Analysis
-
max time kernel
128s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2023, 10:14
Static task
static1
General
-
Target
a37bd6d99b34ac7961f6267ac1dc604aa007081801def5c7030ccceb34909648.exe
-
Size
583KB
-
MD5
9f6fcd9add791283591788e178c585f6
-
SHA1
55a3deb8a9d5de2685d8139eefcc233c6ba4e10f
-
SHA256
a37bd6d99b34ac7961f6267ac1dc604aa007081801def5c7030ccceb34909648
-
SHA512
6513255e9efd2f00d2e02f45c581c07d8e3ca254838df69d2165c275f9ddf55fed9cb0d71a731258ab79c2178e5f49f1cdaf9995e64bb0b99f57e7ca592817cb
-
SSDEEP
12288:tMrZy90MHR1g4XCq0hx7ecZY7XiUHJpVFRBJPqI+Zp/:ky9nOfhxq08iUppVFRvF+ZJ
Malware Config
Extracted
redline
dana
83.97.73.130:19061
-
auth_value
da2d1691db653e49676d799e1eae2673
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
joker
83.97.73.130:19061
-
auth_value
a98d303cc28bb3b32a23c59214ae3bc0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g5006152.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g5006152.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g5006152.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g5006152.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g5006152.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g5006152.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation h6286982.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 9 IoCs
pid Process 4456 x2045625.exe 3492 x1381430.exe 3616 f4293938.exe 1724 g5006152.exe 4872 h6286982.exe 4964 rugen.exe 3888 i0486439.exe 1472 rugen.exe 4804 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 3812 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g5006152.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a37bd6d99b34ac7961f6267ac1dc604aa007081801def5c7030ccceb34909648.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a37bd6d99b34ac7961f6267ac1dc604aa007081801def5c7030ccceb34909648.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x2045625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2045625.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1381430.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1381430.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3616 f4293938.exe 3616 f4293938.exe 1724 g5006152.exe 1724 g5006152.exe 3888 i0486439.exe 3888 i0486439.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3616 f4293938.exe Token: SeDebugPrivilege 1724 g5006152.exe Token: SeDebugPrivilege 3888 i0486439.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4872 h6286982.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1860 wrote to memory of 4456 1860 a37bd6d99b34ac7961f6267ac1dc604aa007081801def5c7030ccceb34909648.exe 82 PID 1860 wrote to memory of 4456 1860 a37bd6d99b34ac7961f6267ac1dc604aa007081801def5c7030ccceb34909648.exe 82 PID 1860 wrote to memory of 4456 1860 a37bd6d99b34ac7961f6267ac1dc604aa007081801def5c7030ccceb34909648.exe 82 PID 4456 wrote to memory of 3492 4456 x2045625.exe 83 PID 4456 wrote to memory of 3492 4456 x2045625.exe 83 PID 4456 wrote to memory of 3492 4456 x2045625.exe 83 PID 3492 wrote to memory of 3616 3492 x1381430.exe 84 PID 3492 wrote to memory of 3616 3492 x1381430.exe 84 PID 3492 wrote to memory of 3616 3492 x1381430.exe 84 PID 3492 wrote to memory of 1724 3492 x1381430.exe 88 PID 3492 wrote to memory of 1724 3492 x1381430.exe 88 PID 4456 wrote to memory of 4872 4456 x2045625.exe 92 PID 4456 wrote to memory of 4872 4456 x2045625.exe 92 PID 4456 wrote to memory of 4872 4456 x2045625.exe 92 PID 4872 wrote to memory of 4964 4872 h6286982.exe 93 PID 4872 wrote to memory of 4964 4872 h6286982.exe 93 PID 4872 wrote to memory of 4964 4872 h6286982.exe 93 PID 1860 wrote to memory of 3888 1860 a37bd6d99b34ac7961f6267ac1dc604aa007081801def5c7030ccceb34909648.exe 95 PID 1860 wrote to memory of 3888 1860 a37bd6d99b34ac7961f6267ac1dc604aa007081801def5c7030ccceb34909648.exe 95 PID 1860 wrote to memory of 3888 1860 a37bd6d99b34ac7961f6267ac1dc604aa007081801def5c7030ccceb34909648.exe 95 PID 4964 wrote to memory of 4596 4964 rugen.exe 97 PID 4964 wrote to memory of 4596 4964 rugen.exe 97 PID 4964 wrote to memory of 4596 4964 rugen.exe 97 PID 4964 wrote to memory of 3996 4964 rugen.exe 99 PID 4964 wrote to memory of 3996 4964 rugen.exe 99 PID 4964 wrote to memory of 3996 4964 rugen.exe 99 PID 3996 wrote to memory of 1260 3996 cmd.exe 101 PID 3996 wrote to memory of 1260 3996 cmd.exe 101 PID 3996 wrote to memory of 1260 3996 cmd.exe 101 PID 3996 wrote to memory of 2228 3996 cmd.exe 102 PID 3996 wrote to memory of 2228 3996 cmd.exe 102 PID 3996 wrote to memory of 2228 3996 cmd.exe 102 PID 3996 wrote to memory of 3392 3996 cmd.exe 103 PID 3996 wrote to memory of 3392 3996 cmd.exe 103 PID 3996 wrote to memory of 3392 3996 cmd.exe 103 PID 3996 wrote to memory of 4092 3996 cmd.exe 104 PID 3996 wrote to memory of 4092 3996 cmd.exe 104 PID 3996 wrote to memory of 4092 3996 cmd.exe 104 PID 3996 wrote to memory of 4668 3996 cmd.exe 105 PID 3996 wrote to memory of 4668 3996 cmd.exe 105 PID 3996 wrote to memory of 4668 3996 cmd.exe 105 PID 3996 wrote to memory of 3224 3996 cmd.exe 106 PID 3996 wrote to memory of 3224 3996 cmd.exe 106 PID 3996 wrote to memory of 3224 3996 cmd.exe 106 PID 4964 wrote to memory of 3812 4964 rugen.exe 108 PID 4964 wrote to memory of 3812 4964 rugen.exe 108 PID 4964 wrote to memory of 3812 4964 rugen.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\a37bd6d99b34ac7961f6267ac1dc604aa007081801def5c7030ccceb34909648.exe"C:\Users\Admin\AppData\Local\Temp\a37bd6d99b34ac7961f6267ac1dc604aa007081801def5c7030ccceb34909648.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2045625.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2045625.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1381430.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1381430.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4293938.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4293938.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5006152.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5006152.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6286982.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6286982.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:4596
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:2228
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:3392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4092
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:4668
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:3224
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3812
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0486439.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0486439.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:1472
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
267KB
MD536c7940a324be965ef54297db43c2229
SHA1a3aa5c1b41388af122152c862bb55b88d284e4b5
SHA25680994eb2450bb28524bc2e989f9b61140b804754621ac2e9b7df7a313730ebe1
SHA512337c64bba19356a3f824c17adc259c315473f833f3988731fdca09555eb66c3066dd8d7dcc52b45b06f74a3fb7150d883879bac25b1ba02e48d684ab50d3fe85
-
Filesize
267KB
MD536c7940a324be965ef54297db43c2229
SHA1a3aa5c1b41388af122152c862bb55b88d284e4b5
SHA25680994eb2450bb28524bc2e989f9b61140b804754621ac2e9b7df7a313730ebe1
SHA512337c64bba19356a3f824c17adc259c315473f833f3988731fdca09555eb66c3066dd8d7dcc52b45b06f74a3fb7150d883879bac25b1ba02e48d684ab50d3fe85
-
Filesize
377KB
MD5008924bc2f13b8835330488424835a52
SHA1952eb039d08cf5555b8686c7d54caea52f38235e
SHA25610393b88d592aa2984f3d7c9b6982d9b64f4c5dab43935f5e4277c8953035e65
SHA5124b4f1bded56c1ca5128f5dfa70d1c1a94b15fa164ca3282d8262928670e798ac5527b31e9e122295133f61cd0dccf99477f252bda3f4e499827d905d714be029
-
Filesize
377KB
MD5008924bc2f13b8835330488424835a52
SHA1952eb039d08cf5555b8686c7d54caea52f38235e
SHA25610393b88d592aa2984f3d7c9b6982d9b64f4c5dab43935f5e4277c8953035e65
SHA5124b4f1bded56c1ca5128f5dfa70d1c1a94b15fa164ca3282d8262928670e798ac5527b31e9e122295133f61cd0dccf99477f252bda3f4e499827d905d714be029
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
206KB
MD5a0770baddc9624001d31ac904fbddaea
SHA1fe92d41444e6c6cb433c903591cf9488cbc190de
SHA256d0b2ca2da2169c7d7389aeee52b4fe4a0f4921c1428bbd1d51ff54beac475c11
SHA512affe10ac42e433cede5d75cfbc9ccacc123ee7e183bd0db5787a6a3044f9bc75c2ab22d2c64a6bb240ab969bf2bf9308a2204aae0f64914be576562d37d59872
-
Filesize
206KB
MD5a0770baddc9624001d31ac904fbddaea
SHA1fe92d41444e6c6cb433c903591cf9488cbc190de
SHA256d0b2ca2da2169c7d7389aeee52b4fe4a0f4921c1428bbd1d51ff54beac475c11
SHA512affe10ac42e433cede5d75cfbc9ccacc123ee7e183bd0db5787a6a3044f9bc75c2ab22d2c64a6bb240ab969bf2bf9308a2204aae0f64914be576562d37d59872
-
Filesize
173KB
MD53a3d42a66b0c74e86664b7da1c074227
SHA191ddb292d5983620afe0ccab9552e059dcb6406e
SHA2569be7f82770185e5de078d66cd04c50b996985470a0865d3752b8683ec8361906
SHA5128fc7b94392c56c30a9d9a258e708b41a3c164ed31218e47bdcb9a9800738ea987211ebc29827f67210b18486022aa4a6eeaa146b4cfcdbb995b843adcd3c4f05
-
Filesize
173KB
MD53a3d42a66b0c74e86664b7da1c074227
SHA191ddb292d5983620afe0ccab9552e059dcb6406e
SHA2569be7f82770185e5de078d66cd04c50b996985470a0865d3752b8683ec8361906
SHA5128fc7b94392c56c30a9d9a258e708b41a3c164ed31218e47bdcb9a9800738ea987211ebc29827f67210b18486022aa4a6eeaa146b4cfcdbb995b843adcd3c4f05
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5