Analysis
-
max time kernel
280s -
max time network
292s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2023 18:39
Static task
static1
Behavioral task
behavioral1
Sample
f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe
Resource
win10v2004-20230221-en
General
-
Target
f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe
-
Size
1.1MB
-
MD5
501ea9669676ed72ed19f9fa79738e0e
-
SHA1
5aea5bddb0fc0880a62d243e3d715b60fbe4e737
-
SHA256
f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc
-
SHA512
558d7d8d843379ad99c9691ad063fdfafd837ada2a0368ffa0c6a140eb6eebfec7441da51c4ebb9aa295a582c9b013fe831b2434c126590b0fe8cbdce6da3d8b
-
SSDEEP
24576:4yeivpfUpu0mqCS6JREqDYVVN4saG+F7G/F3Rn/vDAFZ:/ZpfUDvXy18VVTa7wLsF
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Extracted
redline
terra
185.161.248.75:4132
-
auth_value
60df3f535f8aa4e264f78041983592d2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o6558570.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation s3326468.exe -
Executes dropped EXE 10 IoCs
pid Process 840 z5870881.exe 4956 z6474909.exe 2648 o6558570.exe 4152 p3472451.exe 3768 r2996407.exe 4300 r2996407.exe 4824 s3326468.exe 2812 s3326468.exe 2128 legends.exe 4388 legends.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o6558570.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5870881.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5870881.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6474909.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6474909.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3768 set thread context of 4300 3768 r2996407.exe 100 PID 4824 set thread context of 2812 4824 s3326468.exe 105 PID 2128 set thread context of 4388 2128 legends.exe 111 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3312 4152 WerFault.exe 90 1248 4388 WerFault.exe 111 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2648 o6558570.exe 2648 o6558570.exe 4300 r2996407.exe 4300 r2996407.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2648 o6558570.exe Token: SeDebugPrivilege 3768 r2996407.exe Token: SeDebugPrivilege 4824 s3326468.exe Token: SeDebugPrivilege 2128 legends.exe Token: SeDebugPrivilege 4300 r2996407.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2812 s3326468.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4388 legends.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 324 wrote to memory of 840 324 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 83 PID 324 wrote to memory of 840 324 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 83 PID 324 wrote to memory of 840 324 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 83 PID 840 wrote to memory of 4956 840 z5870881.exe 84 PID 840 wrote to memory of 4956 840 z5870881.exe 84 PID 840 wrote to memory of 4956 840 z5870881.exe 84 PID 4956 wrote to memory of 2648 4956 z6474909.exe 85 PID 4956 wrote to memory of 2648 4956 z6474909.exe 85 PID 4956 wrote to memory of 2648 4956 z6474909.exe 85 PID 4956 wrote to memory of 4152 4956 z6474909.exe 90 PID 4956 wrote to memory of 4152 4956 z6474909.exe 90 PID 4956 wrote to memory of 4152 4956 z6474909.exe 90 PID 840 wrote to memory of 3768 840 z5870881.exe 97 PID 840 wrote to memory of 3768 840 z5870881.exe 97 PID 840 wrote to memory of 3768 840 z5870881.exe 97 PID 3768 wrote to memory of 4300 3768 r2996407.exe 100 PID 3768 wrote to memory of 4300 3768 r2996407.exe 100 PID 3768 wrote to memory of 4300 3768 r2996407.exe 100 PID 3768 wrote to memory of 4300 3768 r2996407.exe 100 PID 3768 wrote to memory of 4300 3768 r2996407.exe 100 PID 3768 wrote to memory of 4300 3768 r2996407.exe 100 PID 3768 wrote to memory of 4300 3768 r2996407.exe 100 PID 3768 wrote to memory of 4300 3768 r2996407.exe 100 PID 324 wrote to memory of 4824 324 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 104 PID 324 wrote to memory of 4824 324 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 104 PID 324 wrote to memory of 4824 324 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 104 PID 4824 wrote to memory of 2812 4824 s3326468.exe 105 PID 4824 wrote to memory of 2812 4824 s3326468.exe 105 PID 4824 wrote to memory of 2812 4824 s3326468.exe 105 PID 4824 wrote to memory of 2812 4824 s3326468.exe 105 PID 4824 wrote to memory of 2812 4824 s3326468.exe 105 PID 4824 wrote to memory of 2812 4824 s3326468.exe 105 PID 4824 wrote to memory of 2812 4824 s3326468.exe 105 PID 4824 wrote to memory of 2812 4824 s3326468.exe 105 PID 4824 wrote to memory of 2812 4824 s3326468.exe 105 PID 4824 wrote to memory of 2812 4824 s3326468.exe 105 PID 2812 wrote to memory of 2128 2812 s3326468.exe 110 PID 2812 wrote to memory of 2128 2812 s3326468.exe 110 PID 2812 wrote to memory of 2128 2812 s3326468.exe 110 PID 2128 wrote to memory of 4388 2128 legends.exe 111 PID 2128 wrote to memory of 4388 2128 legends.exe 111 PID 2128 wrote to memory of 4388 2128 legends.exe 111 PID 2128 wrote to memory of 4388 2128 legends.exe 111 PID 2128 wrote to memory of 4388 2128 legends.exe 111 PID 2128 wrote to memory of 4388 2128 legends.exe 111 PID 2128 wrote to memory of 4388 2128 legends.exe 111 PID 2128 wrote to memory of 4388 2128 legends.exe 111 PID 2128 wrote to memory of 4388 2128 legends.exe 111 PID 2128 wrote to memory of 4388 2128 legends.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe"C:\Users\Admin\AppData\Local\Temp\f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5870881.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5870881.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6474909.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6474909.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6558570.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6558570.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3472451.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3472451.exe4⤵
- Executes dropped EXE
PID:4152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 9285⤵
- Program crash
PID:3312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2996407.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2996407.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2996407.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2996407.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3326468.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3326468.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3326468.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3326468.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 126⤵
- Program crash
PID:1248
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4152 -ip 41521⤵PID:1552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4388 -ip 43881⤵PID:4948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
702KB
MD55378764133b66f45fb434bedee1a53a0
SHA106d76f15884bf5c4136c366780384188d91dfdb8
SHA2565beccf4fe809beed67380f839aecb43d87edd24e72c4ae2bd338de789e09f0f2
SHA5129aef7a372ef4ae511006d7d815d8a619904d3eb5fa26d8cd4e16d3a9ecdecc7bad2411aaca0d2902cae99ed8157a1eaacc9edc51858cd3378062977319c72a1f
-
Filesize
702KB
MD55378764133b66f45fb434bedee1a53a0
SHA106d76f15884bf5c4136c366780384188d91dfdb8
SHA2565beccf4fe809beed67380f839aecb43d87edd24e72c4ae2bd338de789e09f0f2
SHA5129aef7a372ef4ae511006d7d815d8a619904d3eb5fa26d8cd4e16d3a9ecdecc7bad2411aaca0d2902cae99ed8157a1eaacc9edc51858cd3378062977319c72a1f
-
Filesize
904KB
MD5b9971030c33d46559914db76f2c74237
SHA18f09954e4c8f74902950accdb78e8c0ed64f3cf6
SHA256e5f2629080f56f32c80daf4744486a16caa06d4f4cfea53647a21227930df523
SHA512bbdd009eaa6546f094fae74ac251534415097d5726971e9cdf8c954e5595aedfaf09a2b0674050e706e0e946cc72e2b044448ffb4bd4112b99adfa25b379ca0e
-
Filesize
904KB
MD5b9971030c33d46559914db76f2c74237
SHA18f09954e4c8f74902950accdb78e8c0ed64f3cf6
SHA256e5f2629080f56f32c80daf4744486a16caa06d4f4cfea53647a21227930df523
SHA512bbdd009eaa6546f094fae74ac251534415097d5726971e9cdf8c954e5595aedfaf09a2b0674050e706e0e946cc72e2b044448ffb4bd4112b99adfa25b379ca0e
-
Filesize
904KB
MD5b9971030c33d46559914db76f2c74237
SHA18f09954e4c8f74902950accdb78e8c0ed64f3cf6
SHA256e5f2629080f56f32c80daf4744486a16caa06d4f4cfea53647a21227930df523
SHA512bbdd009eaa6546f094fae74ac251534415097d5726971e9cdf8c954e5595aedfaf09a2b0674050e706e0e946cc72e2b044448ffb4bd4112b99adfa25b379ca0e
-
Filesize
306KB
MD58577097a3971b5468955bdbcc3eba0d3
SHA168073ce1091a8f35fb5246081031f97a02b27f38
SHA2564a4ba8405e6ceefbba9f5e865af0c3b2d7e39f8bba9c2a18364ab2635a9a2dff
SHA512f1f133eb66707c91153baff9c583e7969ffaf1e2330636e7c2151292296e84042ad17ac36b164fafdbcb330635af458d7308e6a6da7e99c1f76c1ad27df44685
-
Filesize
306KB
MD58577097a3971b5468955bdbcc3eba0d3
SHA168073ce1091a8f35fb5246081031f97a02b27f38
SHA2564a4ba8405e6ceefbba9f5e865af0c3b2d7e39f8bba9c2a18364ab2635a9a2dff
SHA512f1f133eb66707c91153baff9c583e7969ffaf1e2330636e7c2151292296e84042ad17ac36b164fafdbcb330635af458d7308e6a6da7e99c1f76c1ad27df44685
-
Filesize
185KB
MD5b536f7a6995726c9cebb3c3a079b54f7
SHA1c31b723d2116a517ebc47f6edbaedef0218f687d
SHA2560d7e9871bcdba06b4f921a260136fb7805950515d585f8443f798e0a711d0d89
SHA51270218a43f5120fa048ce42480c2a859642d7e86fefc1a8e9c15a3c75af0b3d1b57f9ad868f2e3e853ccb6bc40921b83c75339c9a5e5253295777bbced32bc660
-
Filesize
185KB
MD5b536f7a6995726c9cebb3c3a079b54f7
SHA1c31b723d2116a517ebc47f6edbaedef0218f687d
SHA2560d7e9871bcdba06b4f921a260136fb7805950515d585f8443f798e0a711d0d89
SHA51270218a43f5120fa048ce42480c2a859642d7e86fefc1a8e9c15a3c75af0b3d1b57f9ad868f2e3e853ccb6bc40921b83c75339c9a5e5253295777bbced32bc660
-
Filesize
145KB
MD59fd4e53d8a023e9d99440f16d5da3736
SHA19c94d682d6156c534cbfd694e68f610ac7e46271
SHA2566d2dc3b0b15a0081d37074b4e5f3ec45ee5e0c80b19331b513a290da23f0df08
SHA512d8ecc8b7a0911b9afe09366e3f64ea22da6e8a0b475f70a37c9d91c5d8017700f65a2482146f5e101562331c550d77bd247fe141ce634e3f3842fc1c8decbb0d
-
Filesize
145KB
MD59fd4e53d8a023e9d99440f16d5da3736
SHA19c94d682d6156c534cbfd694e68f610ac7e46271
SHA2566d2dc3b0b15a0081d37074b4e5f3ec45ee5e0c80b19331b513a290da23f0df08
SHA512d8ecc8b7a0911b9afe09366e3f64ea22da6e8a0b475f70a37c9d91c5d8017700f65a2482146f5e101562331c550d77bd247fe141ce634e3f3842fc1c8decbb0d