Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
16/06/2023, 15:53
Static task
static1
General
-
Target
05e598017633571946677f40b56275d81c4f591428fe51a7c77e8cba53a97218.exe
-
Size
583KB
-
MD5
d51224c90f24410eea55e3c47773289c
-
SHA1
3a13a8adbaf0a273e7ffc1ac0370c1a754b7f950
-
SHA256
05e598017633571946677f40b56275d81c4f591428fe51a7c77e8cba53a97218
-
SHA512
e47c7018f34d77f3e3f697b0d1d01dbc1e5d594a87546a6f018ed638ad349274f2384a4c827965611c053a6f2e4da722aba28b4a3fe886c450254e08bc0a20ce
-
SSDEEP
12288:5Mrdy90XhMagpXyIoTm54VShfekHZVgT+yE2zvcLT:0yASPyxm54VvkHZVgT+yEuELT
Malware Config
Extracted
redline
dana
83.97.73.130:19061
-
auth_value
da2d1691db653e49676d799e1eae2673
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
grega
83.97.73.130:19061
-
auth_value
16e2fbc2847b2270b3f0679e2dd76c8d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g3261165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g3261165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g3261165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g3261165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g3261165.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 4448 x9679699.exe 4900 x0787419.exe 2244 f7821556.exe 1996 g3261165.exe 4620 h4016223.exe 4732 rugen.exe 2496 i0127289.exe 708 rugen.exe 4808 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 4908 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g3261165.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9679699.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9679699.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0787419.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0787419.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 05e598017633571946677f40b56275d81c4f591428fe51a7c77e8cba53a97218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 05e598017633571946677f40b56275d81c4f591428fe51a7c77e8cba53a97218.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3640 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2244 f7821556.exe 2244 f7821556.exe 1996 g3261165.exe 1996 g3261165.exe 2496 i0127289.exe 2496 i0127289.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2244 f7821556.exe Token: SeDebugPrivilege 1996 g3261165.exe Token: SeDebugPrivilege 2496 i0127289.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4620 h4016223.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3532 wrote to memory of 4448 3532 05e598017633571946677f40b56275d81c4f591428fe51a7c77e8cba53a97218.exe 66 PID 3532 wrote to memory of 4448 3532 05e598017633571946677f40b56275d81c4f591428fe51a7c77e8cba53a97218.exe 66 PID 3532 wrote to memory of 4448 3532 05e598017633571946677f40b56275d81c4f591428fe51a7c77e8cba53a97218.exe 66 PID 4448 wrote to memory of 4900 4448 x9679699.exe 67 PID 4448 wrote to memory of 4900 4448 x9679699.exe 67 PID 4448 wrote to memory of 4900 4448 x9679699.exe 67 PID 4900 wrote to memory of 2244 4900 x0787419.exe 68 PID 4900 wrote to memory of 2244 4900 x0787419.exe 68 PID 4900 wrote to memory of 2244 4900 x0787419.exe 68 PID 4900 wrote to memory of 1996 4900 x0787419.exe 70 PID 4900 wrote to memory of 1996 4900 x0787419.exe 70 PID 4448 wrote to memory of 4620 4448 x9679699.exe 71 PID 4448 wrote to memory of 4620 4448 x9679699.exe 71 PID 4448 wrote to memory of 4620 4448 x9679699.exe 71 PID 4620 wrote to memory of 4732 4620 h4016223.exe 72 PID 4620 wrote to memory of 4732 4620 h4016223.exe 72 PID 4620 wrote to memory of 4732 4620 h4016223.exe 72 PID 3532 wrote to memory of 2496 3532 05e598017633571946677f40b56275d81c4f591428fe51a7c77e8cba53a97218.exe 73 PID 3532 wrote to memory of 2496 3532 05e598017633571946677f40b56275d81c4f591428fe51a7c77e8cba53a97218.exe 73 PID 3532 wrote to memory of 2496 3532 05e598017633571946677f40b56275d81c4f591428fe51a7c77e8cba53a97218.exe 73 PID 4732 wrote to memory of 3640 4732 rugen.exe 75 PID 4732 wrote to memory of 3640 4732 rugen.exe 75 PID 4732 wrote to memory of 3640 4732 rugen.exe 75 PID 4732 wrote to memory of 3676 4732 rugen.exe 77 PID 4732 wrote to memory of 3676 4732 rugen.exe 77 PID 4732 wrote to memory of 3676 4732 rugen.exe 77 PID 3676 wrote to memory of 1376 3676 cmd.exe 79 PID 3676 wrote to memory of 1376 3676 cmd.exe 79 PID 3676 wrote to memory of 1376 3676 cmd.exe 79 PID 3676 wrote to memory of 1880 3676 cmd.exe 80 PID 3676 wrote to memory of 1880 3676 cmd.exe 80 PID 3676 wrote to memory of 1880 3676 cmd.exe 80 PID 3676 wrote to memory of 2988 3676 cmd.exe 81 PID 3676 wrote to memory of 2988 3676 cmd.exe 81 PID 3676 wrote to memory of 2988 3676 cmd.exe 81 PID 3676 wrote to memory of 2184 3676 cmd.exe 82 PID 3676 wrote to memory of 2184 3676 cmd.exe 82 PID 3676 wrote to memory of 2184 3676 cmd.exe 82 PID 3676 wrote to memory of 4344 3676 cmd.exe 83 PID 3676 wrote to memory of 4344 3676 cmd.exe 83 PID 3676 wrote to memory of 4344 3676 cmd.exe 83 PID 3676 wrote to memory of 4348 3676 cmd.exe 84 PID 3676 wrote to memory of 4348 3676 cmd.exe 84 PID 3676 wrote to memory of 4348 3676 cmd.exe 84 PID 4732 wrote to memory of 4908 4732 rugen.exe 86 PID 4732 wrote to memory of 4908 4732 rugen.exe 86 PID 4732 wrote to memory of 4908 4732 rugen.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\05e598017633571946677f40b56275d81c4f591428fe51a7c77e8cba53a97218.exe"C:\Users\Admin\AppData\Local\Temp\05e598017633571946677f40b56275d81c4f591428fe51a7c77e8cba53a97218.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9679699.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9679699.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0787419.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0787419.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7821556.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7821556.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3261165.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3261165.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4016223.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4016223.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:3640
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1376
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:1880
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:2988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2184
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:4344
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:4348
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4908
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0127289.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0127289.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:708
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
267KB
MD5851eba4171fdeaab24617d3ace93b6a1
SHA1948b6b438a4c92369806dd8fadc60d34bd15647b
SHA2564f30e81c7175a79087dc44809b813492d6632e8cf3a8ccc8d347a27b8c139dcf
SHA5121cffb3c5010153cea2178131c8e9be2ef6cc52b7e636b71c58ca28fb8ec118ad699067f7e0d3acc3c41d86d60b798bc0fe35d4a433690915241dfcc37a0964c9
-
Filesize
267KB
MD5851eba4171fdeaab24617d3ace93b6a1
SHA1948b6b438a4c92369806dd8fadc60d34bd15647b
SHA2564f30e81c7175a79087dc44809b813492d6632e8cf3a8ccc8d347a27b8c139dcf
SHA5121cffb3c5010153cea2178131c8e9be2ef6cc52b7e636b71c58ca28fb8ec118ad699067f7e0d3acc3c41d86d60b798bc0fe35d4a433690915241dfcc37a0964c9
-
Filesize
377KB
MD5105066962c018398cebc37f4b1bc0ee1
SHA1b79b7651cf6f9afb170e7b92be748db8d97fe1cc
SHA256f6b12460cea707f843f0ea670191a044f9dcc41816a52e32e42cc9ec7c5c2b5a
SHA512eb059275f81dc8a5fdf06bba25ccd0ab9532f0a2c7228c755b56cb3ae63af5384f8d0ac8906f2aeb416111ffc7375f2b92da2c9d8a8290ad83ce701696a5d8d3
-
Filesize
377KB
MD5105066962c018398cebc37f4b1bc0ee1
SHA1b79b7651cf6f9afb170e7b92be748db8d97fe1cc
SHA256f6b12460cea707f843f0ea670191a044f9dcc41816a52e32e42cc9ec7c5c2b5a
SHA512eb059275f81dc8a5fdf06bba25ccd0ab9532f0a2c7228c755b56cb3ae63af5384f8d0ac8906f2aeb416111ffc7375f2b92da2c9d8a8290ad83ce701696a5d8d3
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
206KB
MD53dd8aacc2995cc64fdcb2d36f2f4ba6d
SHA13a37f7d5ccda20619a5975375853d5ae1c46032b
SHA256c798e088f145eac0b9b7cfa726618be14dbaaada7de9df782a212ed5dcea01d0
SHA512c331cf4a5a67183b4ef7dd7228c95667d5acf6e778e6431bd712d94cd1e384ed2c9cb41d26efd8dc0166a59d6e0b2acde535b91d9a300f399d8f2f357c196eb8
-
Filesize
206KB
MD53dd8aacc2995cc64fdcb2d36f2f4ba6d
SHA13a37f7d5ccda20619a5975375853d5ae1c46032b
SHA256c798e088f145eac0b9b7cfa726618be14dbaaada7de9df782a212ed5dcea01d0
SHA512c331cf4a5a67183b4ef7dd7228c95667d5acf6e778e6431bd712d94cd1e384ed2c9cb41d26efd8dc0166a59d6e0b2acde535b91d9a300f399d8f2f357c196eb8
-
Filesize
173KB
MD58a599f1084f909ee73996804f4e823da
SHA12f3c2e6596c110df996568dd28025dda1414cc7b
SHA25665ea22511c6208bc7deb6a7830739c5e533b26896e2ec65e94bb14bfac6a675a
SHA51236b703a947f12b1f31f136e5a64e5c7f4fc960e9cba3b9e903e8f6f74d11d733faf16dcad69586c1dfaa245622426a7717a69fae238b8687b6f64fd84b5748ce
-
Filesize
173KB
MD58a599f1084f909ee73996804f4e823da
SHA12f3c2e6596c110df996568dd28025dda1414cc7b
SHA25665ea22511c6208bc7deb6a7830739c5e533b26896e2ec65e94bb14bfac6a675a
SHA51236b703a947f12b1f31f136e5a64e5c7f4fc960e9cba3b9e903e8f6f74d11d733faf16dcad69586c1dfaa245622426a7717a69fae238b8687b6f64fd84b5748ce
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf