Analysis
-
max time kernel
52s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 16:22
Behavioral task
behavioral1
Sample
b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe
Resource
win7-20230220-en
General
-
Target
b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe
-
Size
1.5MB
-
MD5
9ec7eeab9d88c1dca684b1c619c78861
-
SHA1
921c158f3b40f25a58e78b6154d8c9a482563d88
-
SHA256
b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40
-
SHA512
4817dc4406adcc0a47aeaad62120862f62c58425e0790fed01e41dbe2f3be51febdce958355184b7984274befff884eeab26a5113363c5ae5037e4d03e580e04
-
SSDEEP
24576:pqvk70TrcnXpatsCu7IfLKZnikPhhUF54clNf7+6uHAW92zt/sWu2BSMCqDoRf:wkQTA5Qw7CSikJo54clgLH+tkWJ0NR
Malware Config
Signatures
-
Detects Echelon Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/852-133-0x0000000000CA0000-0x0000000000E24000-memory.dmp family_echelon -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org 7 api.ipify.org 19 ip-api.com -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exepid Process 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exedescription pid Process Token: SeDebugPrivilege 852 b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe"C:\Users\Admin\AppData\Local\Temp\b4de3be826cc5cbfcb56f0fb2afc683691a46083a6f3b15cc79ddc716633fb40.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5721d9e468a6d6d0276d8d0e060e4e57b
SHA162c635bf0c173012301f195a7d0e430270715613
SHA2560be20bbaa9d80dfefd3038e5c7904d4b426719607c563254ec42500d704021f0
SHA5120af08f0f5ecda8cdaaaba317f16e835032797e4e6e64f3f4e5b0bb8fd20f1afd9e8e2ca50b549e1c1a48a26ff02f59bc8212deb354b095294c97016a3c9dbb12
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
71KB
MD592d24961d2ebaacf1ace5463dfc9930d
SHA199ffaf6904ab616c33a37ce01d383e4a493df335
SHA2569013688dec264c615178e151c2eb5f0b2eb9fe8cfad867b311d8581d921c73f3
SHA51277598c77f219ab5234b8b84bcfe873f40e7464b224fac3c8568b300d3f2563f7ef5ad9ec5cccc0d719e7d3e489a164b04b6b36316196afea0b8051de3c751cc7
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
288KB
MD56228d6a4e4d016a504a924ee89502917
SHA183b5f8d9bad1fe5658903f1b92c3c160b672a042
SHA256d0c90a1132b67765834b7a73866d4218fd9f2c6eef390b7a5b9b7239c127f07e
SHA51215e7b47459b709af28714cd482c1264190173df3e9fa4b69ca94b4979c70b8be3375f85f8e166938c9b196fe173522041697b63d7c3e2fc872dba23bfb1869c1
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Browsers\Passwords\Passwords_Edge.txt
Filesize426B
MD542fa959509b3ed7c94c0cf3728b03f6d
SHA1661292176640beb0b38dc9e7a462518eb592d27d
SHA256870ef3d2370932a8938faa60abd47d75ea0af98bfa11c82ae8efe9e94fd8be00
SHA5127def291737d081c93d0cc38ac8d3062fd34d93b68d191eb0d54e9857e0c0afdbcd241471a2e10c28ce8db3b1d1ae0dba2ef6f609cfe8a1e8fe1dd103dba80007
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Browsers\Passwords\Passwords_Edge.txt
Filesize852B
MD5f6112b3498179e945ef8ca979e810858
SHA178411bf22b09f0243f0c4405970b292e8f391f41
SHA25672b2b8ebdc6ebf268b47939e38ff5c6439d458b1149af61b69103de2a0f3feb0
SHA5121ab7bd43b6a62c79336d907e2ec6337f61b20bfdd4b184ff4d3838a84097353c8d7bf21a3e9751b1a7e1af0fae704c39aed1c683bbc1b9151351e246e91ac604
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Browsers\Passwords\Passwords_Edge.txt
Filesize1KB
MD56ca856c7d40e1edc69008e9f4f7a7ba2
SHA162b795c02b6b02e313c15e1c369991f08814a95c
SHA256a8cdd831224a169d08a48633ace3675d98a243ccff849a85ebd1e95a76d04242
SHA5126423bb1e45a8277b2c3ee1cb21324a8abca3735efcf8e45d1aa27e597230e37f01999a3229eb98ff2d42e68de17bf1f093546f5d7e89f246fecdb4b04e9d1db7
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Browsers\Passwords\Passwords_Edge.txt
Filesize1KB
MD5e21da2b922a86aa441a087588d8ba063
SHA1eae0e83300e2fd672a5b75989f9934658aafc42e
SHA25680a07a4e8531475b3819d1a9611b8bdb0205702bb6c7f96729cbc4b9ee496758
SHA512e3131a211c6e5ec2ccafb0378fabeed48156b5e8df2d6ecb0b7dbfa47a7ca35244114ff788e72b8e6950be9bd3ed1fdcc4863b18af8d3103449e07abdd039343
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Browsers\Passwords\Passwords_Edge.txt
Filesize2KB
MD588fe72ee318201e46a1fc7f58fc5a0f7
SHA1799df8bb300d508996d900212edad6170a9bd2bf
SHA256d62a3f605afb8ed80e349f488425d6fb576b9acbf0c8afac0cc341bbc7096912
SHA5121ae6ca9d5e0295124618832910a062ddc85d3565dda03b1886bd0dcc483c861b21de7605713ed27813c15b9ffa4e0757c46d77a15c21a81cf41099e820294a9d
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Browsers\Passwords\Passwords_Edge.txt
Filesize2KB
MD5656726952302f87aa14938d0db9ee454
SHA1a7218b06ef1170e77be390b33877b38519f19e28
SHA25651664925b2e581d6a27d81a84273aaa8a1dbb6572956a5455bc73e1868ba6e8b
SHA512101e39b11d24bbca94f815458c9c2296b724a9104cea9070c143216a69514b51aecb98d97be8899d4e0c925d7749557d9cfe61e35250dd8004a8154b538fd5c7
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Browsers\Passwords\Passwords_Edge.txt
Filesize2KB
MD581b99703a3960d307cd3ab62339c6d2e
SHA178a2f3bc7bb88f881a2511cc2de8221c48f81a23
SHA2562ca6e84f6978690a4fbe9f8afb9c8906362e17dfec9da01861ed44ac3df4832d
SHA51233182c99d24f276968c8c85686593b71efdfca475e630864f5399895d83aa1d320b0de7866c1cce2231d02b80cce641e71763d28535ed05e90b9b0ad70eb478d
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Browsers\Passwords\Passwords_Edge.txt
Filesize3KB
MD5e181e9fc3087583b84164406113f6321
SHA17244c18a52b2c74fa39b7104e779f304b9ae4c12
SHA2566661f2827c61623c6e7ab76fc8c79eb9dc4289e564b781d1f573fbf6f1a2f880
SHA5120686425870c1faec44ab2becaff21a17aaf9ff89bf7d6ad7e41cc2ff0cf3e9f9c17028c614b4982a61e5adccb9cbed99a8edb57f85d962bcaa62858eb55c8249
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Browsers\Passwords\Passwords_Edge.txt
Filesize3KB
MD578dd6580ce6665dd6d6c2f0c244463f8
SHA167cac6c403c3f17e1c0722fb0c2eb250fd8241d8
SHA256ce4f8a9c0b97185ba35cffcf896ffb5076a0b82a13d250b25c452104583a277f
SHA51231e53c2f36069f2491f2fa435e147abfa64467f495e99f5818f000a9c73c99600fba4cab10fc1e9a7ea1b866ab519a26d8444325c0db738952d5e42a929c4b39
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Browsers\Passwords\Passwords_Edge.txt
Filesize4KB
MD5266b750ff315185a8866f8a186995b76
SHA1df45b2f0e9a4647cc74b90e7a13bc613c49fa93a
SHA256cc40de1552dab9ec217ede32da2c13a8afcf4ad8e440143a0028099035586dd2
SHA5123a7e7e9d664c02b65998cfb489a24d403e20593ce5f84484dec2e56d76a759ba8403e1671f0a6460388c268387978916cc4dfb3a5a2e47d2b0a6ed17a7014645
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Computer.txt
Filesize302B
MD5fd37fdc8b3a0611e06cb3f215f7fd5de
SHA1fe68c1c7a0e0e29f45dd092193883b8ec7e9a331
SHA256c56ba332404fc62f02de91496c68dfb7b8492b907d80a28073c6d1359845fdbd
SHA51232059b2fa70a3b3152be53cd410f10639c0dd679d341e543ae93de86a5255cf3cf10d699c90908e5d3708282b60c062a9c2a43c4c6c1483b3eb170bb2f7673da
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Grabber\CloseWrite.doc
Filesize1.6MB
MD5d5483da5efb1367fc22b24d919f44fcf
SHA1c78470c196273021bb0e9c2731e58daf8cc269e4
SHA2569a607e382b8bc081f1d1b2e674cdd958017415da34a17dc25cd5cdf4083f9898
SHA51238c3a182f42eaeb21067a404c6af3bd82a4d1840f6d7b0028c26430364e37609caf27bec3f30b9aaa4213286eec8728ec2cf86c9a4fe9d0a6b3337b18884ef0e
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Grabber\CompareSync.png
Filesize676KB
MD58502b1b17978841102e8f8022201fd31
SHA14f99f20bcdaa17b2ab17fb631002c92071a9d4ab
SHA256a6b62186475b97c348737c3651abecf88b48640433b396c1dcd0bd212b84e621
SHA512be16c6d2ea52040b0d1e8ec708d751ec40f14b90de55563be822f7e45aa24d6b54ef4b34445927d7267e3ae1b16e43c6e629a0e9ae73d98f610ce45ac2ead917
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Grabber\NewAssert.doc
Filesize1.0MB
MD5933fbbdaeed5920e9a02ed7ce6e4fbbd
SHA16716424bce37dcfe99288af51398f9d0d42b2127
SHA2563d8ea67558be51b7ec2962066e539eba24ec6f4770cab800cb42271d75d8e302
SHA5126a352f1d9b5420b666e2394ad8bcadc9176bd9624b03e34f2dce0f25c743c79e5f05072f8b13252b5c5ecf2ac691c3521052fdc3abeee7ca4416d921fde96219
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Processes.txt
Filesize841B
MD53822c20a723c719c0660c24e037e09ef
SHA1713f97bb274ff992a220c23b5004e259cbbb5bac
SHA256183e28276b905ddb6823fecbf9ea2f3385fcc27681afc8c5c6976ec8bd9fd11e
SHA512004eb6889e3ad8d4c6d04522aed102aaf462130492f197ad4f635a7c9a3ed242702091f32954f49d9f00f568afacb85e91db0a5af887a235c567debccb9d7b18
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Processes.txt
Filesize898B
MD54cdc1bef6828b7923ff933f7b615c736
SHA1f6f0df1c16bdbec7d3fa00aac02134d0dfdb7308
SHA2565dd1d2cd0cb909ed6b20a5c24342156dc8e7cc2f4511d027323361d0bf102b61
SHA51233a79cdd959e7ec7fe47db689b711d92ce1bf68f9f13e89b57ecfadcf2ac3d3a33d3a31c44bd46d6548be76a70554b458c3779d98c0f8796877eb02cc128191c
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Processes.txt
Filesize873B
MD52904e219debfce2252b4c5e84ce51132
SHA1ccc4677c1e527a9bcb46abde7d4d53306fde2772
SHA256a22a06bcc4a55270610036648e39bc8bda9c89bcdfc1eea41c937b4d3817641c
SHA512774da6e6153e787f51635eff0f75766070551de801cf35070bc5e17b2c0869ce8252a293df993b8d91ce990d840f15525815d5676e49baf1ed005f0cc6266ffc
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Processes.txt
Filesize867B
MD52b447f21e68366e3cf891018457d747c
SHA1f8963712889f65b8defb265c269de4e0e0b83d32
SHA2563b1a5498945711e86031635a7c6aa6a91f73acf6c90bc34fe21ee17fbdd43fdb
SHA5126712fa3879a5db688e794a71bb4b5cb94cbb6c49d13e8f0270867db9b3a563b551d6052f40c71a990a87c0105b4a5cfb635f34e374277585541870ff619e71bb
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Screenshot.Jpeg
Filesize84KB
MD544cd7fee1b6480a71a68bac42e2d4e3d
SHA1d42350a35b237d5ce7a854e1ee93c74a6d9f70c7
SHA2567bfd54ce4a1ad6a6c04d4d66bf6d27c15843a7051d7e26895beefe7be17bf9f2
SHA51202c2aa5847c961112ae9bd96131de50627caa5dabf308a5867945731cc095a5e6279a0c34dba822faf2fbedb05d607e3f81ec7be10a6dcb1940e7ba2ab7cf2b0
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Screenshot.Jpeg
Filesize85KB
MD5e9771a7a400305679daf073fbbb903b9
SHA1bdfac3a39111f771d04d36c113f3645a488894ca
SHA25674c0d030b08e10b4c3bb6892e15dbcebdaa72426f44b86788db9c26e6d5e4857
SHA5127cdfd651371a9c6987a95bd58c16dc211f66fb7914f9c45cc714d2e6dace99e7c2d146f798ae5a3580ef85905e410b0a7f709bafd8a4c6fe2445712ba7168eff
-
C:\Users\Admin\AppData\Roaming\wNyRFNDyPDwZ078BFBFF000306D2924C16C752\52078BFBFF000306D2924C16C7wNyRFNDyPDwZ\Screenshot.Jpeg
Filesize83KB
MD5ba737dbb0140eaac1fd9994b7639d72f
SHA1eccb961e33c4847b00b877125f82947bb73433d0
SHA2568ee2c85d7f794c172e470863d93235e11083e96704e34158ccd6000c7b98fb57
SHA5125b4133c0d89946e37cbe7b4acefb9d2553e2881673d927d633d18512e3c508bd929e875b63e4d933165e0cfaa91f3a1ffda720e13a10f0dee440103b569eb638