Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
16/06/2023, 15:32
Static task
static1
General
-
Target
9c116ed59bb559a299cddf5d7a64be5bb1aae59b6f0c3ca6c6389c0a1d10a3b7.exe
-
Size
583KB
-
MD5
e6b64d43ff4532dd10d1a62f6b9842b2
-
SHA1
d43226ccc8ef7d35258bfa2443b11e1be53d1d17
-
SHA256
9c116ed59bb559a299cddf5d7a64be5bb1aae59b6f0c3ca6c6389c0a1d10a3b7
-
SHA512
e4d68f1842b66ceffe31de83a19563895430bccaa34bb018f32c5d192ec3d89e020edeadd6200dd2b0b6ce5c30f49098fe8fa203f35dadb63c79656b42c3e380
-
SSDEEP
12288:AMrUy90oWrX2AK0jRN28zAcZGCuq5tsROZbqZwCxWmiA0bMnph:ky5CX230NNccZZjLZvjAHph
Malware Config
Extracted
redline
dana
83.97.73.130:19061
-
auth_value
da2d1691db653e49676d799e1eae2673
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
grega
83.97.73.130:19061
-
auth_value
16e2fbc2847b2270b3f0679e2dd76c8d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g2140108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g2140108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g2140108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g2140108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g2140108.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 2532 x6523267.exe 2904 x5352883.exe 4052 f3946057.exe 3604 g2140108.exe 2712 h3045698.exe 3572 rugen.exe 3660 i5881543.exe 4400 rugen.exe 4428 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 4392 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g2140108.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9c116ed59bb559a299cddf5d7a64be5bb1aae59b6f0c3ca6c6389c0a1d10a3b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9c116ed59bb559a299cddf5d7a64be5bb1aae59b6f0c3ca6c6389c0a1d10a3b7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6523267.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6523267.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5352883.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5352883.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4136 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4052 f3946057.exe 4052 f3946057.exe 3604 g2140108.exe 3604 g2140108.exe 3660 i5881543.exe 3660 i5881543.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4052 f3946057.exe Token: SeDebugPrivilege 3604 g2140108.exe Token: SeDebugPrivilege 3660 i5881543.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 h3045698.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2532 2264 9c116ed59bb559a299cddf5d7a64be5bb1aae59b6f0c3ca6c6389c0a1d10a3b7.exe 66 PID 2264 wrote to memory of 2532 2264 9c116ed59bb559a299cddf5d7a64be5bb1aae59b6f0c3ca6c6389c0a1d10a3b7.exe 66 PID 2264 wrote to memory of 2532 2264 9c116ed59bb559a299cddf5d7a64be5bb1aae59b6f0c3ca6c6389c0a1d10a3b7.exe 66 PID 2532 wrote to memory of 2904 2532 x6523267.exe 67 PID 2532 wrote to memory of 2904 2532 x6523267.exe 67 PID 2532 wrote to memory of 2904 2532 x6523267.exe 67 PID 2904 wrote to memory of 4052 2904 x5352883.exe 68 PID 2904 wrote to memory of 4052 2904 x5352883.exe 68 PID 2904 wrote to memory of 4052 2904 x5352883.exe 68 PID 2904 wrote to memory of 3604 2904 x5352883.exe 70 PID 2904 wrote to memory of 3604 2904 x5352883.exe 70 PID 2532 wrote to memory of 2712 2532 x6523267.exe 71 PID 2532 wrote to memory of 2712 2532 x6523267.exe 71 PID 2532 wrote to memory of 2712 2532 x6523267.exe 71 PID 2712 wrote to memory of 3572 2712 h3045698.exe 72 PID 2712 wrote to memory of 3572 2712 h3045698.exe 72 PID 2712 wrote to memory of 3572 2712 h3045698.exe 72 PID 2264 wrote to memory of 3660 2264 9c116ed59bb559a299cddf5d7a64be5bb1aae59b6f0c3ca6c6389c0a1d10a3b7.exe 73 PID 2264 wrote to memory of 3660 2264 9c116ed59bb559a299cddf5d7a64be5bb1aae59b6f0c3ca6c6389c0a1d10a3b7.exe 73 PID 2264 wrote to memory of 3660 2264 9c116ed59bb559a299cddf5d7a64be5bb1aae59b6f0c3ca6c6389c0a1d10a3b7.exe 73 PID 3572 wrote to memory of 4136 3572 rugen.exe 75 PID 3572 wrote to memory of 4136 3572 rugen.exe 75 PID 3572 wrote to memory of 4136 3572 rugen.exe 75 PID 3572 wrote to memory of 2648 3572 rugen.exe 77 PID 3572 wrote to memory of 2648 3572 rugen.exe 77 PID 3572 wrote to memory of 2648 3572 rugen.exe 77 PID 2648 wrote to memory of 4768 2648 cmd.exe 79 PID 2648 wrote to memory of 4768 2648 cmd.exe 79 PID 2648 wrote to memory of 4768 2648 cmd.exe 79 PID 2648 wrote to memory of 4788 2648 cmd.exe 80 PID 2648 wrote to memory of 4788 2648 cmd.exe 80 PID 2648 wrote to memory of 4788 2648 cmd.exe 80 PID 2648 wrote to memory of 4804 2648 cmd.exe 81 PID 2648 wrote to memory of 4804 2648 cmd.exe 81 PID 2648 wrote to memory of 4804 2648 cmd.exe 81 PID 2648 wrote to memory of 2344 2648 cmd.exe 83 PID 2648 wrote to memory of 2344 2648 cmd.exe 83 PID 2648 wrote to memory of 2344 2648 cmd.exe 83 PID 2648 wrote to memory of 2068 2648 cmd.exe 82 PID 2648 wrote to memory of 2068 2648 cmd.exe 82 PID 2648 wrote to memory of 2068 2648 cmd.exe 82 PID 2648 wrote to memory of 4812 2648 cmd.exe 84 PID 2648 wrote to memory of 4812 2648 cmd.exe 84 PID 2648 wrote to memory of 4812 2648 cmd.exe 84 PID 3572 wrote to memory of 4392 3572 rugen.exe 86 PID 3572 wrote to memory of 4392 3572 rugen.exe 86 PID 3572 wrote to memory of 4392 3572 rugen.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c116ed59bb559a299cddf5d7a64be5bb1aae59b6f0c3ca6c6389c0a1d10a3b7.exe"C:\Users\Admin\AppData\Local\Temp\9c116ed59bb559a299cddf5d7a64be5bb1aae59b6f0c3ca6c6389c0a1d10a3b7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6523267.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6523267.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5352883.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5352883.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3946057.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3946057.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2140108.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2140108.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3045698.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3045698.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:4136
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:4788
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:4804
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:2068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2344
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:4812
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4392
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5881543.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5881543.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4400
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4428
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
267KB
MD5f6a0372a92af867d2637ae41b63520f5
SHA1cdf2e7c3eeecb582124827286a24ca2638a5cd3b
SHA2564ea6eb4a4a5b48c3edf7d7bc86e9d8d448295d875fe68e177ff0aead2a738cef
SHA5128099f52f4265890d91ec8d4894c1d7cadc6744b717c2f7d79a1513cdbaba0eafd78ef4ff93e3634e464d49cb23162441b37f89531e10ef8b4336cac2e04d0ec5
-
Filesize
267KB
MD5f6a0372a92af867d2637ae41b63520f5
SHA1cdf2e7c3eeecb582124827286a24ca2638a5cd3b
SHA2564ea6eb4a4a5b48c3edf7d7bc86e9d8d448295d875fe68e177ff0aead2a738cef
SHA5128099f52f4265890d91ec8d4894c1d7cadc6744b717c2f7d79a1513cdbaba0eafd78ef4ff93e3634e464d49cb23162441b37f89531e10ef8b4336cac2e04d0ec5
-
Filesize
377KB
MD51939749eb1760bb5decea4d47152fdcf
SHA16dbf7d416ed484e330da5e4127a9a749700ecac4
SHA256cdf708b18bb01e24c3deb99b181f81843d614d896738914fbf1977d094778f6b
SHA512816548b8c9f4a88dcb82f6772976b6f7061d9d4b420df8f24b4042efbf78e3a4c1a22e55b05d28dc3bd5d9710f115068ed48ba9b8a69c9b052e578aec7ae9867
-
Filesize
377KB
MD51939749eb1760bb5decea4d47152fdcf
SHA16dbf7d416ed484e330da5e4127a9a749700ecac4
SHA256cdf708b18bb01e24c3deb99b181f81843d614d896738914fbf1977d094778f6b
SHA512816548b8c9f4a88dcb82f6772976b6f7061d9d4b420df8f24b4042efbf78e3a4c1a22e55b05d28dc3bd5d9710f115068ed48ba9b8a69c9b052e578aec7ae9867
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
206KB
MD58d13f6ed7805ae2a7e9d4d8c460499a9
SHA157106e8497084c174bd18803533dc39aad7038b6
SHA2568c17e13ba0e298764346eb2789c4f5d1610a43365a952b5be984e94454b412d7
SHA5123bdecac35294eac2e476e04514e26f6b8d354b0a2da6dbc66e9d39d187333cf8c1852f8f100386046a035f6d8535d95b5cc488f842b25ab5fe1634194510bfbf
-
Filesize
206KB
MD58d13f6ed7805ae2a7e9d4d8c460499a9
SHA157106e8497084c174bd18803533dc39aad7038b6
SHA2568c17e13ba0e298764346eb2789c4f5d1610a43365a952b5be984e94454b412d7
SHA5123bdecac35294eac2e476e04514e26f6b8d354b0a2da6dbc66e9d39d187333cf8c1852f8f100386046a035f6d8535d95b5cc488f842b25ab5fe1634194510bfbf
-
Filesize
173KB
MD5956097570b2f8966a7edaf16064b2e63
SHA130db54a0ea435eb971646ceb350b6b469c801e97
SHA256267f51d9fa3beb74a6d032ccfe03b0a514bd44e839b1d7bb37a7231a6891c021
SHA512ea33c55f4d9931ef01a0032ddf31bfe93ef594a7e18d45562a5b4f1c400951f696acc64d07de4d51bd7861089c3788aee01b287e62835a9c42f4f3f8fdcbbd8f
-
Filesize
173KB
MD5956097570b2f8966a7edaf16064b2e63
SHA130db54a0ea435eb971646ceb350b6b469c801e97
SHA256267f51d9fa3beb74a6d032ccfe03b0a514bd44e839b1d7bb37a7231a6891c021
SHA512ea33c55f4d9931ef01a0032ddf31bfe93ef594a7e18d45562a5b4f1c400951f696acc64d07de4d51bd7861089c3788aee01b287e62835a9c42f4f3f8fdcbbd8f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf