Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2023, 02:41
Static task
static1
General
-
Target
41bc8e8a4013beb216c7e410f6151f929479b98f916878b59fb7ad707fb768eb.exe
-
Size
577KB
-
MD5
b097394fef28c1b44c1ebe9b10585f60
-
SHA1
0e9748d3dff6b97b0703d8e2bca1ebad32f6a8cc
-
SHA256
41bc8e8a4013beb216c7e410f6151f929479b98f916878b59fb7ad707fb768eb
-
SHA512
ce04d6527c5d9b7f63b685e437ce0b4d10b27a1ea69aa19a3dbf7dfd47d1c26a3d7a22e6131ed2b31893937817dfbcdc0ac2c4d613511ad2f6104c46d225faec
-
SSDEEP
12288:bMrey90NLjSDIB0sAmndK3fsjjGokae1bmBCxSc820rv9F:dywLj+IpA4d8UUaiKCxSc8vL
Malware Config
Extracted
redline
dana
83.97.73.130:19061
-
auth_value
da2d1691db653e49676d799e1eae2673
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
joker
83.97.73.130:19061
-
auth_value
a98d303cc28bb3b32a23c59214ae3bc0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g9320591.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g9320591.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g9320591.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g9320591.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g9320591.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g9320591.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation h7716292.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 9 IoCs
pid Process 4348 x9839027.exe 4820 x3760291.exe 872 f5988657.exe 4332 g9320591.exe 640 h7716292.exe 3996 rugen.exe 1796 i4662367.exe 1824 rugen.exe 3816 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 1424 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g9320591.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 41bc8e8a4013beb216c7e410f6151f929479b98f916878b59fb7ad707fb768eb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9839027.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9839027.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3760291.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3760291.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 41bc8e8a4013beb216c7e410f6151f929479b98f916878b59fb7ad707fb768eb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1752 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 872 f5988657.exe 872 f5988657.exe 4332 g9320591.exe 4332 g9320591.exe 1796 i4662367.exe 1796 i4662367.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 872 f5988657.exe Token: SeDebugPrivilege 4332 g9320591.exe Token: SeDebugPrivilege 1796 i4662367.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 640 h7716292.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4956 wrote to memory of 4348 4956 41bc8e8a4013beb216c7e410f6151f929479b98f916878b59fb7ad707fb768eb.exe 83 PID 4956 wrote to memory of 4348 4956 41bc8e8a4013beb216c7e410f6151f929479b98f916878b59fb7ad707fb768eb.exe 83 PID 4956 wrote to memory of 4348 4956 41bc8e8a4013beb216c7e410f6151f929479b98f916878b59fb7ad707fb768eb.exe 83 PID 4348 wrote to memory of 4820 4348 x9839027.exe 84 PID 4348 wrote to memory of 4820 4348 x9839027.exe 84 PID 4348 wrote to memory of 4820 4348 x9839027.exe 84 PID 4820 wrote to memory of 872 4820 x3760291.exe 85 PID 4820 wrote to memory of 872 4820 x3760291.exe 85 PID 4820 wrote to memory of 872 4820 x3760291.exe 85 PID 4820 wrote to memory of 4332 4820 x3760291.exe 92 PID 4820 wrote to memory of 4332 4820 x3760291.exe 92 PID 4348 wrote to memory of 640 4348 x9839027.exe 93 PID 4348 wrote to memory of 640 4348 x9839027.exe 93 PID 4348 wrote to memory of 640 4348 x9839027.exe 93 PID 640 wrote to memory of 3996 640 h7716292.exe 94 PID 640 wrote to memory of 3996 640 h7716292.exe 94 PID 640 wrote to memory of 3996 640 h7716292.exe 94 PID 4956 wrote to memory of 1796 4956 41bc8e8a4013beb216c7e410f6151f929479b98f916878b59fb7ad707fb768eb.exe 95 PID 4956 wrote to memory of 1796 4956 41bc8e8a4013beb216c7e410f6151f929479b98f916878b59fb7ad707fb768eb.exe 95 PID 4956 wrote to memory of 1796 4956 41bc8e8a4013beb216c7e410f6151f929479b98f916878b59fb7ad707fb768eb.exe 95 PID 3996 wrote to memory of 1752 3996 rugen.exe 97 PID 3996 wrote to memory of 1752 3996 rugen.exe 97 PID 3996 wrote to memory of 1752 3996 rugen.exe 97 PID 3996 wrote to memory of 3784 3996 rugen.exe 99 PID 3996 wrote to memory of 3784 3996 rugen.exe 99 PID 3996 wrote to memory of 3784 3996 rugen.exe 99 PID 3784 wrote to memory of 2572 3784 cmd.exe 101 PID 3784 wrote to memory of 2572 3784 cmd.exe 101 PID 3784 wrote to memory of 2572 3784 cmd.exe 101 PID 3784 wrote to memory of 3296 3784 cmd.exe 102 PID 3784 wrote to memory of 3296 3784 cmd.exe 102 PID 3784 wrote to memory of 3296 3784 cmd.exe 102 PID 3784 wrote to memory of 2432 3784 cmd.exe 103 PID 3784 wrote to memory of 2432 3784 cmd.exe 103 PID 3784 wrote to memory of 2432 3784 cmd.exe 103 PID 3784 wrote to memory of 1448 3784 cmd.exe 104 PID 3784 wrote to memory of 1448 3784 cmd.exe 104 PID 3784 wrote to memory of 1448 3784 cmd.exe 104 PID 3784 wrote to memory of 8 3784 cmd.exe 105 PID 3784 wrote to memory of 8 3784 cmd.exe 105 PID 3784 wrote to memory of 8 3784 cmd.exe 105 PID 3784 wrote to memory of 1904 3784 cmd.exe 106 PID 3784 wrote to memory of 1904 3784 cmd.exe 106 PID 3784 wrote to memory of 1904 3784 cmd.exe 106 PID 3996 wrote to memory of 1424 3996 rugen.exe 109 PID 3996 wrote to memory of 1424 3996 rugen.exe 109 PID 3996 wrote to memory of 1424 3996 rugen.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\41bc8e8a4013beb216c7e410f6151f929479b98f916878b59fb7ad707fb768eb.exe"C:\Users\Admin\AppData\Local\Temp\41bc8e8a4013beb216c7e410f6151f929479b98f916878b59fb7ad707fb768eb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9839027.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9839027.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3760291.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3760291.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5988657.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5988657.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9320591.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9320591.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7716292.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7716292.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:1752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2572
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:3296
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:2432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1448
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:8
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:1904
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1424
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4662367.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4662367.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:1824
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD595cd7710df53313d73abd0f1f106135f
SHA1a66ef42a4c9c3d773d0f40641163133bf3974903
SHA256f06cebd8fcc2bfc9a8ca7575f93bde67f6e085fd6d9686b8841853521e8acea5
SHA512ce41443f660df63849c0d6ccf12c113e4cb8bd74f98db465df6e2b04c12cdb379fa479108bcdccd4a5a9a70e9a4042f093f21411cdfacec5b8b26b0044bf8e11
-
Filesize
205KB
MD595cd7710df53313d73abd0f1f106135f
SHA1a66ef42a4c9c3d773d0f40641163133bf3974903
SHA256f06cebd8fcc2bfc9a8ca7575f93bde67f6e085fd6d9686b8841853521e8acea5
SHA512ce41443f660df63849c0d6ccf12c113e4cb8bd74f98db465df6e2b04c12cdb379fa479108bcdccd4a5a9a70e9a4042f093f21411cdfacec5b8b26b0044bf8e11
-
Filesize
205KB
MD595cd7710df53313d73abd0f1f106135f
SHA1a66ef42a4c9c3d773d0f40641163133bf3974903
SHA256f06cebd8fcc2bfc9a8ca7575f93bde67f6e085fd6d9686b8841853521e8acea5
SHA512ce41443f660df63849c0d6ccf12c113e4cb8bd74f98db465df6e2b04c12cdb379fa479108bcdccd4a5a9a70e9a4042f093f21411cdfacec5b8b26b0044bf8e11
-
Filesize
205KB
MD595cd7710df53313d73abd0f1f106135f
SHA1a66ef42a4c9c3d773d0f40641163133bf3974903
SHA256f06cebd8fcc2bfc9a8ca7575f93bde67f6e085fd6d9686b8841853521e8acea5
SHA512ce41443f660df63849c0d6ccf12c113e4cb8bd74f98db465df6e2b04c12cdb379fa479108bcdccd4a5a9a70e9a4042f093f21411cdfacec5b8b26b0044bf8e11
-
Filesize
205KB
MD595cd7710df53313d73abd0f1f106135f
SHA1a66ef42a4c9c3d773d0f40641163133bf3974903
SHA256f06cebd8fcc2bfc9a8ca7575f93bde67f6e085fd6d9686b8841853521e8acea5
SHA512ce41443f660df63849c0d6ccf12c113e4cb8bd74f98db465df6e2b04c12cdb379fa479108bcdccd4a5a9a70e9a4042f093f21411cdfacec5b8b26b0044bf8e11
-
Filesize
256KB
MD52c7b7f4283e859e310b7b9cfa2ed926a
SHA1afddae768f31628f85f11e18642d6272e1d88e65
SHA256fb8813e46ba98089c67d4a63fc0e3857e7056486cd2cbcc27f835f488a1a15da
SHA51232e4bf13685c233eb0705905ab3f69eaab27a9f8642f8f1a96d3b5c8ca616d7464b2d92ca6e6f5eec5ec8e6ba9872273918d1c2f8d921bbcaab337d7cfacddd3
-
Filesize
256KB
MD52c7b7f4283e859e310b7b9cfa2ed926a
SHA1afddae768f31628f85f11e18642d6272e1d88e65
SHA256fb8813e46ba98089c67d4a63fc0e3857e7056486cd2cbcc27f835f488a1a15da
SHA51232e4bf13685c233eb0705905ab3f69eaab27a9f8642f8f1a96d3b5c8ca616d7464b2d92ca6e6f5eec5ec8e6ba9872273918d1c2f8d921bbcaab337d7cfacddd3
-
Filesize
377KB
MD5c5404eed82ff783effa8a4bf2f05546f
SHA1e7008b070225a029f7be196174210c1737dee99c
SHA256d2160916c4f5dfe24f0a9ac488050e4799dc7fd9ab7cd66a742f0fb9177d47f7
SHA512eae5bc988b705046675d190223e8cbd6be031be4a05ee35e4ad158c85c07fafaa78c8b18350b79ff0095ab2321f28866dfd0bef4ae57b7e9666f7e3a0fd08341
-
Filesize
377KB
MD5c5404eed82ff783effa8a4bf2f05546f
SHA1e7008b070225a029f7be196174210c1737dee99c
SHA256d2160916c4f5dfe24f0a9ac488050e4799dc7fd9ab7cd66a742f0fb9177d47f7
SHA512eae5bc988b705046675d190223e8cbd6be031be4a05ee35e4ad158c85c07fafaa78c8b18350b79ff0095ab2321f28866dfd0bef4ae57b7e9666f7e3a0fd08341
-
Filesize
205KB
MD595cd7710df53313d73abd0f1f106135f
SHA1a66ef42a4c9c3d773d0f40641163133bf3974903
SHA256f06cebd8fcc2bfc9a8ca7575f93bde67f6e085fd6d9686b8841853521e8acea5
SHA512ce41443f660df63849c0d6ccf12c113e4cb8bd74f98db465df6e2b04c12cdb379fa479108bcdccd4a5a9a70e9a4042f093f21411cdfacec5b8b26b0044bf8e11
-
Filesize
205KB
MD595cd7710df53313d73abd0f1f106135f
SHA1a66ef42a4c9c3d773d0f40641163133bf3974903
SHA256f06cebd8fcc2bfc9a8ca7575f93bde67f6e085fd6d9686b8841853521e8acea5
SHA512ce41443f660df63849c0d6ccf12c113e4cb8bd74f98db465df6e2b04c12cdb379fa479108bcdccd4a5a9a70e9a4042f093f21411cdfacec5b8b26b0044bf8e11
-
Filesize
206KB
MD59e67495bdee57a8aa70f1af6f06d7179
SHA1d1fae9696d07de3bd220580cfe782e0707e34cb3
SHA256e81a89cf072bac2c4c7c8ac097e0362dc3b1cea19131aef816208479b8ed8b75
SHA512e393820fa64ba5bc7a397aae9ecd664fa47a8d4ab7e52eb40f379c0c089aa99bdef33ad20e1f3c8a2cf8ba0b15bb848e1f7ef10fbdcda6a0b9cfcdb73d1514cc
-
Filesize
206KB
MD59e67495bdee57a8aa70f1af6f06d7179
SHA1d1fae9696d07de3bd220580cfe782e0707e34cb3
SHA256e81a89cf072bac2c4c7c8ac097e0362dc3b1cea19131aef816208479b8ed8b75
SHA512e393820fa64ba5bc7a397aae9ecd664fa47a8d4ab7e52eb40f379c0c089aa99bdef33ad20e1f3c8a2cf8ba0b15bb848e1f7ef10fbdcda6a0b9cfcdb73d1514cc
-
Filesize
173KB
MD5d6ba3cc41d7cbbeae263a59a1c2b527d
SHA1137255ec1835e44050a24aaf26d269ba3ff01bd0
SHA256f909a2b8dc68cf32cbbcc7e1ef5bc1c8b9914f6cd94a27f4b247d6f645fbc3d7
SHA51236ee59f055eeae95c73b47aa35b97a2199e6163ea4e97037852dbacfb9ed9cc524123fa4b36724a1b3891e710da983a8624140fa37f58850506437a4d358c882
-
Filesize
173KB
MD5d6ba3cc41d7cbbeae263a59a1c2b527d
SHA1137255ec1835e44050a24aaf26d269ba3ff01bd0
SHA256f909a2b8dc68cf32cbbcc7e1ef5bc1c8b9914f6cd94a27f4b247d6f645fbc3d7
SHA51236ee59f055eeae95c73b47aa35b97a2199e6163ea4e97037852dbacfb9ed9cc524123fa4b36724a1b3891e710da983a8624140fa37f58850506437a4d358c882
-
Filesize
11KB
MD56ff50527c818fa7bbc440207614c656e
SHA126a25a791b6c1365cda7bb09c83f96a44a2b3b74
SHA256c0a6b6fb32f258defc28243f0dc253e1a43e861624340ced8c119e2cca961234
SHA5124748a91a99d583f3b38b7250c04ad99f71288adf3317508bb220f706445f477e32b63c931899916b5b908d524705773f361be941a397974243855f88f2e3c9f0
-
Filesize
11KB
MD56ff50527c818fa7bbc440207614c656e
SHA126a25a791b6c1365cda7bb09c83f96a44a2b3b74
SHA256c0a6b6fb32f258defc28243f0dc253e1a43e861624340ced8c119e2cca961234
SHA5124748a91a99d583f3b38b7250c04ad99f71288adf3317508bb220f706445f477e32b63c931899916b5b908d524705773f361be941a397974243855f88f2e3c9f0
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5