Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2023, 23:19
Static task
static1
General
-
Target
0ef6ee1747c249350eabdae6baff60cfe5227e1437a8e3bcbe197b4e6a002792.exe
-
Size
577KB
-
MD5
6776d282c04c1e1bcba629feb7ff7f8a
-
SHA1
942028864930c5cae202b73745bf9eff1ef483c1
-
SHA256
0ef6ee1747c249350eabdae6baff60cfe5227e1437a8e3bcbe197b4e6a002792
-
SHA512
642238fbcde0ef9f7aa610028b384b25f15c0bc5e2c30669279e9811df8c82a1c8a4455b7593e868da06015479d14ee0cfb4ca28dd8f67231688c73c8e02b076
-
SSDEEP
12288:KMr2y90AlnI1EfjjGeKYsa5kK+zG3+a7gr5V6FmDYF8DLvlIkE4lMxW7+:4ydnI1Ef3GXwCV851PFRkZlTy
Malware Config
Extracted
redline
dana
83.97.73.130:19061
-
auth_value
da2d1691db653e49676d799e1eae2673
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
joker
83.97.73.130:19061
-
auth_value
a98d303cc28bb3b32a23c59214ae3bc0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g2787227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g2787227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g2787227.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g2787227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g2787227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g2787227.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation h2734816.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 9 IoCs
pid Process 4644 x6972730.exe 1116 x6959062.exe 2372 f1985419.exe 276 g2787227.exe 4600 h2734816.exe 3628 rugen.exe 556 i1506995.exe 4212 rugen.exe 1700 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 1432 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g2787227.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0ef6ee1747c249350eabdae6baff60cfe5227e1437a8e3bcbe197b4e6a002792.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0ef6ee1747c249350eabdae6baff60cfe5227e1437a8e3bcbe197b4e6a002792.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6972730.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6972730.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6959062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6959062.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2372 f1985419.exe 2372 f1985419.exe 276 g2787227.exe 276 g2787227.exe 556 i1506995.exe 556 i1506995.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2372 f1985419.exe Token: SeDebugPrivilege 276 g2787227.exe Token: SeDebugPrivilege 556 i1506995.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4600 h2734816.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4984 wrote to memory of 4644 4984 0ef6ee1747c249350eabdae6baff60cfe5227e1437a8e3bcbe197b4e6a002792.exe 83 PID 4984 wrote to memory of 4644 4984 0ef6ee1747c249350eabdae6baff60cfe5227e1437a8e3bcbe197b4e6a002792.exe 83 PID 4984 wrote to memory of 4644 4984 0ef6ee1747c249350eabdae6baff60cfe5227e1437a8e3bcbe197b4e6a002792.exe 83 PID 4644 wrote to memory of 1116 4644 x6972730.exe 84 PID 4644 wrote to memory of 1116 4644 x6972730.exe 84 PID 4644 wrote to memory of 1116 4644 x6972730.exe 84 PID 1116 wrote to memory of 2372 1116 x6959062.exe 85 PID 1116 wrote to memory of 2372 1116 x6959062.exe 85 PID 1116 wrote to memory of 2372 1116 x6959062.exe 85 PID 1116 wrote to memory of 276 1116 x6959062.exe 86 PID 1116 wrote to memory of 276 1116 x6959062.exe 86 PID 4644 wrote to memory of 4600 4644 x6972730.exe 93 PID 4644 wrote to memory of 4600 4644 x6972730.exe 93 PID 4644 wrote to memory of 4600 4644 x6972730.exe 93 PID 4600 wrote to memory of 3628 4600 h2734816.exe 95 PID 4600 wrote to memory of 3628 4600 h2734816.exe 95 PID 4600 wrote to memory of 3628 4600 h2734816.exe 95 PID 4984 wrote to memory of 556 4984 0ef6ee1747c249350eabdae6baff60cfe5227e1437a8e3bcbe197b4e6a002792.exe 96 PID 4984 wrote to memory of 556 4984 0ef6ee1747c249350eabdae6baff60cfe5227e1437a8e3bcbe197b4e6a002792.exe 96 PID 4984 wrote to memory of 556 4984 0ef6ee1747c249350eabdae6baff60cfe5227e1437a8e3bcbe197b4e6a002792.exe 96 PID 3628 wrote to memory of 3824 3628 rugen.exe 98 PID 3628 wrote to memory of 3824 3628 rugen.exe 98 PID 3628 wrote to memory of 3824 3628 rugen.exe 98 PID 3628 wrote to memory of 3216 3628 rugen.exe 100 PID 3628 wrote to memory of 3216 3628 rugen.exe 100 PID 3628 wrote to memory of 3216 3628 rugen.exe 100 PID 3216 wrote to memory of 3944 3216 cmd.exe 102 PID 3216 wrote to memory of 3944 3216 cmd.exe 102 PID 3216 wrote to memory of 3944 3216 cmd.exe 102 PID 3216 wrote to memory of 4544 3216 cmd.exe 103 PID 3216 wrote to memory of 4544 3216 cmd.exe 103 PID 3216 wrote to memory of 4544 3216 cmd.exe 103 PID 3216 wrote to memory of 4628 3216 cmd.exe 104 PID 3216 wrote to memory of 4628 3216 cmd.exe 104 PID 3216 wrote to memory of 4628 3216 cmd.exe 104 PID 3216 wrote to memory of 4104 3216 cmd.exe 105 PID 3216 wrote to memory of 4104 3216 cmd.exe 105 PID 3216 wrote to memory of 4104 3216 cmd.exe 105 PID 3216 wrote to memory of 4828 3216 cmd.exe 106 PID 3216 wrote to memory of 4828 3216 cmd.exe 106 PID 3216 wrote to memory of 4828 3216 cmd.exe 106 PID 3216 wrote to memory of 1844 3216 cmd.exe 107 PID 3216 wrote to memory of 1844 3216 cmd.exe 107 PID 3216 wrote to memory of 1844 3216 cmd.exe 107 PID 3628 wrote to memory of 1432 3628 rugen.exe 111 PID 3628 wrote to memory of 1432 3628 rugen.exe 111 PID 3628 wrote to memory of 1432 3628 rugen.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ef6ee1747c249350eabdae6baff60cfe5227e1437a8e3bcbe197b4e6a002792.exe"C:\Users\Admin\AppData\Local\Temp\0ef6ee1747c249350eabdae6baff60cfe5227e1437a8e3bcbe197b4e6a002792.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6972730.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6972730.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6959062.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6959062.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1985419.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1985419.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2787227.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2787227.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:276
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2734816.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2734816.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:3824
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3944
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:4544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:4628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4104
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:4828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:1844
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1432
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i1506995.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i1506995.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4212
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:1700
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5a8b789d3d403c77752d5d8312aea041c
SHA10fd03218b7c95af04adceb538b7c652f24b87904
SHA256580cc033ad51849481dc03167f7e066cac803f4d0470ccaa4001136f6bc21a6a
SHA5122c9b7c7691ada5ca541e31abc1c85c7545eb495ed1e2d64638057907c17fbd0f3e26cf977c846d3b181491105134c859636b033dbbfe06b6b2b7b43ab42f6a43
-
Filesize
205KB
MD5a8b789d3d403c77752d5d8312aea041c
SHA10fd03218b7c95af04adceb538b7c652f24b87904
SHA256580cc033ad51849481dc03167f7e066cac803f4d0470ccaa4001136f6bc21a6a
SHA5122c9b7c7691ada5ca541e31abc1c85c7545eb495ed1e2d64638057907c17fbd0f3e26cf977c846d3b181491105134c859636b033dbbfe06b6b2b7b43ab42f6a43
-
Filesize
205KB
MD5a8b789d3d403c77752d5d8312aea041c
SHA10fd03218b7c95af04adceb538b7c652f24b87904
SHA256580cc033ad51849481dc03167f7e066cac803f4d0470ccaa4001136f6bc21a6a
SHA5122c9b7c7691ada5ca541e31abc1c85c7545eb495ed1e2d64638057907c17fbd0f3e26cf977c846d3b181491105134c859636b033dbbfe06b6b2b7b43ab42f6a43
-
Filesize
205KB
MD5a8b789d3d403c77752d5d8312aea041c
SHA10fd03218b7c95af04adceb538b7c652f24b87904
SHA256580cc033ad51849481dc03167f7e066cac803f4d0470ccaa4001136f6bc21a6a
SHA5122c9b7c7691ada5ca541e31abc1c85c7545eb495ed1e2d64638057907c17fbd0f3e26cf977c846d3b181491105134c859636b033dbbfe06b6b2b7b43ab42f6a43
-
Filesize
205KB
MD5a8b789d3d403c77752d5d8312aea041c
SHA10fd03218b7c95af04adceb538b7c652f24b87904
SHA256580cc033ad51849481dc03167f7e066cac803f4d0470ccaa4001136f6bc21a6a
SHA5122c9b7c7691ada5ca541e31abc1c85c7545eb495ed1e2d64638057907c17fbd0f3e26cf977c846d3b181491105134c859636b033dbbfe06b6b2b7b43ab42f6a43
-
Filesize
255KB
MD585bfe857935766d4d757602f7d7decf3
SHA1641b2c38abf72a000ad5026582523db9b9fd6a42
SHA25620b583165eaa51e6ae553a0c7b54b8cd73f86748d86a48cbf185b8b4a19b6b1e
SHA512bba21a70810b8b8eeaf95b65a1cde9f1c4a1a6bfc7d4d86bcd9d405f42c0a67a351b2ad7df589b760a985fcf094aafed81427245a8145da44d0cc599fec5b0ff
-
Filesize
255KB
MD585bfe857935766d4d757602f7d7decf3
SHA1641b2c38abf72a000ad5026582523db9b9fd6a42
SHA25620b583165eaa51e6ae553a0c7b54b8cd73f86748d86a48cbf185b8b4a19b6b1e
SHA512bba21a70810b8b8eeaf95b65a1cde9f1c4a1a6bfc7d4d86bcd9d405f42c0a67a351b2ad7df589b760a985fcf094aafed81427245a8145da44d0cc599fec5b0ff
-
Filesize
377KB
MD53526e9decba1420e93f48f57cae0f09a
SHA1c339c354af300346727764039165aed970871092
SHA25618cbb5289163a54788d71745d981d90088a2064679057fa9803ec5e941b54350
SHA512875b0941d68ae959c7a45d388dfdb1e068505675f69d407dd5385e8c8f6dc6c2425a9fbfef7df56f3a911f85031d1fb09f76a26d60a0d178756ee4ce0e8f95f8
-
Filesize
377KB
MD53526e9decba1420e93f48f57cae0f09a
SHA1c339c354af300346727764039165aed970871092
SHA25618cbb5289163a54788d71745d981d90088a2064679057fa9803ec5e941b54350
SHA512875b0941d68ae959c7a45d388dfdb1e068505675f69d407dd5385e8c8f6dc6c2425a9fbfef7df56f3a911f85031d1fb09f76a26d60a0d178756ee4ce0e8f95f8
-
Filesize
205KB
MD5a8b789d3d403c77752d5d8312aea041c
SHA10fd03218b7c95af04adceb538b7c652f24b87904
SHA256580cc033ad51849481dc03167f7e066cac803f4d0470ccaa4001136f6bc21a6a
SHA5122c9b7c7691ada5ca541e31abc1c85c7545eb495ed1e2d64638057907c17fbd0f3e26cf977c846d3b181491105134c859636b033dbbfe06b6b2b7b43ab42f6a43
-
Filesize
205KB
MD5a8b789d3d403c77752d5d8312aea041c
SHA10fd03218b7c95af04adceb538b7c652f24b87904
SHA256580cc033ad51849481dc03167f7e066cac803f4d0470ccaa4001136f6bc21a6a
SHA5122c9b7c7691ada5ca541e31abc1c85c7545eb495ed1e2d64638057907c17fbd0f3e26cf977c846d3b181491105134c859636b033dbbfe06b6b2b7b43ab42f6a43
-
Filesize
206KB
MD533bc363b215e18e15e261eed548395ee
SHA109ed15f198a2365b02b2087457a16dd7d97aa892
SHA256b54339378c762d8981affdcb54ce40a76921ae93f9820b7392b91adcc42cba75
SHA512df689cef15e0b8bbef3135fc1e8b5c4464d304187a2d1c5f65da28f94df22bf60310b7a01eb7cfc6d2aeda0d596293db127d9d3228c07fa995860908d948d89d
-
Filesize
206KB
MD533bc363b215e18e15e261eed548395ee
SHA109ed15f198a2365b02b2087457a16dd7d97aa892
SHA256b54339378c762d8981affdcb54ce40a76921ae93f9820b7392b91adcc42cba75
SHA512df689cef15e0b8bbef3135fc1e8b5c4464d304187a2d1c5f65da28f94df22bf60310b7a01eb7cfc6d2aeda0d596293db127d9d3228c07fa995860908d948d89d
-
Filesize
172KB
MD53bb7eba88de32bf078c1f901abf6fad6
SHA12d92079f8e9fa8a4c71e52b90e771f3baf7d7422
SHA2563be236ace192afb4728925f403fb60ef454d2a29eae5b99497f01ae03f573718
SHA51285f1f7939292f0d14d4ac6ecf4b6bf816258fb19a4130ae3fc3ae622cc4bdbb2f49f4346ee7bc116eaf95042a1a5ceb508d29e290ad9b35ead2a4857a9d7ae6e
-
Filesize
172KB
MD53bb7eba88de32bf078c1f901abf6fad6
SHA12d92079f8e9fa8a4c71e52b90e771f3baf7d7422
SHA2563be236ace192afb4728925f403fb60ef454d2a29eae5b99497f01ae03f573718
SHA51285f1f7939292f0d14d4ac6ecf4b6bf816258fb19a4130ae3fc3ae622cc4bdbb2f49f4346ee7bc116eaf95042a1a5ceb508d29e290ad9b35ead2a4857a9d7ae6e
-
Filesize
11KB
MD58f0298c0f41cbb02226b3017a5641de8
SHA12d4a8f863a75261ec5938810e2f995161899f36d
SHA2564c7ab1e56c69d9570974914a7c908019158c0c0ce2d8ef19a8727f28b7d37acf
SHA51287794bfc71e3dc4282fa353e1a7f8dec0faece2fe325e924b24473ed83130e246e2558b672a8b3c3916995e461485c915258c801f8fb3cf05a1775d2065118bd
-
Filesize
11KB
MD58f0298c0f41cbb02226b3017a5641de8
SHA12d4a8f863a75261ec5938810e2f995161899f36d
SHA2564c7ab1e56c69d9570974914a7c908019158c0c0ce2d8ef19a8727f28b7d37acf
SHA51287794bfc71e3dc4282fa353e1a7f8dec0faece2fe325e924b24473ed83130e246e2558b672a8b3c3916995e461485c915258c801f8fb3cf05a1775d2065118bd
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5