Analysis
-
max time kernel
134s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
f1429d2e55420310087d167dc75096091a74b845cea71fabaf32fc4388be7613.exe
Resource
win10v2004-20230824-en
General
-
Target
f1429d2e55420310087d167dc75096091a74b845cea71fabaf32fc4388be7613.exe
-
Size
704KB
-
MD5
a6198e79559db5d630fcbeb1861f03f8
-
SHA1
7a4dd93e6d3cf553d2f8a3e1489820054d9985ae
-
SHA256
f1429d2e55420310087d167dc75096091a74b845cea71fabaf32fc4388be7613
-
SHA512
523e17efcf5ed7f8d45bc3dbc6645fad389fc20992166b0fa0fe58afb7bc6e0d8b56be1c5298b06a35f077c5b4d0a0ed1494a163ac3e7b8ea5982563a4e1a549
-
SSDEEP
12288:YMrWy90QqM+bFBhTm0bosT0MCqYFDxLj0x7UDK7pr4iDuFnw4vFNvJvi1ArcoJE0:eyzqMCjk0bosT0ppx85Uowq4te1VQT
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000022fec-27.dat healer behavioral1/files/0x0007000000022fec-28.dat healer behavioral1/memory/4696-29-0x00000000000F0000-0x00000000000FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g0977563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g0977563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g0977563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g0977563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g0977563.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g0977563.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 924 x9364118.exe 2360 x3974633.exe 1104 x2104574.exe 4696 g0977563.exe 2588 h3891060.exe 928 saves.exe 3032 i6723480.exe 2744 saves.exe 4960 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3972 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g0977563.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1429d2e55420310087d167dc75096091a74b845cea71fabaf32fc4388be7613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9364118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3974633.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2104574.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{09666C00-E751-4FB9-85F3-FA70942F7E09}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3224 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4696 g0977563.exe 4696 g0977563.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4696 g0977563.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4240 wrote to memory of 924 4240 f1429d2e55420310087d167dc75096091a74b845cea71fabaf32fc4388be7613.exe 85 PID 4240 wrote to memory of 924 4240 f1429d2e55420310087d167dc75096091a74b845cea71fabaf32fc4388be7613.exe 85 PID 4240 wrote to memory of 924 4240 f1429d2e55420310087d167dc75096091a74b845cea71fabaf32fc4388be7613.exe 85 PID 924 wrote to memory of 2360 924 x9364118.exe 87 PID 924 wrote to memory of 2360 924 x9364118.exe 87 PID 924 wrote to memory of 2360 924 x9364118.exe 87 PID 2360 wrote to memory of 1104 2360 x3974633.exe 88 PID 2360 wrote to memory of 1104 2360 x3974633.exe 88 PID 2360 wrote to memory of 1104 2360 x3974633.exe 88 PID 1104 wrote to memory of 4696 1104 x2104574.exe 89 PID 1104 wrote to memory of 4696 1104 x2104574.exe 89 PID 1104 wrote to memory of 2588 1104 x2104574.exe 91 PID 1104 wrote to memory of 2588 1104 x2104574.exe 91 PID 1104 wrote to memory of 2588 1104 x2104574.exe 91 PID 2588 wrote to memory of 928 2588 h3891060.exe 92 PID 2588 wrote to memory of 928 2588 h3891060.exe 92 PID 2588 wrote to memory of 928 2588 h3891060.exe 92 PID 2360 wrote to memory of 3032 2360 x3974633.exe 93 PID 2360 wrote to memory of 3032 2360 x3974633.exe 93 PID 2360 wrote to memory of 3032 2360 x3974633.exe 93 PID 928 wrote to memory of 3224 928 saves.exe 94 PID 928 wrote to memory of 3224 928 saves.exe 94 PID 928 wrote to memory of 3224 928 saves.exe 94 PID 928 wrote to memory of 1252 928 saves.exe 96 PID 928 wrote to memory of 1252 928 saves.exe 96 PID 928 wrote to memory of 1252 928 saves.exe 96 PID 1252 wrote to memory of 3424 1252 cmd.exe 98 PID 1252 wrote to memory of 3424 1252 cmd.exe 98 PID 1252 wrote to memory of 3424 1252 cmd.exe 98 PID 1252 wrote to memory of 4184 1252 cmd.exe 99 PID 1252 wrote to memory of 4184 1252 cmd.exe 99 PID 1252 wrote to memory of 4184 1252 cmd.exe 99 PID 1252 wrote to memory of 4036 1252 cmd.exe 100 PID 1252 wrote to memory of 4036 1252 cmd.exe 100 PID 1252 wrote to memory of 4036 1252 cmd.exe 100 PID 1252 wrote to memory of 1080 1252 cmd.exe 101 PID 1252 wrote to memory of 1080 1252 cmd.exe 101 PID 1252 wrote to memory of 1080 1252 cmd.exe 101 PID 1252 wrote to memory of 3172 1252 cmd.exe 102 PID 1252 wrote to memory of 3172 1252 cmd.exe 102 PID 1252 wrote to memory of 3172 1252 cmd.exe 102 PID 1252 wrote to memory of 1180 1252 cmd.exe 103 PID 1252 wrote to memory of 1180 1252 cmd.exe 103 PID 1252 wrote to memory of 1180 1252 cmd.exe 103 PID 928 wrote to memory of 3972 928 saves.exe 106 PID 928 wrote to memory of 3972 928 saves.exe 106 PID 928 wrote to memory of 3972 928 saves.exe 106
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:1608
-
C:\Users\Admin\AppData\Local\Temp\f1429d2e55420310087d167dc75096091a74b845cea71fabaf32fc4388be7613.exe"C:\Users\Admin\AppData\Local\Temp\f1429d2e55420310087d167dc75096091a74b845cea71fabaf32fc4388be7613.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9364118.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9364118.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3974633.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3974633.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2104574.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2104574.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0977563.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0977563.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3891060.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3891060.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:3224
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4184
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1080
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3172
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:1180
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3972
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6723480.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6723480.exe4⤵
- Executes dropped EXE
PID:3032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2744
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD5a4877e4f467e05c220267f3c1202fb2b
SHA1a4c787e9a6513a5a27c3f41b2b81517baf5d2f09
SHA256de662211d6d5216de885c3d3f41a8f6fcdad7a8631c4613805a45322407a668a
SHA512b69868cc83a78d0827b47dae29cb11f0d3efdb2217e0c193be41915f03d5fa69b38ad7b4e1b6037e1b916ef8bb997643090a31c600522b3309e6c6c1c7228c6a
-
Filesize
598KB
MD5a4877e4f467e05c220267f3c1202fb2b
SHA1a4c787e9a6513a5a27c3f41b2b81517baf5d2f09
SHA256de662211d6d5216de885c3d3f41a8f6fcdad7a8631c4613805a45322407a668a
SHA512b69868cc83a78d0827b47dae29cb11f0d3efdb2217e0c193be41915f03d5fa69b38ad7b4e1b6037e1b916ef8bb997643090a31c600522b3309e6c6c1c7228c6a
-
Filesize
433KB
MD5bde35bb740fb8c0ffeb14241575c2def
SHA11fef70c84197fc24224436a47220f3866fd39554
SHA256e00df24fc608dfd3505cdec6a6d3a031e827bac5af70a05ec2af8801fec9d402
SHA512959cb1640e024cd1c4923bbfc3dfadddeb6c59b963e8368a129c3ce5d3f648bbf1f202285a20defa91646c06db15ab5c4274f26f38a2dcd2157591381a63f6a7
-
Filesize
433KB
MD5bde35bb740fb8c0ffeb14241575c2def
SHA11fef70c84197fc24224436a47220f3866fd39554
SHA256e00df24fc608dfd3505cdec6a6d3a031e827bac5af70a05ec2af8801fec9d402
SHA512959cb1640e024cd1c4923bbfc3dfadddeb6c59b963e8368a129c3ce5d3f648bbf1f202285a20defa91646c06db15ab5c4274f26f38a2dcd2157591381a63f6a7
-
Filesize
174KB
MD5a1ab4298240a2ecf8b648ad104054439
SHA1ede25cb4e253d84da11449eef8417a2ee2b6c49f
SHA256c083fa81b380fa6e9c6b94e6c9b509326162913654a0f7041d5ee3424784fb8b
SHA512fbabd91f777832cc945fe5135f7ad8fcb78cafcbd295732d95fc8a7bf4566f1d483515cc1869fae58bd34d9edd44c25a8ed6b3e22b7fd72aefba9738be016b20
-
Filesize
174KB
MD5a1ab4298240a2ecf8b648ad104054439
SHA1ede25cb4e253d84da11449eef8417a2ee2b6c49f
SHA256c083fa81b380fa6e9c6b94e6c9b509326162913654a0f7041d5ee3424784fb8b
SHA512fbabd91f777832cc945fe5135f7ad8fcb78cafcbd295732d95fc8a7bf4566f1d483515cc1869fae58bd34d9edd44c25a8ed6b3e22b7fd72aefba9738be016b20
-
Filesize
277KB
MD5f46d7d688a311582ff68a07521736b9e
SHA1cbbe57d6939e0232a85fb3d34d5f0dc274336e27
SHA256dbf80d77ee07b350bcab208fa3428ccccf980736429ea868becd9465085d3fb9
SHA5129940257a7565b21094aedcdd78d632ea1bae39d4f1f308cd9aaa6a963a8e263443ba2387929718878de9dcf381fe2abaf494bc7677695de5704b2657ddf65ff1
-
Filesize
277KB
MD5f46d7d688a311582ff68a07521736b9e
SHA1cbbe57d6939e0232a85fb3d34d5f0dc274336e27
SHA256dbf80d77ee07b350bcab208fa3428ccccf980736429ea868becd9465085d3fb9
SHA5129940257a7565b21094aedcdd78d632ea1bae39d4f1f308cd9aaa6a963a8e263443ba2387929718878de9dcf381fe2abaf494bc7677695de5704b2657ddf65ff1
-
Filesize
15KB
MD54b02df5d319d3b902238dabc427129cd
SHA17c73743268d94d4cde44f7642bc228f3dab2c3c4
SHA256c622f2b2b0e64abb6c2a819150ca77033148b9850887ea9c9c1ed86500654de7
SHA512a99471bdcebff645f6fdd425a370eda3462680096ab268cc6c7f3a43470a91a3549767d6cfa1a15d3653adc3a9baedd5483b98c7a8234461346defbd7eb6bb6f
-
Filesize
15KB
MD54b02df5d319d3b902238dabc427129cd
SHA17c73743268d94d4cde44f7642bc228f3dab2c3c4
SHA256c622f2b2b0e64abb6c2a819150ca77033148b9850887ea9c9c1ed86500654de7
SHA512a99471bdcebff645f6fdd425a370eda3462680096ab268cc6c7f3a43470a91a3549767d6cfa1a15d3653adc3a9baedd5483b98c7a8234461346defbd7eb6bb6f
-
Filesize
323KB
MD57a860c938b66e9e9ebe737343495ca36
SHA1b4afe710f3a22f38ed8da4d275746955f0f51f7e
SHA256865897d1eeeead78b32cbdfa548dff7d56ae444aa705c1137215f642ae2e5d69
SHA512b775db3caa0e6169d4e4a22be92a1bfb6b2106120d7ce0d1b0c5528efffd2324c41a524b29f541c1eb2f0ccde8ee3f20f5d0921e3a7216b520cc314ffc753153
-
Filesize
323KB
MD57a860c938b66e9e9ebe737343495ca36
SHA1b4afe710f3a22f38ed8da4d275746955f0f51f7e
SHA256865897d1eeeead78b32cbdfa548dff7d56ae444aa705c1137215f642ae2e5d69
SHA512b775db3caa0e6169d4e4a22be92a1bfb6b2106120d7ce0d1b0c5528efffd2324c41a524b29f541c1eb2f0ccde8ee3f20f5d0921e3a7216b520cc314ffc753153
-
Filesize
323KB
MD57a860c938b66e9e9ebe737343495ca36
SHA1b4afe710f3a22f38ed8da4d275746955f0f51f7e
SHA256865897d1eeeead78b32cbdfa548dff7d56ae444aa705c1137215f642ae2e5d69
SHA512b775db3caa0e6169d4e4a22be92a1bfb6b2106120d7ce0d1b0c5528efffd2324c41a524b29f541c1eb2f0ccde8ee3f20f5d0921e3a7216b520cc314ffc753153
-
Filesize
323KB
MD57a860c938b66e9e9ebe737343495ca36
SHA1b4afe710f3a22f38ed8da4d275746955f0f51f7e
SHA256865897d1eeeead78b32cbdfa548dff7d56ae444aa705c1137215f642ae2e5d69
SHA512b775db3caa0e6169d4e4a22be92a1bfb6b2106120d7ce0d1b0c5528efffd2324c41a524b29f541c1eb2f0ccde8ee3f20f5d0921e3a7216b520cc314ffc753153
-
Filesize
323KB
MD57a860c938b66e9e9ebe737343495ca36
SHA1b4afe710f3a22f38ed8da4d275746955f0f51f7e
SHA256865897d1eeeead78b32cbdfa548dff7d56ae444aa705c1137215f642ae2e5d69
SHA512b775db3caa0e6169d4e4a22be92a1bfb6b2106120d7ce0d1b0c5528efffd2324c41a524b29f541c1eb2f0ccde8ee3f20f5d0921e3a7216b520cc314ffc753153
-
Filesize
323KB
MD57a860c938b66e9e9ebe737343495ca36
SHA1b4afe710f3a22f38ed8da4d275746955f0f51f7e
SHA256865897d1eeeead78b32cbdfa548dff7d56ae444aa705c1137215f642ae2e5d69
SHA512b775db3caa0e6169d4e4a22be92a1bfb6b2106120d7ce0d1b0c5528efffd2324c41a524b29f541c1eb2f0ccde8ee3f20f5d0921e3a7216b520cc314ffc753153
-
Filesize
323KB
MD57a860c938b66e9e9ebe737343495ca36
SHA1b4afe710f3a22f38ed8da4d275746955f0f51f7e
SHA256865897d1eeeead78b32cbdfa548dff7d56ae444aa705c1137215f642ae2e5d69
SHA512b775db3caa0e6169d4e4a22be92a1bfb6b2106120d7ce0d1b0c5528efffd2324c41a524b29f541c1eb2f0ccde8ee3f20f5d0921e3a7216b520cc314ffc753153
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7