Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
2f8479aaac4ec820acbe2e67b9189210d6492fe8b4fc8a81d29d24a37bc4d79b.exe
Resource
win10v2004-20230824-en
General
-
Target
2f8479aaac4ec820acbe2e67b9189210d6492fe8b4fc8a81d29d24a37bc4d79b.exe
-
Size
704KB
-
MD5
188fba9501356984e29ae27401847b08
-
SHA1
dce6220187b281143273ad60b483cb47b6d53a29
-
SHA256
2f8479aaac4ec820acbe2e67b9189210d6492fe8b4fc8a81d29d24a37bc4d79b
-
SHA512
44db0b110dca724efc70cacd228ab112d843ff27e0e351bc53b3d2742eee1fc6cf83e29885eb878deb2e4d7b61873794da623f02d3784ec859ebf856a23514d0
-
SSDEEP
12288:jMrFy90Beqv2wGYlepJQXDHrhilQJjp7xuIH8cA44RQ8ns/d2p+:GygL2wIJOD9ilQ/NuI5asVN
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
jaja
77.91.124.73:19071
-
auth_value
3670179d176ca399ed08e7914610b43c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023010-28.dat healer behavioral1/files/0x0007000000023010-27.dat healer behavioral1/memory/4280-29-0x0000000000800000-0x000000000080A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g6739280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g6739280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g6739280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g6739280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g6739280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g6739280.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 764 x6344674.exe 1588 x4400329.exe 2324 x3019898.exe 4280 g6739280.exe 3704 h0280278.exe 4072 saves.exe 3912 i4918822.exe 3936 saves.exe 3268 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 1800 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g6739280.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f8479aaac4ec820acbe2e67b9189210d6492fe8b4fc8a81d29d24a37bc4d79b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6344674.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4400329.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x3019898.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{B10912C9-ADD0-47D3-8156-BDA18C96ED28}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1664 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4280 g6739280.exe 4280 g6739280.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4280 g6739280.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4632 wrote to memory of 764 4632 2f8479aaac4ec820acbe2e67b9189210d6492fe8b4fc8a81d29d24a37bc4d79b.exe 84 PID 4632 wrote to memory of 764 4632 2f8479aaac4ec820acbe2e67b9189210d6492fe8b4fc8a81d29d24a37bc4d79b.exe 84 PID 4632 wrote to memory of 764 4632 2f8479aaac4ec820acbe2e67b9189210d6492fe8b4fc8a81d29d24a37bc4d79b.exe 84 PID 764 wrote to memory of 1588 764 x6344674.exe 85 PID 764 wrote to memory of 1588 764 x6344674.exe 85 PID 764 wrote to memory of 1588 764 x6344674.exe 85 PID 1588 wrote to memory of 2324 1588 x4400329.exe 86 PID 1588 wrote to memory of 2324 1588 x4400329.exe 86 PID 1588 wrote to memory of 2324 1588 x4400329.exe 86 PID 2324 wrote to memory of 4280 2324 x3019898.exe 87 PID 2324 wrote to memory of 4280 2324 x3019898.exe 87 PID 2324 wrote to memory of 3704 2324 x3019898.exe 91 PID 2324 wrote to memory of 3704 2324 x3019898.exe 91 PID 2324 wrote to memory of 3704 2324 x3019898.exe 91 PID 3704 wrote to memory of 4072 3704 h0280278.exe 92 PID 3704 wrote to memory of 4072 3704 h0280278.exe 92 PID 3704 wrote to memory of 4072 3704 h0280278.exe 92 PID 1588 wrote to memory of 3912 1588 x4400329.exe 93 PID 1588 wrote to memory of 3912 1588 x4400329.exe 93 PID 1588 wrote to memory of 3912 1588 x4400329.exe 93 PID 4072 wrote to memory of 1664 4072 saves.exe 94 PID 4072 wrote to memory of 1664 4072 saves.exe 94 PID 4072 wrote to memory of 1664 4072 saves.exe 94 PID 4072 wrote to memory of 2936 4072 saves.exe 96 PID 4072 wrote to memory of 2936 4072 saves.exe 96 PID 4072 wrote to memory of 2936 4072 saves.exe 96 PID 2936 wrote to memory of 5048 2936 cmd.exe 98 PID 2936 wrote to memory of 5048 2936 cmd.exe 98 PID 2936 wrote to memory of 5048 2936 cmd.exe 98 PID 2936 wrote to memory of 2000 2936 cmd.exe 99 PID 2936 wrote to memory of 2000 2936 cmd.exe 99 PID 2936 wrote to memory of 2000 2936 cmd.exe 99 PID 2936 wrote to memory of 1428 2936 cmd.exe 100 PID 2936 wrote to memory of 1428 2936 cmd.exe 100 PID 2936 wrote to memory of 1428 2936 cmd.exe 100 PID 2936 wrote to memory of 644 2936 cmd.exe 101 PID 2936 wrote to memory of 644 2936 cmd.exe 101 PID 2936 wrote to memory of 644 2936 cmd.exe 101 PID 2936 wrote to memory of 1688 2936 cmd.exe 102 PID 2936 wrote to memory of 1688 2936 cmd.exe 102 PID 2936 wrote to memory of 1688 2936 cmd.exe 102 PID 2936 wrote to memory of 872 2936 cmd.exe 103 PID 2936 wrote to memory of 872 2936 cmd.exe 103 PID 2936 wrote to memory of 872 2936 cmd.exe 103 PID 4072 wrote to memory of 1800 4072 saves.exe 106 PID 4072 wrote to memory of 1800 4072 saves.exe 106 PID 4072 wrote to memory of 1800 4072 saves.exe 106
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:2224
-
C:\Users\Admin\AppData\Local\Temp\2f8479aaac4ec820acbe2e67b9189210d6492fe8b4fc8a81d29d24a37bc4d79b.exe"C:\Users\Admin\AppData\Local\Temp\2f8479aaac4ec820acbe2e67b9189210d6492fe8b4fc8a81d29d24a37bc4d79b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6344674.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6344674.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4400329.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4400329.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3019898.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3019898.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6739280.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6739280.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0280278.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0280278.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:5048
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2000
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:1428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:872
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1800
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4918822.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4918822.exe4⤵
- Executes dropped EXE
PID:3912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3936
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3268
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD59a53807fb5e73d43261cb593d86b0351
SHA17dce8578b4d1860890922db27be9d3d7f92d02dd
SHA256919e26c83e4276217c8c44c40fcbfb8f13ca47dfb2c19d1e59385647654d401c
SHA5125b03fafba5f43f0c5c99b4f9222c941f28c538502986ffdf4a8fd61e4b4d98d258876d503b6364dff91c887a7472efb4a83d43deb085255c7341380d2c72622f
-
Filesize
598KB
MD59a53807fb5e73d43261cb593d86b0351
SHA17dce8578b4d1860890922db27be9d3d7f92d02dd
SHA256919e26c83e4276217c8c44c40fcbfb8f13ca47dfb2c19d1e59385647654d401c
SHA5125b03fafba5f43f0c5c99b4f9222c941f28c538502986ffdf4a8fd61e4b4d98d258876d503b6364dff91c887a7472efb4a83d43deb085255c7341380d2c72622f
-
Filesize
432KB
MD5525ad2918d7476dd3360884e19488fb8
SHA1d90ef17687d5bd03e5f874f74f0581c7abaefe5c
SHA2561e702dde6708dc000162800e9410058cef19a4816729c620a41ff99a81862390
SHA512b63d7d0fe8608316aaf90ed072831c7cbf819f613b898c8d4f9df2eeee53b712eeb8a90b11f8f6c79b818eede55978114d0cb4cced4ba3e970c104c570a151ce
-
Filesize
432KB
MD5525ad2918d7476dd3360884e19488fb8
SHA1d90ef17687d5bd03e5f874f74f0581c7abaefe5c
SHA2561e702dde6708dc000162800e9410058cef19a4816729c620a41ff99a81862390
SHA512b63d7d0fe8608316aaf90ed072831c7cbf819f613b898c8d4f9df2eeee53b712eeb8a90b11f8f6c79b818eede55978114d0cb4cced4ba3e970c104c570a151ce
-
Filesize
174KB
MD596becd1b53e0e88643cbc3d3d11a4f3f
SHA135865a6c4682f5fbb6a5143c03a5042a92b0e162
SHA256ed5f6bde4fc0fc751ec038abf61d786f1cec28d15c8cadb34b10968e4f1dff38
SHA512bb37409215f7a24a2b6a011b66a1d96a95bfb21e31c654aaccae7aa15badcde629a73b0fd3945288775a31ce146a0ac18816ef4d83f937eca4c6bc27ff0bad16
-
Filesize
174KB
MD596becd1b53e0e88643cbc3d3d11a4f3f
SHA135865a6c4682f5fbb6a5143c03a5042a92b0e162
SHA256ed5f6bde4fc0fc751ec038abf61d786f1cec28d15c8cadb34b10968e4f1dff38
SHA512bb37409215f7a24a2b6a011b66a1d96a95bfb21e31c654aaccae7aa15badcde629a73b0fd3945288775a31ce146a0ac18816ef4d83f937eca4c6bc27ff0bad16
-
Filesize
276KB
MD5e0b533fc887afaa92b95bcd4b47db6c7
SHA181d993b16fb0fc7119458bcf3d8d5e5fb405dd52
SHA2560e08007b55129771ed3cf0166118a7b47b088da63da90058515def869b13fe70
SHA512221892f348b12f8d18d4d442bf9476c2b29e8ad26b319b9b0e4d31d4ad57eef6e4ce4e75078e77e752b2ba1075c4667fa14e4d5fb1fa6c153f8c683ba0990c26
-
Filesize
276KB
MD5e0b533fc887afaa92b95bcd4b47db6c7
SHA181d993b16fb0fc7119458bcf3d8d5e5fb405dd52
SHA2560e08007b55129771ed3cf0166118a7b47b088da63da90058515def869b13fe70
SHA512221892f348b12f8d18d4d442bf9476c2b29e8ad26b319b9b0e4d31d4ad57eef6e4ce4e75078e77e752b2ba1075c4667fa14e4d5fb1fa6c153f8c683ba0990c26
-
Filesize
14KB
MD5ccb829b7df82661333c5ffd5531fc025
SHA1d47887636f89598c0069c1b313fa51f7c51ea976
SHA25604e914949c21fc5bb205a04e29818eb7d751f690f0a3d19239b6505decac44bb
SHA51212a00325ff46d0f256a30c844b2184ec0e67a1405f26227b0d3f95132086af7ed4bcfaccb51b205da3b23d7ccdca09373295818def7208230f6eeb6585b78557
-
Filesize
14KB
MD5ccb829b7df82661333c5ffd5531fc025
SHA1d47887636f89598c0069c1b313fa51f7c51ea976
SHA25604e914949c21fc5bb205a04e29818eb7d751f690f0a3d19239b6505decac44bb
SHA51212a00325ff46d0f256a30c844b2184ec0e67a1405f26227b0d3f95132086af7ed4bcfaccb51b205da3b23d7ccdca09373295818def7208230f6eeb6585b78557
-
Filesize
320KB
MD5dfb9c9624abf0f1183e824a29e17d65c
SHA1a0e4a16fbf4d7ae108160489fbe00f7854e4f1e2
SHA25626dc059112fd8bfffbc669fccc8591aa2eb3d0b922b4c7c5c51d18b1ce686b3f
SHA512776580545a6c2a8f69a7c9fb67477e2c561282c4b8d784a55fe6c357893c6f20fea1c18af87f8bbd087061f6ce89a50dddaecd99c12da486cd8910576b33549e
-
Filesize
320KB
MD5dfb9c9624abf0f1183e824a29e17d65c
SHA1a0e4a16fbf4d7ae108160489fbe00f7854e4f1e2
SHA25626dc059112fd8bfffbc669fccc8591aa2eb3d0b922b4c7c5c51d18b1ce686b3f
SHA512776580545a6c2a8f69a7c9fb67477e2c561282c4b8d784a55fe6c357893c6f20fea1c18af87f8bbd087061f6ce89a50dddaecd99c12da486cd8910576b33549e
-
Filesize
320KB
MD5dfb9c9624abf0f1183e824a29e17d65c
SHA1a0e4a16fbf4d7ae108160489fbe00f7854e4f1e2
SHA25626dc059112fd8bfffbc669fccc8591aa2eb3d0b922b4c7c5c51d18b1ce686b3f
SHA512776580545a6c2a8f69a7c9fb67477e2c561282c4b8d784a55fe6c357893c6f20fea1c18af87f8bbd087061f6ce89a50dddaecd99c12da486cd8910576b33549e
-
Filesize
320KB
MD5dfb9c9624abf0f1183e824a29e17d65c
SHA1a0e4a16fbf4d7ae108160489fbe00f7854e4f1e2
SHA25626dc059112fd8bfffbc669fccc8591aa2eb3d0b922b4c7c5c51d18b1ce686b3f
SHA512776580545a6c2a8f69a7c9fb67477e2c561282c4b8d784a55fe6c357893c6f20fea1c18af87f8bbd087061f6ce89a50dddaecd99c12da486cd8910576b33549e
-
Filesize
320KB
MD5dfb9c9624abf0f1183e824a29e17d65c
SHA1a0e4a16fbf4d7ae108160489fbe00f7854e4f1e2
SHA25626dc059112fd8bfffbc669fccc8591aa2eb3d0b922b4c7c5c51d18b1ce686b3f
SHA512776580545a6c2a8f69a7c9fb67477e2c561282c4b8d784a55fe6c357893c6f20fea1c18af87f8bbd087061f6ce89a50dddaecd99c12da486cd8910576b33549e
-
Filesize
320KB
MD5dfb9c9624abf0f1183e824a29e17d65c
SHA1a0e4a16fbf4d7ae108160489fbe00f7854e4f1e2
SHA25626dc059112fd8bfffbc669fccc8591aa2eb3d0b922b4c7c5c51d18b1ce686b3f
SHA512776580545a6c2a8f69a7c9fb67477e2c561282c4b8d784a55fe6c357893c6f20fea1c18af87f8bbd087061f6ce89a50dddaecd99c12da486cd8910576b33549e
-
Filesize
320KB
MD5dfb9c9624abf0f1183e824a29e17d65c
SHA1a0e4a16fbf4d7ae108160489fbe00f7854e4f1e2
SHA25626dc059112fd8bfffbc669fccc8591aa2eb3d0b922b4c7c5c51d18b1ce686b3f
SHA512776580545a6c2a8f69a7c9fb67477e2c561282c4b8d784a55fe6c357893c6f20fea1c18af87f8bbd087061f6ce89a50dddaecd99c12da486cd8910576b33549e
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7