Analysis
-
max time kernel
73s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-06-2023 09:04
Static task
static1
Behavioral task
behavioral1
Sample
3f0e8a9d61be8b596b4be752965295ad.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3f0e8a9d61be8b596b4be752965295ad.exe
Resource
win10v2004-20230220-en
General
-
Target
3f0e8a9d61be8b596b4be752965295ad.exe
-
Size
1.1MB
-
MD5
3f0e8a9d61be8b596b4be752965295ad
-
SHA1
23399af014c60bcd53af9591a6bb80bc09772139
-
SHA256
69f24003a768ac6451b4bac285475486d27c39723f474e3b8a19c61ceb732838
-
SHA512
340137d0b76a523dc680847f656048f02545a306d5fac927fd53bfe41e07ab0fea893a821e45344e2ade31d078ec6cd1cff4a6398e09321037973df703fcd8e7
-
SSDEEP
6144:Tuo1XQlPoSlw4524UcL/LHh5Z8Z0AOkGZKWklMdGwuss4tjS0G+zLT1YS:TXX4flh524UOyKKWklMdGOtjasBY
Malware Config
Extracted
redline
1
95.216.249.153:81
-
auth_value
a290efd4796d37556cc5af7e83c91346
Extracted
systembc
5.42.95.122:4308
194.87.111.29:4308
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
LengthLong64.exeLengthLong32.exeLengthLong32x.exentlhost.exepid process 1364 LengthLong64.exe 1540 LengthLong32.exe 956 LengthLong32x.exe 472 ntlhost.exe -
Loads dropped DLL 14 IoCs
Processes:
RegSvcs.exeWerFault.exeWerFault.exeLengthLong32x.exepid process 2032 RegSvcs.exe 2032 RegSvcs.exe 2032 RegSvcs.exe 2032 RegSvcs.exe 1644 WerFault.exe 1644 WerFault.exe 1644 WerFault.exe 2032 RegSvcs.exe 2032 RegSvcs.exe 1064 WerFault.exe 1064 WerFault.exe 1064 WerFault.exe 956 LengthLong32x.exe 956 LengthLong32x.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
LengthLong32x.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" LengthLong32x.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
3f0e8a9d61be8b596b4be752965295ad.exeLengthLong32.exeLengthLong64.exedescription pid process target process PID 1324 set thread context of 2032 1324 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 1540 set thread context of 576 1540 LengthLong32.exe RegSvcs.exe PID 1364 set thread context of 2020 1364 LengthLong64.exe RegSvcs.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1280 1324 WerFault.exe 3f0e8a9d61be8b596b4be752965295ad.exe 1644 1540 WerFault.exe LengthLong32.exe 1064 1364 WerFault.exe LengthLong64.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 13 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RegSvcs.exepid process 2032 RegSvcs.exe 2032 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 2032 RegSvcs.exe -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
3f0e8a9d61be8b596b4be752965295ad.exeRegSvcs.exeLengthLong32.exeLengthLong64.exeLengthLong32x.exedescription pid process target process PID 1324 wrote to memory of 2032 1324 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 1324 wrote to memory of 2032 1324 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 1324 wrote to memory of 2032 1324 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 1324 wrote to memory of 2032 1324 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 1324 wrote to memory of 2032 1324 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 1324 wrote to memory of 2032 1324 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 1324 wrote to memory of 2032 1324 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 1324 wrote to memory of 2032 1324 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 1324 wrote to memory of 2032 1324 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 1324 wrote to memory of 1280 1324 3f0e8a9d61be8b596b4be752965295ad.exe WerFault.exe PID 1324 wrote to memory of 1280 1324 3f0e8a9d61be8b596b4be752965295ad.exe WerFault.exe PID 1324 wrote to memory of 1280 1324 3f0e8a9d61be8b596b4be752965295ad.exe WerFault.exe PID 1324 wrote to memory of 1280 1324 3f0e8a9d61be8b596b4be752965295ad.exe WerFault.exe PID 2032 wrote to memory of 1364 2032 RegSvcs.exe LengthLong64.exe PID 2032 wrote to memory of 1364 2032 RegSvcs.exe LengthLong64.exe PID 2032 wrote to memory of 1364 2032 RegSvcs.exe LengthLong64.exe PID 2032 wrote to memory of 1364 2032 RegSvcs.exe LengthLong64.exe PID 2032 wrote to memory of 1540 2032 RegSvcs.exe LengthLong32.exe PID 2032 wrote to memory of 1540 2032 RegSvcs.exe LengthLong32.exe PID 2032 wrote to memory of 1540 2032 RegSvcs.exe LengthLong32.exe PID 2032 wrote to memory of 1540 2032 RegSvcs.exe LengthLong32.exe PID 1540 wrote to memory of 576 1540 LengthLong32.exe RegSvcs.exe PID 1540 wrote to memory of 576 1540 LengthLong32.exe RegSvcs.exe PID 1540 wrote to memory of 576 1540 LengthLong32.exe RegSvcs.exe PID 1540 wrote to memory of 576 1540 LengthLong32.exe RegSvcs.exe PID 1540 wrote to memory of 576 1540 LengthLong32.exe RegSvcs.exe PID 1540 wrote to memory of 576 1540 LengthLong32.exe RegSvcs.exe PID 1540 wrote to memory of 576 1540 LengthLong32.exe RegSvcs.exe PID 1540 wrote to memory of 576 1540 LengthLong32.exe RegSvcs.exe PID 1540 wrote to memory of 576 1540 LengthLong32.exe RegSvcs.exe PID 1540 wrote to memory of 1644 1540 LengthLong32.exe WerFault.exe PID 1540 wrote to memory of 1644 1540 LengthLong32.exe WerFault.exe PID 1540 wrote to memory of 1644 1540 LengthLong32.exe WerFault.exe PID 1540 wrote to memory of 1644 1540 LengthLong32.exe WerFault.exe PID 2032 wrote to memory of 956 2032 RegSvcs.exe LengthLong32x.exe PID 2032 wrote to memory of 956 2032 RegSvcs.exe LengthLong32x.exe PID 2032 wrote to memory of 956 2032 RegSvcs.exe LengthLong32x.exe PID 2032 wrote to memory of 956 2032 RegSvcs.exe LengthLong32x.exe PID 1364 wrote to memory of 2020 1364 LengthLong64.exe RegSvcs.exe PID 1364 wrote to memory of 2020 1364 LengthLong64.exe RegSvcs.exe PID 1364 wrote to memory of 2020 1364 LengthLong64.exe RegSvcs.exe PID 1364 wrote to memory of 2020 1364 LengthLong64.exe RegSvcs.exe PID 1364 wrote to memory of 2020 1364 LengthLong64.exe RegSvcs.exe PID 1364 wrote to memory of 2020 1364 LengthLong64.exe RegSvcs.exe PID 1364 wrote to memory of 2020 1364 LengthLong64.exe RegSvcs.exe PID 1364 wrote to memory of 2020 1364 LengthLong64.exe RegSvcs.exe PID 1364 wrote to memory of 2020 1364 LengthLong64.exe RegSvcs.exe PID 1364 wrote to memory of 1064 1364 LengthLong64.exe WerFault.exe PID 1364 wrote to memory of 1064 1364 LengthLong64.exe WerFault.exe PID 1364 wrote to memory of 1064 1364 LengthLong64.exe WerFault.exe PID 1364 wrote to memory of 1064 1364 LengthLong64.exe WerFault.exe PID 956 wrote to memory of 472 956 LengthLong32x.exe ntlhost.exe PID 956 wrote to memory of 472 956 LengthLong32x.exe ntlhost.exe PID 956 wrote to memory of 472 956 LengthLong32x.exe ntlhost.exe PID 956 wrote to memory of 472 956 LengthLong32x.exe ntlhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f0e8a9d61be8b596b4be752965295ad.exe"C:\Users\Admin\AppData\Local\Temp\3f0e8a9d61be8b596b4be752965295ad.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\LengthLong64.exe"C:\Users\Admin\AppData\Local\Temp\LengthLong64.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 484⤵
- Loads dropped DLL
- Program crash
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\LengthLong32.exe"C:\Users\Admin\AppData\Local\Temp\LengthLong32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 484⤵
- Loads dropped DLL
- Program crash
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\LengthLong32x.exe"C:\Users\Admin\AppData\Local\Temp\LengthLong32x.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
PID:472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1324 -s 482⤵
- Program crash
PID:1280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cd0a6d2d66f62398a0d87413258bca6
SHA1f545dc52e21e6ee463dd9a3e3c80eaf9bed7e07e
SHA256972e7df97b036be5e35bd00aae5fd233fe9a04a9a23285d24f9d568b8b1f7b90
SHA5128bde5a71eacd45f846968bbc7c6f5dc4a1bc424b075adc678100220ee91e4c1faadc20799bcff162c938af88ebd819dfa8b28256d59fff46661e4a65096fd35c
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
266.8MB
MD5f004d310fbbba32770a623e0bb6051bc
SHA1cce571f3cca417a35390341365b5a4236287a679
SHA2567a869edccff3beb6400704a22f5d5e38450c932cee2b51a68a02234678e818e5
SHA512352fa231b2e7a705d1b1803f5bd61a554a783c34014f58065cda614f27edb5dea7c045187e2bd9d9dd6cbd59f8be033a6c123072367cb4369c606a238a21657d
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
266.5MB
MD5ab3ff007b4259a71c7cc69b816893f48
SHA12cf9027dd31830410bea7bf0169e8270ccae980b
SHA25689d3873be47cde771f868a17266d0611fe98f99c90dd09f8d09bb844a82857d9
SHA5125e224e7eebfa067d01aea3f15467c7e84554ec04ae658b01e34e37825f75d3c8b96d3fd1776aa82651a0f871c1265ed7d597319a9c27e3d17f1ce367c251c8e6
-
Filesize
357.4MB
MD52a3ade320da98023da0726833e96c76e
SHA1fe51b4ffea3441968bf639ce54a340291f47d834
SHA25618526258a8f9879e6252f8e8790f106b86bdfd04f1a01418c28728037d73385d
SHA512361c279cc712400a658644e7a7f35b050f9ec55d047b9f066bbf13617a1da90955b009b0c31e4f22f3a92c2cc4f3e7103315f0d4b054226b7a10ce8c3226cf82