Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
10/02/2023, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
71d3510fd8c11da4187960127bb042b7bd1d98c99f7413073fbc23436b9f9ccf.exe
Resource
win10v2004-20220901-en
General
-
Target
71d3510fd8c11da4187960127bb042b7bd1d98c99f7413073fbc23436b9f9ccf.exe
-
Size
785KB
-
MD5
dbda1d24e84e3ff338e89c0c29115d46
-
SHA1
b5b8c187cf25b422fc164685bfcf055c235c0080
-
SHA256
71d3510fd8c11da4187960127bb042b7bd1d98c99f7413073fbc23436b9f9ccf
-
SHA512
56a202e028b06e027aae82ef7dc521d18bd043ed3054ec205b0bab0931960f8e5527afffc974f0c9c72304ebd743874f8baba648858ecc15adaf588010e68f0a
-
SSDEEP
12288:BMr4y90nwRHv4Xo4NUwPTT8ft7C2eiB4JoHI7CIemDNr:JyACHv4Xo4xT8lW2ei6SUZDNr
Malware Config
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
dubna
193.233.20.11:4131
-
auth_value
f324b1269094b7462e56bab025f032f4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" djW16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" djW16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" djW16.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection djW16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" djW16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" djW16.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation aPy90un.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 10 IoCs
pid Process 1936 fwX64iu.exe 1772 fmq40nb.exe 4760 aPy90un.exe 5000 mnolyk.exe 4976 byn07Ho.exe 4208 mnolyk.exe 1412 cfj5459.exe 448 djW16.exe 3860 mnolyk.exe 3524 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 2468 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" djW16.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fwX64iu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" fwX64iu.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fmq40nb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" fmq40nb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 71d3510fd8c11da4187960127bb042b7bd1d98c99f7413073fbc23436b9f9ccf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 71d3510fd8c11da4187960127bb042b7bd1d98c99f7413073fbc23436b9f9ccf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4420 1412 WerFault.exe 102 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4976 byn07Ho.exe 4976 byn07Ho.exe 1412 cfj5459.exe 1412 cfj5459.exe 448 djW16.exe 448 djW16.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4976 byn07Ho.exe Token: SeDebugPrivilege 1412 cfj5459.exe Token: SeDebugPrivilege 448 djW16.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1936 1628 71d3510fd8c11da4187960127bb042b7bd1d98c99f7413073fbc23436b9f9ccf.exe 80 PID 1628 wrote to memory of 1936 1628 71d3510fd8c11da4187960127bb042b7bd1d98c99f7413073fbc23436b9f9ccf.exe 80 PID 1628 wrote to memory of 1936 1628 71d3510fd8c11da4187960127bb042b7bd1d98c99f7413073fbc23436b9f9ccf.exe 80 PID 1936 wrote to memory of 1772 1936 fwX64iu.exe 81 PID 1936 wrote to memory of 1772 1936 fwX64iu.exe 81 PID 1936 wrote to memory of 1772 1936 fwX64iu.exe 81 PID 1772 wrote to memory of 4760 1772 fmq40nb.exe 82 PID 1772 wrote to memory of 4760 1772 fmq40nb.exe 82 PID 1772 wrote to memory of 4760 1772 fmq40nb.exe 82 PID 4760 wrote to memory of 5000 4760 aPy90un.exe 83 PID 4760 wrote to memory of 5000 4760 aPy90un.exe 83 PID 4760 wrote to memory of 5000 4760 aPy90un.exe 83 PID 1772 wrote to memory of 4976 1772 fmq40nb.exe 84 PID 1772 wrote to memory of 4976 1772 fmq40nb.exe 84 PID 1772 wrote to memory of 4976 1772 fmq40nb.exe 84 PID 5000 wrote to memory of 1728 5000 mnolyk.exe 85 PID 5000 wrote to memory of 1728 5000 mnolyk.exe 85 PID 5000 wrote to memory of 1728 5000 mnolyk.exe 85 PID 5000 wrote to memory of 1540 5000 mnolyk.exe 87 PID 5000 wrote to memory of 1540 5000 mnolyk.exe 87 PID 5000 wrote to memory of 1540 5000 mnolyk.exe 87 PID 1540 wrote to memory of 1888 1540 cmd.exe 89 PID 1540 wrote to memory of 1888 1540 cmd.exe 89 PID 1540 wrote to memory of 1888 1540 cmd.exe 89 PID 1540 wrote to memory of 4076 1540 cmd.exe 90 PID 1540 wrote to memory of 4076 1540 cmd.exe 90 PID 1540 wrote to memory of 4076 1540 cmd.exe 90 PID 1540 wrote to memory of 3500 1540 cmd.exe 91 PID 1540 wrote to memory of 3500 1540 cmd.exe 91 PID 1540 wrote to memory of 3500 1540 cmd.exe 91 PID 1540 wrote to memory of 2284 1540 cmd.exe 92 PID 1540 wrote to memory of 2284 1540 cmd.exe 92 PID 1540 wrote to memory of 2284 1540 cmd.exe 92 PID 1540 wrote to memory of 4052 1540 cmd.exe 93 PID 1540 wrote to memory of 4052 1540 cmd.exe 93 PID 1540 wrote to memory of 4052 1540 cmd.exe 93 PID 1540 wrote to memory of 3680 1540 cmd.exe 94 PID 1540 wrote to memory of 3680 1540 cmd.exe 94 PID 1540 wrote to memory of 3680 1540 cmd.exe 94 PID 1936 wrote to memory of 1412 1936 fwX64iu.exe 102 PID 1936 wrote to memory of 1412 1936 fwX64iu.exe 102 PID 1936 wrote to memory of 1412 1936 fwX64iu.exe 102 PID 1628 wrote to memory of 448 1628 71d3510fd8c11da4187960127bb042b7bd1d98c99f7413073fbc23436b9f9ccf.exe 107 PID 1628 wrote to memory of 448 1628 71d3510fd8c11da4187960127bb042b7bd1d98c99f7413073fbc23436b9f9ccf.exe 107 PID 5000 wrote to memory of 2468 5000 mnolyk.exe 108 PID 5000 wrote to memory of 2468 5000 mnolyk.exe 108 PID 5000 wrote to memory of 2468 5000 mnolyk.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\71d3510fd8c11da4187960127bb042b7bd1d98c99f7413073fbc23436b9f9ccf.exe"C:\Users\Admin\AppData\Local\Temp\71d3510fd8c11da4187960127bb042b7bd1d98c99f7413073fbc23436b9f9ccf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fwX64iu.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fwX64iu.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fmq40nb.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fmq40nb.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aPy90un.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aPy90un.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:1728
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1888
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:4076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:3500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2284
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:N"7⤵PID:4052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:R" /E7⤵PID:3680
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\byn07Ho.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\byn07Ho.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cfj5459.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cfj5459.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1412 -s 18524⤵
- Program crash
PID:4420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\djW16.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\djW16.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1412 -ip 14121⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:3860
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:3524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
681KB
MD5bf3b4da32a9b5285dadcbeced4540995
SHA1d5ab8c767a273e5a2af58426bd878432d77a5328
SHA256ab132a02523a74e67f2f86b117fad4c2ecd778ee04441b45f67127f2adee51d5
SHA512aabf7e713ac39553493471490737d6c58b20fc9d66ad458b4aa3b81e5d0c685b55d41fcbf77a3881782e5a2757c944db79939239af92ca009c720dc382a67fcc
-
Filesize
681KB
MD5bf3b4da32a9b5285dadcbeced4540995
SHA1d5ab8c767a273e5a2af58426bd878432d77a5328
SHA256ab132a02523a74e67f2f86b117fad4c2ecd778ee04441b45f67127f2adee51d5
SHA512aabf7e713ac39553493471490737d6c58b20fc9d66ad458b4aa3b81e5d0c685b55d41fcbf77a3881782e5a2757c944db79939239af92ca009c720dc382a67fcc
-
Filesize
456KB
MD538843698815444b78bb8a73cb2a55e1c
SHA1823d3bca57c0ef79b64b736e0b856b15eb8a1427
SHA256d08806d5eb85a075c3ca96312bc79db64be887550a4a66d9faa89317ad9beff3
SHA51286ec0f5bc0fed715b9e9298c6c75ac97fca05e9cee217f9452c50dc54eda35c7099fa2cd751a501036068d1455632d86d5e33b126767626bafd641e4b9d0b57f
-
Filesize
456KB
MD538843698815444b78bb8a73cb2a55e1c
SHA1823d3bca57c0ef79b64b736e0b856b15eb8a1427
SHA256d08806d5eb85a075c3ca96312bc79db64be887550a4a66d9faa89317ad9beff3
SHA51286ec0f5bc0fed715b9e9298c6c75ac97fca05e9cee217f9452c50dc54eda35c7099fa2cd751a501036068d1455632d86d5e33b126767626bafd641e4b9d0b57f
-
Filesize
286KB
MD53e05db88ff6f820c9a6a7811b075da1c
SHA1a2980850e7d2bdd5fbb631a9bf2879de698d5207
SHA25682e289e1b10b9cc46d397d545e374c7fffddc104065f417d5ba65438514c8c99
SHA512d840c75930db867e1f6cca838e1f5d8578b525f37b463621b4f074bb8c32cdc9c8689e438fb3ad8dbd4d51c71b2a359532d4514d956ee350995527125207ecfa
-
Filesize
286KB
MD53e05db88ff6f820c9a6a7811b075da1c
SHA1a2980850e7d2bdd5fbb631a9bf2879de698d5207
SHA25682e289e1b10b9cc46d397d545e374c7fffddc104065f417d5ba65438514c8c99
SHA512d840c75930db867e1f6cca838e1f5d8578b525f37b463621b4f074bb8c32cdc9c8689e438fb3ad8dbd4d51c71b2a359532d4514d956ee350995527125207ecfa
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
175KB
MD5ef8079cf160510d0da7162bc08f753d8
SHA1e786cc8bee83e4a37433ddccf9d3540e1f6533fe
SHA256a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6
SHA512959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3
-
Filesize
175KB
MD5ef8079cf160510d0da7162bc08f753d8
SHA1e786cc8bee83e4a37433ddccf9d3540e1f6533fe
SHA256a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6
SHA512959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba