Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
16/06/2023, 06:05
Static task
static1
General
-
Target
73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a.exe
-
Size
577KB
-
MD5
9f6a9d4b99a7da968c6f7b118b08c0b7
-
SHA1
600ac74b54f2b6611ec806f442d7dd9faef3f747
-
SHA256
73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a
-
SHA512
e5e5e3098f713b09944910ac315476120a0eae4e7aa0fb866ff38c7f2a66e7fbf7f16d487113c8aa8804603a4d6c280abbdcb30b2d58003ca26aea040a63129b
-
SSDEEP
12288:bMrUy90doKMNzXA0yDnhVi8YNrTX/0PPOO93oc4bmIqZ:XyQm6n8PX/0x31sqZ
Malware Config
Extracted
redline
dana
83.97.73.130:19061
-
auth_value
da2d1691db653e49676d799e1eae2673
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
joker
83.97.73.130:19061
-
auth_value
a98d303cc28bb3b32a23c59214ae3bc0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g9096022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g9096022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g9096022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g9096022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g9096022.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 4440 x8382874.exe 4904 x4537242.exe 2092 f9730974.exe 1368 g9096022.exe 4592 h0157674.exe 4204 rugen.exe 4696 i2432763.exe 3396 rugen.exe 4892 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 3852 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g9096022.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8382874.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8382874.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4537242.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4537242.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4404 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2092 f9730974.exe 2092 f9730974.exe 1368 g9096022.exe 1368 g9096022.exe 4696 i2432763.exe 4696 i2432763.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2092 f9730974.exe Token: SeDebugPrivilege 1368 g9096022.exe Token: SeDebugPrivilege 4696 i2432763.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4592 h0157674.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1636 wrote to memory of 4440 1636 73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a.exe 66 PID 1636 wrote to memory of 4440 1636 73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a.exe 66 PID 1636 wrote to memory of 4440 1636 73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a.exe 66 PID 4440 wrote to memory of 4904 4440 x8382874.exe 67 PID 4440 wrote to memory of 4904 4440 x8382874.exe 67 PID 4440 wrote to memory of 4904 4440 x8382874.exe 67 PID 4904 wrote to memory of 2092 4904 x4537242.exe 68 PID 4904 wrote to memory of 2092 4904 x4537242.exe 68 PID 4904 wrote to memory of 2092 4904 x4537242.exe 68 PID 4904 wrote to memory of 1368 4904 x4537242.exe 70 PID 4904 wrote to memory of 1368 4904 x4537242.exe 70 PID 4440 wrote to memory of 4592 4440 x8382874.exe 71 PID 4440 wrote to memory of 4592 4440 x8382874.exe 71 PID 4440 wrote to memory of 4592 4440 x8382874.exe 71 PID 4592 wrote to memory of 4204 4592 h0157674.exe 72 PID 4592 wrote to memory of 4204 4592 h0157674.exe 72 PID 4592 wrote to memory of 4204 4592 h0157674.exe 72 PID 1636 wrote to memory of 4696 1636 73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a.exe 73 PID 1636 wrote to memory of 4696 1636 73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a.exe 73 PID 1636 wrote to memory of 4696 1636 73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a.exe 73 PID 4204 wrote to memory of 4404 4204 rugen.exe 75 PID 4204 wrote to memory of 4404 4204 rugen.exe 75 PID 4204 wrote to memory of 4404 4204 rugen.exe 75 PID 4204 wrote to memory of 3556 4204 rugen.exe 77 PID 4204 wrote to memory of 3556 4204 rugen.exe 77 PID 4204 wrote to memory of 3556 4204 rugen.exe 77 PID 3556 wrote to memory of 4316 3556 cmd.exe 79 PID 3556 wrote to memory of 4316 3556 cmd.exe 79 PID 3556 wrote to memory of 4316 3556 cmd.exe 79 PID 3556 wrote to memory of 4784 3556 cmd.exe 80 PID 3556 wrote to memory of 4784 3556 cmd.exe 80 PID 3556 wrote to memory of 4784 3556 cmd.exe 80 PID 3556 wrote to memory of 2468 3556 cmd.exe 81 PID 3556 wrote to memory of 2468 3556 cmd.exe 81 PID 3556 wrote to memory of 2468 3556 cmd.exe 81 PID 3556 wrote to memory of 2476 3556 cmd.exe 83 PID 3556 wrote to memory of 2476 3556 cmd.exe 83 PID 3556 wrote to memory of 2476 3556 cmd.exe 83 PID 3556 wrote to memory of 2104 3556 cmd.exe 82 PID 3556 wrote to memory of 2104 3556 cmd.exe 82 PID 3556 wrote to memory of 2104 3556 cmd.exe 82 PID 3556 wrote to memory of 3616 3556 cmd.exe 84 PID 3556 wrote to memory of 3616 3556 cmd.exe 84 PID 3556 wrote to memory of 3616 3556 cmd.exe 84 PID 4204 wrote to memory of 3852 4204 rugen.exe 86 PID 4204 wrote to memory of 3852 4204 rugen.exe 86 PID 4204 wrote to memory of 3852 4204 rugen.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a.exe"C:\Users\Admin\AppData\Local\Temp\73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8382874.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8382874.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4537242.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4537242.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9730974.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9730974.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9096022.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9096022.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0157674.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0157674.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:4404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:4784
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:2468
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:2104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2476
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:3616
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3852
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2432763.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2432763.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3396
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4892
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD522dabb4d161985b272cd96785f15c8ef
SHA123a1a5bf108e721d5d8dcd7d6688d10a2574367f
SHA256407a4764a00914c1c47419d0101ce801295f9be5f48354fb661ac75f2d366a5f
SHA51275e744250fb311b47b060d90d631a2d81eebc70727e4ded83823170e9e6e61a03fd91902e540337ca6fc6e303f84e1a0e0a9915b3dbfe504e77149f75ee8c976
-
Filesize
205KB
MD522dabb4d161985b272cd96785f15c8ef
SHA123a1a5bf108e721d5d8dcd7d6688d10a2574367f
SHA256407a4764a00914c1c47419d0101ce801295f9be5f48354fb661ac75f2d366a5f
SHA51275e744250fb311b47b060d90d631a2d81eebc70727e4ded83823170e9e6e61a03fd91902e540337ca6fc6e303f84e1a0e0a9915b3dbfe504e77149f75ee8c976
-
Filesize
205KB
MD522dabb4d161985b272cd96785f15c8ef
SHA123a1a5bf108e721d5d8dcd7d6688d10a2574367f
SHA256407a4764a00914c1c47419d0101ce801295f9be5f48354fb661ac75f2d366a5f
SHA51275e744250fb311b47b060d90d631a2d81eebc70727e4ded83823170e9e6e61a03fd91902e540337ca6fc6e303f84e1a0e0a9915b3dbfe504e77149f75ee8c976
-
Filesize
205KB
MD522dabb4d161985b272cd96785f15c8ef
SHA123a1a5bf108e721d5d8dcd7d6688d10a2574367f
SHA256407a4764a00914c1c47419d0101ce801295f9be5f48354fb661ac75f2d366a5f
SHA51275e744250fb311b47b060d90d631a2d81eebc70727e4ded83823170e9e6e61a03fd91902e540337ca6fc6e303f84e1a0e0a9915b3dbfe504e77149f75ee8c976
-
Filesize
205KB
MD522dabb4d161985b272cd96785f15c8ef
SHA123a1a5bf108e721d5d8dcd7d6688d10a2574367f
SHA256407a4764a00914c1c47419d0101ce801295f9be5f48354fb661ac75f2d366a5f
SHA51275e744250fb311b47b060d90d631a2d81eebc70727e4ded83823170e9e6e61a03fd91902e540337ca6fc6e303f84e1a0e0a9915b3dbfe504e77149f75ee8c976
-
Filesize
255KB
MD52f9b84aa1611bacf2e4922f96ce75677
SHA159a66bd038b4b46eaf7ddbedf780b263f8b71030
SHA25679f1db4d65ed73583e50d18e475bbd7e0c42dd56a75b56c2a7df2635e762a9c1
SHA5121338e4d22c9d8fd9ea4a518dcda4691325744871ab28a97b50857b8687461ffb336eb83a3cc75a4a19ea6030fbc253aad8ad30fdfb9e7936ce6d3411491b544c
-
Filesize
255KB
MD52f9b84aa1611bacf2e4922f96ce75677
SHA159a66bd038b4b46eaf7ddbedf780b263f8b71030
SHA25679f1db4d65ed73583e50d18e475bbd7e0c42dd56a75b56c2a7df2635e762a9c1
SHA5121338e4d22c9d8fd9ea4a518dcda4691325744871ab28a97b50857b8687461ffb336eb83a3cc75a4a19ea6030fbc253aad8ad30fdfb9e7936ce6d3411491b544c
-
Filesize
377KB
MD5a80d31451068c677c8eb9a845087f6e2
SHA1aedea096319cae946c37b84ed44f1bce4e2d01bd
SHA25645a73d25069fc5d4468a2ed75f4adc8b25c9363a824735b457943bc8304e5959
SHA512a2d509fba7aa8ff19b57aefa880b0a778edf3d09eccb72c88888ad81aa6ef3131afea17d47593eb686453d3fd340ea39550e69609f44ced654be5c039a407393
-
Filesize
377KB
MD5a80d31451068c677c8eb9a845087f6e2
SHA1aedea096319cae946c37b84ed44f1bce4e2d01bd
SHA25645a73d25069fc5d4468a2ed75f4adc8b25c9363a824735b457943bc8304e5959
SHA512a2d509fba7aa8ff19b57aefa880b0a778edf3d09eccb72c88888ad81aa6ef3131afea17d47593eb686453d3fd340ea39550e69609f44ced654be5c039a407393
-
Filesize
205KB
MD522dabb4d161985b272cd96785f15c8ef
SHA123a1a5bf108e721d5d8dcd7d6688d10a2574367f
SHA256407a4764a00914c1c47419d0101ce801295f9be5f48354fb661ac75f2d366a5f
SHA51275e744250fb311b47b060d90d631a2d81eebc70727e4ded83823170e9e6e61a03fd91902e540337ca6fc6e303f84e1a0e0a9915b3dbfe504e77149f75ee8c976
-
Filesize
205KB
MD522dabb4d161985b272cd96785f15c8ef
SHA123a1a5bf108e721d5d8dcd7d6688d10a2574367f
SHA256407a4764a00914c1c47419d0101ce801295f9be5f48354fb661ac75f2d366a5f
SHA51275e744250fb311b47b060d90d631a2d81eebc70727e4ded83823170e9e6e61a03fd91902e540337ca6fc6e303f84e1a0e0a9915b3dbfe504e77149f75ee8c976
-
Filesize
206KB
MD5710c7c0a6e0ae4885a5ea3191e1cdd17
SHA1ba9963ccd7282aa4093e204e935227c8f2415452
SHA2566a576fa060026dade30efcb409eb12a4eec94fe73fff72aa3d9f383c96f00a04
SHA5127025eb8f30998b91c8426f65df3d170c259626ad754142e02e1797e74124b4a503a185bb8f5d6a4ca6d230c4351ecf0f7e3ea6adca9f1bd0ab0430221455dcc3
-
Filesize
206KB
MD5710c7c0a6e0ae4885a5ea3191e1cdd17
SHA1ba9963ccd7282aa4093e204e935227c8f2415452
SHA2566a576fa060026dade30efcb409eb12a4eec94fe73fff72aa3d9f383c96f00a04
SHA5127025eb8f30998b91c8426f65df3d170c259626ad754142e02e1797e74124b4a503a185bb8f5d6a4ca6d230c4351ecf0f7e3ea6adca9f1bd0ab0430221455dcc3
-
Filesize
173KB
MD558648e9695539cdcfc59df1b919454bd
SHA1fa0bdaa45205e93b0bfead521c81c8d8146f491a
SHA256b854c6aa63a373eeea7556e2a5bf8896b2217d45caf03da4e02e3c97905a61e8
SHA5129bae031ff883357ac25b2f012505bf7f50307e7b5d148f138e4170b66648962dc34ea18ef3c75cc8611add056cca5afbd2a3b310c96a5f1bf49ac3416e73ab7f
-
Filesize
173KB
MD558648e9695539cdcfc59df1b919454bd
SHA1fa0bdaa45205e93b0bfead521c81c8d8146f491a
SHA256b854c6aa63a373eeea7556e2a5bf8896b2217d45caf03da4e02e3c97905a61e8
SHA5129bae031ff883357ac25b2f012505bf7f50307e7b5d148f138e4170b66648962dc34ea18ef3c75cc8611add056cca5afbd2a3b310c96a5f1bf49ac3416e73ab7f
-
Filesize
11KB
MD5bbd440498315e029d0707a934d76cb98
SHA136503d21cccc67be0c8143f51d066f7c0d9ad3b0
SHA2565256ce16ffd51bb8705484957104fd08108954094c1a63e96af68624a4ec23a3
SHA5125d42afbcdcfa1ceab806af9a6547f9c1b880ba8ed8ef75d4abaa6c8523ca91018afc8d852ab6f4b63833db6d8edb2e48dae4bab12709140ddcd8fd3c978c3cd3
-
Filesize
11KB
MD5bbd440498315e029d0707a934d76cb98
SHA136503d21cccc67be0c8143f51d066f7c0d9ad3b0
SHA2565256ce16ffd51bb8705484957104fd08108954094c1a63e96af68624a4ec23a3
SHA5125d42afbcdcfa1ceab806af9a6547f9c1b880ba8ed8ef75d4abaa6c8523ca91018afc8d852ab6f4b63833db6d8edb2e48dae4bab12709140ddcd8fd3c978c3cd3
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf