Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
16/06/2023, 09:19
Static task
static1
General
-
Target
80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1.exe
-
Size
583KB
-
MD5
772bb990f2c31f907080d1b9bd68e914
-
SHA1
b605e7bf686c3b64ee5e942583c6b85cc28c45db
-
SHA256
80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1
-
SHA512
2d341857ea2456d96417c409f539ccd723d5ddcd6b5ab2299fb6221bdea968a5bb91052a861b688080cfbe0e639338a11843ef45070bbc7354fc9589e8a39cb1
-
SSDEEP
12288:FMr1Gy90uUn4I8dkUPoV3fZGoeJQTVa10Q5Tb2PwkSPedibTO:uGyZQbYIcQZa1fT6PkPoibTO
Malware Config
Extracted
redline
dana
83.97.73.130:19061
-
auth_value
da2d1691db653e49676d799e1eae2673
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
joker
83.97.73.130:19061
-
auth_value
a98d303cc28bb3b32a23c59214ae3bc0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g6634670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g6634670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g6634670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g6634670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g6634670.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 1368 x6130092.exe 4044 x5609364.exe 4468 f1635046.exe 1484 g6634670.exe 3752 h0655373.exe 4752 rugen.exe 3168 i5376245.exe 2752 rugen.exe 5028 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 4968 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g6634670.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6130092.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5609364.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5609364.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6130092.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4432 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4468 f1635046.exe 4468 f1635046.exe 1484 g6634670.exe 1484 g6634670.exe 3168 i5376245.exe 3168 i5376245.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4468 f1635046.exe Token: SeDebugPrivilege 1484 g6634670.exe Token: SeDebugPrivilege 3168 i5376245.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3752 h0655373.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 652 wrote to memory of 1368 652 80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1.exe 66 PID 652 wrote to memory of 1368 652 80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1.exe 66 PID 652 wrote to memory of 1368 652 80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1.exe 66 PID 1368 wrote to memory of 4044 1368 x6130092.exe 67 PID 1368 wrote to memory of 4044 1368 x6130092.exe 67 PID 1368 wrote to memory of 4044 1368 x6130092.exe 67 PID 4044 wrote to memory of 4468 4044 x5609364.exe 68 PID 4044 wrote to memory of 4468 4044 x5609364.exe 68 PID 4044 wrote to memory of 4468 4044 x5609364.exe 68 PID 4044 wrote to memory of 1484 4044 x5609364.exe 70 PID 4044 wrote to memory of 1484 4044 x5609364.exe 70 PID 1368 wrote to memory of 3752 1368 x6130092.exe 71 PID 1368 wrote to memory of 3752 1368 x6130092.exe 71 PID 1368 wrote to memory of 3752 1368 x6130092.exe 71 PID 3752 wrote to memory of 4752 3752 h0655373.exe 72 PID 3752 wrote to memory of 4752 3752 h0655373.exe 72 PID 3752 wrote to memory of 4752 3752 h0655373.exe 72 PID 652 wrote to memory of 3168 652 80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1.exe 73 PID 652 wrote to memory of 3168 652 80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1.exe 73 PID 652 wrote to memory of 3168 652 80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1.exe 73 PID 4752 wrote to memory of 4432 4752 rugen.exe 75 PID 4752 wrote to memory of 4432 4752 rugen.exe 75 PID 4752 wrote to memory of 4432 4752 rugen.exe 75 PID 4752 wrote to memory of 4408 4752 rugen.exe 76 PID 4752 wrote to memory of 4408 4752 rugen.exe 76 PID 4752 wrote to memory of 4408 4752 rugen.exe 76 PID 4408 wrote to memory of 3604 4408 cmd.exe 79 PID 4408 wrote to memory of 3604 4408 cmd.exe 79 PID 4408 wrote to memory of 3604 4408 cmd.exe 79 PID 4408 wrote to memory of 3360 4408 cmd.exe 80 PID 4408 wrote to memory of 3360 4408 cmd.exe 80 PID 4408 wrote to memory of 3360 4408 cmd.exe 80 PID 4408 wrote to memory of 4832 4408 cmd.exe 81 PID 4408 wrote to memory of 4832 4408 cmd.exe 81 PID 4408 wrote to memory of 4832 4408 cmd.exe 81 PID 4408 wrote to memory of 2784 4408 cmd.exe 82 PID 4408 wrote to memory of 2784 4408 cmd.exe 82 PID 4408 wrote to memory of 2784 4408 cmd.exe 82 PID 4408 wrote to memory of 4100 4408 cmd.exe 83 PID 4408 wrote to memory of 4100 4408 cmd.exe 83 PID 4408 wrote to memory of 4100 4408 cmd.exe 83 PID 4408 wrote to memory of 2772 4408 cmd.exe 84 PID 4408 wrote to memory of 2772 4408 cmd.exe 84 PID 4408 wrote to memory of 2772 4408 cmd.exe 84 PID 4752 wrote to memory of 4968 4752 rugen.exe 86 PID 4752 wrote to memory of 4968 4752 rugen.exe 86 PID 4752 wrote to memory of 4968 4752 rugen.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1.exe"C:\Users\Admin\AppData\Local\Temp\80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6130092.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6130092.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5609364.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5609364.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1635046.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1635046.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6634670.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6634670.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0655373.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0655373.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:4432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:3360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:4832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2784
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:4100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:2772
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4968
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5376245.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5376245.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:2752
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:5028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5ea5fd86592cedb5d506c4301b20bab8d
SHA10b6e1b2b3b7495d41c7c68d6e784422e21bea171
SHA256379cff758e57061da32851f5d1ec8c004c25e9eb791f05b5b0411488fabcb82f
SHA512ed2926714a88ec565bb0563e30f8b68fbf89d37e2fd726be127b2619f02ecfee5a07a6f9f6888ebb1aefc81ffea7a4a237921305e6e1e1a96387d56ecbdff2aa
-
Filesize
205KB
MD5ea5fd86592cedb5d506c4301b20bab8d
SHA10b6e1b2b3b7495d41c7c68d6e784422e21bea171
SHA256379cff758e57061da32851f5d1ec8c004c25e9eb791f05b5b0411488fabcb82f
SHA512ed2926714a88ec565bb0563e30f8b68fbf89d37e2fd726be127b2619f02ecfee5a07a6f9f6888ebb1aefc81ffea7a4a237921305e6e1e1a96387d56ecbdff2aa
-
Filesize
205KB
MD5ea5fd86592cedb5d506c4301b20bab8d
SHA10b6e1b2b3b7495d41c7c68d6e784422e21bea171
SHA256379cff758e57061da32851f5d1ec8c004c25e9eb791f05b5b0411488fabcb82f
SHA512ed2926714a88ec565bb0563e30f8b68fbf89d37e2fd726be127b2619f02ecfee5a07a6f9f6888ebb1aefc81ffea7a4a237921305e6e1e1a96387d56ecbdff2aa
-
Filesize
205KB
MD5ea5fd86592cedb5d506c4301b20bab8d
SHA10b6e1b2b3b7495d41c7c68d6e784422e21bea171
SHA256379cff758e57061da32851f5d1ec8c004c25e9eb791f05b5b0411488fabcb82f
SHA512ed2926714a88ec565bb0563e30f8b68fbf89d37e2fd726be127b2619f02ecfee5a07a6f9f6888ebb1aefc81ffea7a4a237921305e6e1e1a96387d56ecbdff2aa
-
Filesize
205KB
MD5ea5fd86592cedb5d506c4301b20bab8d
SHA10b6e1b2b3b7495d41c7c68d6e784422e21bea171
SHA256379cff758e57061da32851f5d1ec8c004c25e9eb791f05b5b0411488fabcb82f
SHA512ed2926714a88ec565bb0563e30f8b68fbf89d37e2fd726be127b2619f02ecfee5a07a6f9f6888ebb1aefc81ffea7a4a237921305e6e1e1a96387d56ecbdff2aa
-
Filesize
267KB
MD5e5f3651e9983835ee979dd7714d3bc7c
SHA17b1a18214f81ccc3bdc3985296278d9575f0c85f
SHA256d9ab5e1be0994c88846d7383fa89e99d56ea08a4a23ed353e497c55966f5b2d3
SHA512196d924b2f1d763e08da316d85588e751e9596f6718500b1fd8417e94f2738ca89998310ae71bdf282e7b6f0a41c300bacdb615681a4420b2d5b8ae523a71992
-
Filesize
267KB
MD5e5f3651e9983835ee979dd7714d3bc7c
SHA17b1a18214f81ccc3bdc3985296278d9575f0c85f
SHA256d9ab5e1be0994c88846d7383fa89e99d56ea08a4a23ed353e497c55966f5b2d3
SHA512196d924b2f1d763e08da316d85588e751e9596f6718500b1fd8417e94f2738ca89998310ae71bdf282e7b6f0a41c300bacdb615681a4420b2d5b8ae523a71992
-
Filesize
377KB
MD517472448f0f8bdc8ffe0ba307ea0adc8
SHA1f184457102c345cabeb5f2b72b028b9035a3391f
SHA256c9466f76831d1ad6a907d3e1570437f5b6445ee4f93a6e9fdeeaef04148c9a9d
SHA512624ec52b4524119d5e188cc5bb79c0fb7d4ab63f716d34c0fcb12be1d03787d6774c7a6882233b870a6e2879f0b42151740a3699414676b03294c7dd3bc2e14a
-
Filesize
377KB
MD517472448f0f8bdc8ffe0ba307ea0adc8
SHA1f184457102c345cabeb5f2b72b028b9035a3391f
SHA256c9466f76831d1ad6a907d3e1570437f5b6445ee4f93a6e9fdeeaef04148c9a9d
SHA512624ec52b4524119d5e188cc5bb79c0fb7d4ab63f716d34c0fcb12be1d03787d6774c7a6882233b870a6e2879f0b42151740a3699414676b03294c7dd3bc2e14a
-
Filesize
205KB
MD5ea5fd86592cedb5d506c4301b20bab8d
SHA10b6e1b2b3b7495d41c7c68d6e784422e21bea171
SHA256379cff758e57061da32851f5d1ec8c004c25e9eb791f05b5b0411488fabcb82f
SHA512ed2926714a88ec565bb0563e30f8b68fbf89d37e2fd726be127b2619f02ecfee5a07a6f9f6888ebb1aefc81ffea7a4a237921305e6e1e1a96387d56ecbdff2aa
-
Filesize
205KB
MD5ea5fd86592cedb5d506c4301b20bab8d
SHA10b6e1b2b3b7495d41c7c68d6e784422e21bea171
SHA256379cff758e57061da32851f5d1ec8c004c25e9eb791f05b5b0411488fabcb82f
SHA512ed2926714a88ec565bb0563e30f8b68fbf89d37e2fd726be127b2619f02ecfee5a07a6f9f6888ebb1aefc81ffea7a4a237921305e6e1e1a96387d56ecbdff2aa
-
Filesize
206KB
MD5d412e7c0b5f9f501591b25eb7128cfca
SHA132bb10f0501cd74f3f91f7d75bdec3a1bb105d74
SHA2563ba68505b7871d0d1e184b5cf32c0f5ba4c212fd8838d4dce109bff281a7e126
SHA512f948ab11ad760cfc7bd3a210d45bcf7c6275a5bdfcd2e35657366fa00fcc5fa374bef7f50c4ecf1d6fb5ebbff417de778008fe1fefc6dd257a402e2b38b8d974
-
Filesize
206KB
MD5d412e7c0b5f9f501591b25eb7128cfca
SHA132bb10f0501cd74f3f91f7d75bdec3a1bb105d74
SHA2563ba68505b7871d0d1e184b5cf32c0f5ba4c212fd8838d4dce109bff281a7e126
SHA512f948ab11ad760cfc7bd3a210d45bcf7c6275a5bdfcd2e35657366fa00fcc5fa374bef7f50c4ecf1d6fb5ebbff417de778008fe1fefc6dd257a402e2b38b8d974
-
Filesize
173KB
MD598bc69e08cf1909cdd060981dbfb3231
SHA112f882571a1dacdf99a90fe3248f96db0f9a4cd2
SHA256afe933376246345e22672951efb48705658a3a5e8d4e27ff36359152fe569fc3
SHA5127e110b525453a355d29ac1cc8c843e7a9492d35a65f072a0de0bd0ba75e1105b99abd1b7878d5562ecd4c6f7025f0cc094bd9851e96820e421f05f24e733194b
-
Filesize
173KB
MD598bc69e08cf1909cdd060981dbfb3231
SHA112f882571a1dacdf99a90fe3248f96db0f9a4cd2
SHA256afe933376246345e22672951efb48705658a3a5e8d4e27ff36359152fe569fc3
SHA5127e110b525453a355d29ac1cc8c843e7a9492d35a65f072a0de0bd0ba75e1105b99abd1b7878d5562ecd4c6f7025f0cc094bd9851e96820e421f05f24e733194b
-
Filesize
11KB
MD585872877fef37e8c1544b32fc1cbe1ec
SHA1b89f7ed8c926b2b968c34a2aa767634be66ece21
SHA256ca85cf2f5370b634028cfee3e121a5c2453b78f513a0e4198362286d85eb5a66
SHA5128fd87863c4c04b65b6a50eb8c8a0420140ad2c05b02924f85df9f0bb2a360ee44fe8d1b1841f4e6b16e86b5a9de722f7eba74800082973b720a46e98c4005622
-
Filesize
11KB
MD585872877fef37e8c1544b32fc1cbe1ec
SHA1b89f7ed8c926b2b968c34a2aa767634be66ece21
SHA256ca85cf2f5370b634028cfee3e121a5c2453b78f513a0e4198362286d85eb5a66
SHA5128fd87863c4c04b65b6a50eb8c8a0420140ad2c05b02924f85df9f0bb2a360ee44fe8d1b1841f4e6b16e86b5a9de722f7eba74800082973b720a46e98c4005622
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf