ede14e113e459e312b7de1a9b5058ff774a62628403a8dc5fa0429dbf63997
SHA512d8a2d836227289c33994feb727f413979aef2b37ddf559b62a62aaca7005e3bd957fe73a8521b16c0d6f1f4c420bed70d0f940c83cf98b1f0292cc3263cae640
-
Filesize
4.6MB
MD5f6829a19455a7b24a79e0b984d2a42d9
SHA1c71d657301d721b42c52c0252aa5fe0dbfb04f9f
SHA2567dc8f90673b102c2945e36747763ccccd243519500eca01fd1cfdbbfcb61d61b
SHA512e3d8db3d3938366e9fe8c1645647dbf29bfb5c9a6210f54bdfca05b9782f005b9b40df2a7980f160143c48139a638c5a4ff6b091d0d846a839d363eba94bce4c
-
Filesize
4.6MB
MD5f6829a19455a7b24a79e0b984d2a42d9
SHA1c71d657301d721b42c52c0252aa5fe0dbfb04f9f
SHA2567dc8f90673b102c2945e36747763ccccd243519500eca01fd1cfdbbfcb61d61b
SHA512e3d8db3d3938366e9fe8c1645647dbf29bfb5c9a6210f54bdfca05b9782f005b9b40df2a7980f160143c48139a638c5a4ff6b091d0d846a839d363eba94bce4c
-
Filesize
317KB
MD5d46c47543ab771c8d6bd2d7c9ba853a3
SHA1b339decb0fd779a0a7c192d321aec1017808e28e
SHA2569617d4eefc2c16ff7587d7a85c1f52d23053e02632e9cfc27e0a5eb84486f05c
SHA512e601d8b012d81409005b3b7aa002b2ce4417ae36f0a62f6dba4fdb592f6e730eafb02d1c5adbdc6db800206204b5b30577366e85f8faa3b719ef0dc574917d8f
-
Filesize
317KB
MD5d46c47543ab771c8d6bd2d7c9ba853a3
SHA1b339decb0fd779a0a7c192d321aec1017808e28e
SHA2569617d4eefc2c16ff7587d7a85c1f52d23053e02632e9cfc27e0a5eb84486f05c
SHA512e601d8b012d81409005b3b7aa002b2ce4417ae36f0a62f6dba4fdb592f6e730eafb02d1c5adbdc6db800206204b5b30577366e85f8faa3b719ef0dc574917d8f
-
Filesize
226KB
MD5167dac22fcf52c27fe9e917b3be43e11
SHA18dad4942ae8c1b2b2730aff14d488337c505132e
SHA256a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33
SHA512d8f5eea165878839c1a2ef8b65ff876b28fbee9ad8b0ef96f0c4a3b628eedae684197b773717d62d06ad2cdc393196df856fbde9eb2a16e17c191175048ecce0
-
Filesize
226KB
MD5167dac22fcf52c27fe9e917b3be43e11
SHA18dad4942ae8c1b2b2730aff14d488337c505132e
SHA256a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33
SHA512d8f5eea165878839c1a2ef8b65ff876b28fbee9ad8b0ef96f0c4a3b628eedae684197b773717d62d06ad2cdc393196df856fbde9eb2a16e17c191175048ecce0
-
Filesize
226KB
MD5167dac22fcf52c27fe9e917b3be43e11
SHA18dad4942ae8c1b2b2730aff14d488337c505132e
SHA256a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33
SHA512d8f5eea165878839c1a2ef8b65ff876b28fbee9ad8b0ef96f0c4a3b628eedae684197b773717d62d06ad2cdc393196df856fbde9eb2a16e17c191175048ecce0
-
Filesize
226KB
MD5167dac22fcf52c27fe9e917b3be43e11
SHA18dad4942ae8c1b2b2730aff14d488337c505132e
SHA256a340ef87388e48372411ef538387442bc20a1d05daa50271a4d423eb227c2a33
SHA512d8f5eea165878839c1a2ef8b65ff876b28fbee9ad8b0ef96f0c4a3b628eedae684197b773717d62d06ad2cdc393196df856fbde9eb2a16e17c191175048ecce0
-
Filesize
1.8MB
MD5e9f31ed520cb7d8377ffd56d9b4bc9bc
SHA15771a75421efaaa792a6852934e1ae7c7f0bf293
SHA2564ccbcc495a45c36a26e4ad432938fa95cde54175ae9ef65cbb234b7626eaa323
SHA512dd1483188828aa44a55b9534f446f6efa36631afe7c978df5b63b8fb7c712b7d41e4cbcf2f68a090ae8282c29abe92cb8f39101e214394aef7561de946495c9c
-
Filesize
1.8MB
MD5e9f31ed520cb7d8377ffd56d9b4bc9bc
SHA15771a75421efaaa792a6852934e1ae7c7f0bf293
SHA2564ccbcc495a45c36a26e4ad432938fa95cde54175ae9ef65cbb234b7626eaa323
SHA512dd1483188828aa44a55b9534f446f6efa36631afe7c978df5b63b8fb7c712b7d41e4cbcf2f68a090ae8282c29abe92cb8f39101e214394aef7561de946495c9c
-
Filesize
126KB
MD5adbaf286228c46522e50371c4be31a03
SHA1a29d644c4663b2e2b2bd92046ba0df629537c297
SHA256d3e9a3365f73a34e2dd9022a318abcc2c55af98bafb2dc302cbb55f5398bb9a0
SHA51274a55cc8d8c3af54e5ba290a34b968918da994ea2d55b5f0d1f39e83cb9a39d73226227933c760b48f2e0bdb646f8243967517ef8202e02d88411d2d19ae217d
-
Filesize
126KB
MD5adbaf286228c46522e50371c4be31a03
SHA1a29d644c4663b2e2b2bd92046ba0df629537c297
SHA256d3e9a3365f73a34e2dd9022a318abcc2c55af98bafb2dc302cbb55f5398bb9a0
SHA51274a55cc8d8c3af54e5ba290a34b968918da994ea2d55b5f0d1f39e83cb9a39d73226227933c760b48f2e0bdb646f8243967517ef8202e02d88411d2d19ae217d
-
Filesize
180.8MB
MD58986f36a98a2b40496e9e4e9d11f9f78
SHA1efef21e2cc2b41e4a20cae775923971aecb2420a
SHA256c55e0ab31f894c6c4907685fabd4a0c3bb5d12bab14b7c5510f52d4673118f52
SHA512fa995952b3740b682fb977557d6974198c2a7c6068f9426ed1dbec66940eac88c9419d8da24f8250e7f098972829f1b9953244e76f68435103799cd50ed16af3
-
Filesize
179.5MB
MD5f9650259ae9c20ef7d5565bb0aeaca91
SHA12958adacb8eaf7a2193bbba7d22498b89a579fb8
SHA2566c1b1d662dd7f6a6b35087c074db8fb8b2e62e41f70c296315a4d58b3ccc15c7
SHA512074ae0b9f9e1b132e126e79ef3ffd6a4eb4ab57042b1ddacbaf1e1b2461ca84c7a34460a819a0584fb2e1542b6ca293fcb7932c2fc244aff66a1463824e72cde