Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2023, 03:44
Static task
static1
General
-
Target
277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03.exe
-
Size
577KB
-
MD5
3cec9e99b470136bcf340534fa5c75af
-
SHA1
830c9d80b34561798f9702ab492741885557f1dc
-
SHA256
277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03
-
SHA512
91aa551cdcc7eaf3478931f778f8731553b6ca694900cc57378dcd3b83ad0ce5f213b0c82d7b9c864d537a97e1b0d11a58420b7ec16e20cee4a1a72941d4f1b8
-
SSDEEP
12288:EMr9y90v1wVh3JWv69dRMLXzmiMsGKC8C2iJ46J07DHlsGLadZ:Rya1CPWv65Qzn7ZZCTJOkdZ
Malware Config
Extracted
redline
dana
83.97.73.130:19061
-
auth_value
da2d1691db653e49676d799e1eae2673
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
joker
83.97.73.130:19061
-
auth_value
a98d303cc28bb3b32a23c59214ae3bc0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g6899398.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g6899398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g6899398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g6899398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g6899398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g6899398.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation h8360671.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 9 IoCs
pid Process 4768 x7268229.exe 4288 x1454097.exe 3372 f9180793.exe 228 g6899398.exe 3284 h8360671.exe 1224 rugen.exe 376 i5492821.exe 3740 rugen.exe 3976 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 4132 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g6899398.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7268229.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1454097.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1454097.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x7268229.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{F81A3BCE-E17C-43BF-97A2-3BB3449CD4B1}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{375C41B6-F403-49C0-9541-0B8E2A109AE8}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3372 f9180793.exe 3372 f9180793.exe 228 g6899398.exe 228 g6899398.exe 376 i5492821.exe 376 i5492821.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3372 f9180793.exe Token: SeDebugPrivilege 228 g6899398.exe Token: SeDebugPrivilege 376 i5492821.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3284 h8360671.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3444 wrote to memory of 4768 3444 277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03.exe 82 PID 3444 wrote to memory of 4768 3444 277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03.exe 82 PID 3444 wrote to memory of 4768 3444 277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03.exe 82 PID 4768 wrote to memory of 4288 4768 x7268229.exe 83 PID 4768 wrote to memory of 4288 4768 x7268229.exe 83 PID 4768 wrote to memory of 4288 4768 x7268229.exe 83 PID 4288 wrote to memory of 3372 4288 x1454097.exe 84 PID 4288 wrote to memory of 3372 4288 x1454097.exe 84 PID 4288 wrote to memory of 3372 4288 x1454097.exe 84 PID 4288 wrote to memory of 228 4288 x1454097.exe 89 PID 4288 wrote to memory of 228 4288 x1454097.exe 89 PID 4768 wrote to memory of 3284 4768 x7268229.exe 90 PID 4768 wrote to memory of 3284 4768 x7268229.exe 90 PID 4768 wrote to memory of 3284 4768 x7268229.exe 90 PID 3284 wrote to memory of 1224 3284 h8360671.exe 91 PID 3284 wrote to memory of 1224 3284 h8360671.exe 91 PID 3284 wrote to memory of 1224 3284 h8360671.exe 91 PID 3444 wrote to memory of 376 3444 277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03.exe 92 PID 3444 wrote to memory of 376 3444 277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03.exe 92 PID 3444 wrote to memory of 376 3444 277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03.exe 92 PID 1224 wrote to memory of 2756 1224 rugen.exe 94 PID 1224 wrote to memory of 2756 1224 rugen.exe 94 PID 1224 wrote to memory of 2756 1224 rugen.exe 94 PID 1224 wrote to memory of 3932 1224 rugen.exe 96 PID 1224 wrote to memory of 3932 1224 rugen.exe 96 PID 1224 wrote to memory of 3932 1224 rugen.exe 96 PID 3932 wrote to memory of 1044 3932 cmd.exe 98 PID 3932 wrote to memory of 1044 3932 cmd.exe 98 PID 3932 wrote to memory of 1044 3932 cmd.exe 98 PID 3932 wrote to memory of 4724 3932 cmd.exe 99 PID 3932 wrote to memory of 4724 3932 cmd.exe 99 PID 3932 wrote to memory of 4724 3932 cmd.exe 99 PID 3932 wrote to memory of 4472 3932 cmd.exe 100 PID 3932 wrote to memory of 4472 3932 cmd.exe 100 PID 3932 wrote to memory of 4472 3932 cmd.exe 100 PID 3932 wrote to memory of 4812 3932 cmd.exe 101 PID 3932 wrote to memory of 4812 3932 cmd.exe 101 PID 3932 wrote to memory of 4812 3932 cmd.exe 101 PID 3932 wrote to memory of 3824 3932 cmd.exe 102 PID 3932 wrote to memory of 3824 3932 cmd.exe 102 PID 3932 wrote to memory of 3824 3932 cmd.exe 102 PID 3932 wrote to memory of 1092 3932 cmd.exe 103 PID 3932 wrote to memory of 1092 3932 cmd.exe 103 PID 3932 wrote to memory of 1092 3932 cmd.exe 103 PID 1224 wrote to memory of 4132 1224 rugen.exe 112 PID 1224 wrote to memory of 4132 1224 rugen.exe 112 PID 1224 wrote to memory of 4132 1224 rugen.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03.exe"C:\Users\Admin\AppData\Local\Temp\277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7268229.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7268229.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1454097.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1454097.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9180793.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9180793.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6899398.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6899398.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8360671.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8360671.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:2756
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1044
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:4724
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:4472
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:3824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:1092
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4132
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5492821.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5492821.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:2668
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3740
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3976
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5ff4a408c7d5409249a4c907398c554c4
SHA1b4b42a58918b96745458e1ada5b3596fdf8d15f6
SHA2565894a2b83176eb0f76d6ceee518aa6833b34ad1a238ab1674abaface1f0686f2
SHA5129dc58b5abd386b2d0fc1b23dbb579482d14cc99a62490bf8ec0716154684e8a95c168e1b1ba185cd100bf906ef20607a9fa1b2f709e94f615d080a71e2d33d48
-
Filesize
205KB
MD5ff4a408c7d5409249a4c907398c554c4
SHA1b4b42a58918b96745458e1ada5b3596fdf8d15f6
SHA2565894a2b83176eb0f76d6ceee518aa6833b34ad1a238ab1674abaface1f0686f2
SHA5129dc58b5abd386b2d0fc1b23dbb579482d14cc99a62490bf8ec0716154684e8a95c168e1b1ba185cd100bf906ef20607a9fa1b2f709e94f615d080a71e2d33d48
-
Filesize
205KB
MD5ff4a408c7d5409249a4c907398c554c4
SHA1b4b42a58918b96745458e1ada5b3596fdf8d15f6
SHA2565894a2b83176eb0f76d6ceee518aa6833b34ad1a238ab1674abaface1f0686f2
SHA5129dc58b5abd386b2d0fc1b23dbb579482d14cc99a62490bf8ec0716154684e8a95c168e1b1ba185cd100bf906ef20607a9fa1b2f709e94f615d080a71e2d33d48
-
Filesize
205KB
MD5ff4a408c7d5409249a4c907398c554c4
SHA1b4b42a58918b96745458e1ada5b3596fdf8d15f6
SHA2565894a2b83176eb0f76d6ceee518aa6833b34ad1a238ab1674abaface1f0686f2
SHA5129dc58b5abd386b2d0fc1b23dbb579482d14cc99a62490bf8ec0716154684e8a95c168e1b1ba185cd100bf906ef20607a9fa1b2f709e94f615d080a71e2d33d48
-
Filesize
205KB
MD5ff4a408c7d5409249a4c907398c554c4
SHA1b4b42a58918b96745458e1ada5b3596fdf8d15f6
SHA2565894a2b83176eb0f76d6ceee518aa6833b34ad1a238ab1674abaface1f0686f2
SHA5129dc58b5abd386b2d0fc1b23dbb579482d14cc99a62490bf8ec0716154684e8a95c168e1b1ba185cd100bf906ef20607a9fa1b2f709e94f615d080a71e2d33d48
-
Filesize
256KB
MD5f9217c39bf017d6555485c4b91c3fcd4
SHA1373fa9b64fa998b1910f09854754fd34cfd6377f
SHA2564a65282558872b21092bb5b884fa5470a70686f0af24971c4e0402c8717671a3
SHA512cd44b243191a7a106c997f4448cda7647ee7be46a6551826c596894faf978a0a1d762e7bb3fb2177376f1755a7d993ff9651497aa352f9f3b86205bed35c5a0c
-
Filesize
256KB
MD5f9217c39bf017d6555485c4b91c3fcd4
SHA1373fa9b64fa998b1910f09854754fd34cfd6377f
SHA2564a65282558872b21092bb5b884fa5470a70686f0af24971c4e0402c8717671a3
SHA512cd44b243191a7a106c997f4448cda7647ee7be46a6551826c596894faf978a0a1d762e7bb3fb2177376f1755a7d993ff9651497aa352f9f3b86205bed35c5a0c
-
Filesize
377KB
MD576bbf040eb5484fc80ea562226fa4f6d
SHA1c1559d91d5e58b3cad6002cbffd02656b91a181a
SHA256df737d9db235ec3ca323515c75896446c07a6607a72ba65f4727ff6445d77a8f
SHA512e52a18d7039936de28643faf518eb9b1b2ddbefa3d6099a7efb3934d83bce669ef15c1c3df000c7e5b9ebdfd12c3e35dac3ff7a0cb0c950e92158b164bbdf4f2
-
Filesize
377KB
MD576bbf040eb5484fc80ea562226fa4f6d
SHA1c1559d91d5e58b3cad6002cbffd02656b91a181a
SHA256df737d9db235ec3ca323515c75896446c07a6607a72ba65f4727ff6445d77a8f
SHA512e52a18d7039936de28643faf518eb9b1b2ddbefa3d6099a7efb3934d83bce669ef15c1c3df000c7e5b9ebdfd12c3e35dac3ff7a0cb0c950e92158b164bbdf4f2
-
Filesize
205KB
MD5ff4a408c7d5409249a4c907398c554c4
SHA1b4b42a58918b96745458e1ada5b3596fdf8d15f6
SHA2565894a2b83176eb0f76d6ceee518aa6833b34ad1a238ab1674abaface1f0686f2
SHA5129dc58b5abd386b2d0fc1b23dbb579482d14cc99a62490bf8ec0716154684e8a95c168e1b1ba185cd100bf906ef20607a9fa1b2f709e94f615d080a71e2d33d48
-
Filesize
205KB
MD5ff4a408c7d5409249a4c907398c554c4
SHA1b4b42a58918b96745458e1ada5b3596fdf8d15f6
SHA2565894a2b83176eb0f76d6ceee518aa6833b34ad1a238ab1674abaface1f0686f2
SHA5129dc58b5abd386b2d0fc1b23dbb579482d14cc99a62490bf8ec0716154684e8a95c168e1b1ba185cd100bf906ef20607a9fa1b2f709e94f615d080a71e2d33d48
-
Filesize
206KB
MD543e9e8e5d921565d04eb4277e8b3bf98
SHA164b409362ccfda793da06a2e92f429e0ce65e346
SHA2563789b95a2f4899c45a2f921a748cec9f89b38c8fc100d3d9f033e5eabc114ea7
SHA5121ddb3d245775b456f3ad9e8b66fc035ff59da36cd29c217a8ba6589a2dbf3d4eb7358e6d699e627d1c96f3b0af9207ce30f441921662c3ccc31144623badb583
-
Filesize
206KB
MD543e9e8e5d921565d04eb4277e8b3bf98
SHA164b409362ccfda793da06a2e92f429e0ce65e346
SHA2563789b95a2f4899c45a2f921a748cec9f89b38c8fc100d3d9f033e5eabc114ea7
SHA5121ddb3d245775b456f3ad9e8b66fc035ff59da36cd29c217a8ba6589a2dbf3d4eb7358e6d699e627d1c96f3b0af9207ce30f441921662c3ccc31144623badb583
-
Filesize
173KB
MD5ff08673b00ca6e31f9bec6899d5e1ecc
SHA1d3e3c674859b693d87d2a919791d7de533cc540a
SHA25629a37f24ffa31a0a9377ace95ebfca3e1470a4f1d9f0e5daa20ffede50e1126d
SHA5127639f5f9568ba7386fe34f53a506c61151857cc07958db7c228de4ce0c5a9ec6d3e6d416c1d38253e587e031697b1653f39d17c27ddb3b7006c697d227027140
-
Filesize
173KB
MD5ff08673b00ca6e31f9bec6899d5e1ecc
SHA1d3e3c674859b693d87d2a919791d7de533cc540a
SHA25629a37f24ffa31a0a9377ace95ebfca3e1470a4f1d9f0e5daa20ffede50e1126d
SHA5127639f5f9568ba7386fe34f53a506c61151857cc07958db7c228de4ce0c5a9ec6d3e6d416c1d38253e587e031697b1653f39d17c27ddb3b7006c697d227027140
-
Filesize
11KB
MD58af5a0b45c9f8bb2e7f0fab976697103
SHA15a48f42c586c5ac8b42afe8114de9ae3481f864f
SHA2568169823840c271c76b5e69b3634f9f9dee6017589f32fbdb37f43a34b145cff9
SHA51233a0ebe0727a276d94c176885f9c04c0026b1bad5dbee68ad11fff97455c2ba50381081f2df7bcb3d74576374d9e5c3872708ed4890aa716dde4a6e6e0b74847
-
Filesize
11KB
MD58af5a0b45c9f8bb2e7f0fab976697103
SHA15a48f42c586c5ac8b42afe8114de9ae3481f864f
SHA2568169823840c271c76b5e69b3634f9f9dee6017589f32fbdb37f43a34b145cff9
SHA51233a0ebe0727a276d94c176885f9c04c0026b1bad5dbee68ad11fff97455c2ba50381081f2df7bcb3d74576374d9e5c3872708ed4890aa716dde4a6e6e0b74847
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5