Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
16-06-2023 08:22
Static task
static1
General
-
Target
3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97.exe
-
Size
583KB
-
MD5
dbc82f099be9a0747d44630883c94500
-
SHA1
748c029778c9245a30728e7dc3f61db1f1d5dc04
-
SHA256
3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97
-
SHA512
232845072cf7b804f7a2abee2b64807ddac7621de95856502e922544dc64d45ae30192703b6be030f744c753a311e71da48e0fa771cd382c539caacb4c329e8f
-
SSDEEP
12288:oMr3yy901vjuj1GZGDMNqmmHUOb9d2lyD1Wz9vG:Pyyevjuj1GQl8yD1Wzk
Malware Config
Extracted
redline
dana
83.97.73.130:19061
-
auth_value
da2d1691db653e49676d799e1eae2673
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
joker
83.97.73.130:19061
-
auth_value
a98d303cc28bb3b32a23c59214ae3bc0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g6209844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g6209844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g6209844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g6209844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g6209844.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 4684 x4294390.exe 4064 x8043632.exe 4176 f8882049.exe 2196 g6209844.exe 3740 h1117802.exe 4764 rugen.exe 4812 i0073534.exe 4412 rugen.exe 4028 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 2060 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g6209844.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4294390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4294390.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8043632.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8043632.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5056 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4176 f8882049.exe 4176 f8882049.exe 2196 g6209844.exe 2196 g6209844.exe 4812 i0073534.exe 4812 i0073534.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4176 f8882049.exe Token: SeDebugPrivilege 2196 g6209844.exe Token: SeDebugPrivilege 4812 i0073534.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3740 h1117802.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4684 2896 3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97.exe 66 PID 2896 wrote to memory of 4684 2896 3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97.exe 66 PID 2896 wrote to memory of 4684 2896 3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97.exe 66 PID 4684 wrote to memory of 4064 4684 x4294390.exe 67 PID 4684 wrote to memory of 4064 4684 x4294390.exe 67 PID 4684 wrote to memory of 4064 4684 x4294390.exe 67 PID 4064 wrote to memory of 4176 4064 x8043632.exe 68 PID 4064 wrote to memory of 4176 4064 x8043632.exe 68 PID 4064 wrote to memory of 4176 4064 x8043632.exe 68 PID 4064 wrote to memory of 2196 4064 x8043632.exe 70 PID 4064 wrote to memory of 2196 4064 x8043632.exe 70 PID 4684 wrote to memory of 3740 4684 x4294390.exe 71 PID 4684 wrote to memory of 3740 4684 x4294390.exe 71 PID 4684 wrote to memory of 3740 4684 x4294390.exe 71 PID 3740 wrote to memory of 4764 3740 h1117802.exe 72 PID 3740 wrote to memory of 4764 3740 h1117802.exe 72 PID 3740 wrote to memory of 4764 3740 h1117802.exe 72 PID 2896 wrote to memory of 4812 2896 3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97.exe 73 PID 2896 wrote to memory of 4812 2896 3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97.exe 73 PID 2896 wrote to memory of 4812 2896 3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97.exe 73 PID 4764 wrote to memory of 5056 4764 rugen.exe 75 PID 4764 wrote to memory of 5056 4764 rugen.exe 75 PID 4764 wrote to memory of 5056 4764 rugen.exe 75 PID 4764 wrote to memory of 4880 4764 rugen.exe 77 PID 4764 wrote to memory of 4880 4764 rugen.exe 77 PID 4764 wrote to memory of 4880 4764 rugen.exe 77 PID 4880 wrote to memory of 3428 4880 cmd.exe 80 PID 4880 wrote to memory of 3428 4880 cmd.exe 80 PID 4880 wrote to memory of 3428 4880 cmd.exe 80 PID 4880 wrote to memory of 3136 4880 cmd.exe 79 PID 4880 wrote to memory of 3136 4880 cmd.exe 79 PID 4880 wrote to memory of 3136 4880 cmd.exe 79 PID 4880 wrote to memory of 4048 4880 cmd.exe 81 PID 4880 wrote to memory of 4048 4880 cmd.exe 81 PID 4880 wrote to memory of 4048 4880 cmd.exe 81 PID 4880 wrote to memory of 3976 4880 cmd.exe 82 PID 4880 wrote to memory of 3976 4880 cmd.exe 82 PID 4880 wrote to memory of 3976 4880 cmd.exe 82 PID 4880 wrote to memory of 4428 4880 cmd.exe 83 PID 4880 wrote to memory of 4428 4880 cmd.exe 83 PID 4880 wrote to memory of 4428 4880 cmd.exe 83 PID 4880 wrote to memory of 4392 4880 cmd.exe 84 PID 4880 wrote to memory of 4392 4880 cmd.exe 84 PID 4880 wrote to memory of 4392 4880 cmd.exe 84 PID 4764 wrote to memory of 2060 4764 rugen.exe 86 PID 4764 wrote to memory of 2060 4764 rugen.exe 86 PID 4764 wrote to memory of 2060 4764 rugen.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97.exe"C:\Users\Admin\AppData\Local\Temp\3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4294390.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4294390.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8043632.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8043632.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8882049.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8882049.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6209844.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6209844.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1117802.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1117802.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:5056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:3136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3428
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:4048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:4428
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:4392
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2060
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0073534.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0073534.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4412
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5697c16582fe681a2ea92635170d82587
SHA112d56f5efebaad959b401c2e425e8c1dd535545d
SHA256ecf91dc9390e0dfddced0241e41cb757d0e07472cca8e11fb04364ffbcbe8cc1
SHA51252d14e878b7232a20d543a639be8984bfed33ab0db6df335c7644cf7c353741397ec65539d2ca622e81cbafcb6cdc67843d0486ea10a95da8c9a9659423c499b
-
Filesize
205KB
MD5697c16582fe681a2ea92635170d82587
SHA112d56f5efebaad959b401c2e425e8c1dd535545d
SHA256ecf91dc9390e0dfddced0241e41cb757d0e07472cca8e11fb04364ffbcbe8cc1
SHA51252d14e878b7232a20d543a639be8984bfed33ab0db6df335c7644cf7c353741397ec65539d2ca622e81cbafcb6cdc67843d0486ea10a95da8c9a9659423c499b
-
Filesize
205KB
MD5697c16582fe681a2ea92635170d82587
SHA112d56f5efebaad959b401c2e425e8c1dd535545d
SHA256ecf91dc9390e0dfddced0241e41cb757d0e07472cca8e11fb04364ffbcbe8cc1
SHA51252d14e878b7232a20d543a639be8984bfed33ab0db6df335c7644cf7c353741397ec65539d2ca622e81cbafcb6cdc67843d0486ea10a95da8c9a9659423c499b
-
Filesize
205KB
MD5697c16582fe681a2ea92635170d82587
SHA112d56f5efebaad959b401c2e425e8c1dd535545d
SHA256ecf91dc9390e0dfddced0241e41cb757d0e07472cca8e11fb04364ffbcbe8cc1
SHA51252d14e878b7232a20d543a639be8984bfed33ab0db6df335c7644cf7c353741397ec65539d2ca622e81cbafcb6cdc67843d0486ea10a95da8c9a9659423c499b
-
Filesize
205KB
MD5697c16582fe681a2ea92635170d82587
SHA112d56f5efebaad959b401c2e425e8c1dd535545d
SHA256ecf91dc9390e0dfddced0241e41cb757d0e07472cca8e11fb04364ffbcbe8cc1
SHA51252d14e878b7232a20d543a639be8984bfed33ab0db6df335c7644cf7c353741397ec65539d2ca622e81cbafcb6cdc67843d0486ea10a95da8c9a9659423c499b
-
Filesize
267KB
MD553d79b24fb22fec3fba3d679576a8e86
SHA12124ee88a302311a9164fa98607703067c3dffa7
SHA256f0e5bab0e24c4c959dfb6e7d0de85651ec9c905246142cbdb02dba64055f0eaa
SHA51291190404be958131a918af17e25ecacad56055bb7b446932af7720d4a9e2de9536f9f27ba3c7f807529638a0e9e4440b3a8478c13cd18a8cec52ebc61718cb8c
-
Filesize
267KB
MD553d79b24fb22fec3fba3d679576a8e86
SHA12124ee88a302311a9164fa98607703067c3dffa7
SHA256f0e5bab0e24c4c959dfb6e7d0de85651ec9c905246142cbdb02dba64055f0eaa
SHA51291190404be958131a918af17e25ecacad56055bb7b446932af7720d4a9e2de9536f9f27ba3c7f807529638a0e9e4440b3a8478c13cd18a8cec52ebc61718cb8c
-
Filesize
377KB
MD56527bf539934514c690195f6dd5e2c08
SHA1e304b26da4699d5429bca4fb10db3ebc1fb4e2e5
SHA2562152c60bd46658b13c12789601cd8d984d4d886d8bb0d5a489a93e983292c343
SHA5127ae58382a2e77490ff88cabbad98ef5ab8406031b75dc4a41dd2d7e3b471833cc880e1f8b03b5e542e85b2f4d4d20aa2971cda484f0aaccb129035c14315c7b2
-
Filesize
377KB
MD56527bf539934514c690195f6dd5e2c08
SHA1e304b26da4699d5429bca4fb10db3ebc1fb4e2e5
SHA2562152c60bd46658b13c12789601cd8d984d4d886d8bb0d5a489a93e983292c343
SHA5127ae58382a2e77490ff88cabbad98ef5ab8406031b75dc4a41dd2d7e3b471833cc880e1f8b03b5e542e85b2f4d4d20aa2971cda484f0aaccb129035c14315c7b2
-
Filesize
205KB
MD5697c16582fe681a2ea92635170d82587
SHA112d56f5efebaad959b401c2e425e8c1dd535545d
SHA256ecf91dc9390e0dfddced0241e41cb757d0e07472cca8e11fb04364ffbcbe8cc1
SHA51252d14e878b7232a20d543a639be8984bfed33ab0db6df335c7644cf7c353741397ec65539d2ca622e81cbafcb6cdc67843d0486ea10a95da8c9a9659423c499b
-
Filesize
205KB
MD5697c16582fe681a2ea92635170d82587
SHA112d56f5efebaad959b401c2e425e8c1dd535545d
SHA256ecf91dc9390e0dfddced0241e41cb757d0e07472cca8e11fb04364ffbcbe8cc1
SHA51252d14e878b7232a20d543a639be8984bfed33ab0db6df335c7644cf7c353741397ec65539d2ca622e81cbafcb6cdc67843d0486ea10a95da8c9a9659423c499b
-
Filesize
206KB
MD5ed883d11e51ae72425f6a2f304bb4161
SHA1c6a4de7b7ef1354818515fb4f2015b12b21bd1b0
SHA256b83bef4dfc290b7a78843fc648c3a1509e13a00d1693571b5a541bc711be64d3
SHA512660ea7e6af28bb75aeaf24ebb2811dbbb6ab6fc9c8d7744222c7c6006b45aaa35dc8a5e3ae42cc58324be96c7897712274a715f1fdfd76b9111caa0aac031a87
-
Filesize
206KB
MD5ed883d11e51ae72425f6a2f304bb4161
SHA1c6a4de7b7ef1354818515fb4f2015b12b21bd1b0
SHA256b83bef4dfc290b7a78843fc648c3a1509e13a00d1693571b5a541bc711be64d3
SHA512660ea7e6af28bb75aeaf24ebb2811dbbb6ab6fc9c8d7744222c7c6006b45aaa35dc8a5e3ae42cc58324be96c7897712274a715f1fdfd76b9111caa0aac031a87
-
Filesize
173KB
MD55cba7dc418e8db2a08bce79e7625dccc
SHA19b1a2296f0a6a4faebf66388d228265924bb7985
SHA2567a7917673ae7f2d407cf25e2682f247a07ee5342a6931a32c1aef78c1db5b4c7
SHA51254c3a9c78e3a5583b7baca8b2583508e0ab49b301f38e05b97d3ec471b6fa633f3bca0d847824bc1cd3062636598c2e6a04b7d7097e6181790699a5cb06a1434
-
Filesize
173KB
MD55cba7dc418e8db2a08bce79e7625dccc
SHA19b1a2296f0a6a4faebf66388d228265924bb7985
SHA2567a7917673ae7f2d407cf25e2682f247a07ee5342a6931a32c1aef78c1db5b4c7
SHA51254c3a9c78e3a5583b7baca8b2583508e0ab49b301f38e05b97d3ec471b6fa633f3bca0d847824bc1cd3062636598c2e6a04b7d7097e6181790699a5cb06a1434
-
Filesize
11KB
MD5b9f89ca21fc45c0239c76c0bac696b49
SHA1b12e5a9bd464c047d29238d4b0133cb30a31fec3
SHA256c062738aa4da925f248d4a3556928b30862eda3d71590afb6a467741753561e2
SHA5120dd8c8622f9ffbb72107e6d6a74ae9448f69706fc61940a3d956aad7679b124ea43c2dad440e78e5f82f55e9817192ab057717bcd8d2ca4ee986e97f55ec7309
-
Filesize
11KB
MD5b9f89ca21fc45c0239c76c0bac696b49
SHA1b12e5a9bd464c047d29238d4b0133cb30a31fec3
SHA256c062738aa4da925f248d4a3556928b30862eda3d71590afb6a467741753561e2
SHA5120dd8c8622f9ffbb72107e6d6a74ae9448f69706fc61940a3d956aad7679b124ea43c2dad440e78e5f82f55e9817192ab057717bcd8d2ca4ee986e97f55ec7309
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf