Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2023 04:31
Static task
static1
Behavioral task
behavioral1
Sample
40b635e8e2d6109a675e93b1b2f0e7d0232a5edf3c822c81d72d8111d2202441.exe
Resource
win10v2004-20230703-en
General
-
Target
40b635e8e2d6109a675e93b1b2f0e7d0232a5edf3c822c81d72d8111d2202441.exe
-
Size
704KB
-
MD5
578ac01b84375a741df61fb0905f899a
-
SHA1
4abb5358c843171f32e21f84461cb85b1f747a6a
-
SHA256
40b635e8e2d6109a675e93b1b2f0e7d0232a5edf3c822c81d72d8111d2202441
-
SHA512
71a8c9908709aced93bb8508cf6b07dba6e1024976f4eb32ae26e80a43b4e105e19cebaf67d736ba094210391ff6017c9700c193d251f80439535cbbc482abb7
-
SSDEEP
12288:/MrLy90lUQCBifTAvzhl0q6xtzZvMoO3G8m0s7/RD/lKHMOdy95zWZ54DPSbKUSJ:My5QCUg38tz9MvWUs7/RDtKFCzWZ5G3V
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00070000000231f4-26.dat healer behavioral1/files/0x00070000000231f4-27.dat healer behavioral1/memory/2828-28-0x0000000000CC0000-0x0000000000CCA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g7842819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g7842819.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g7842819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g7842819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g7842819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g7842819.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 2428 x8128401.exe 1556 x1404372.exe 2464 x0330595.exe 2828 g7842819.exe 3264 h3296567.exe 4028 saves.exe 4196 i1931894.exe 3772 saves.exe 2484 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4552 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g7842819.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 40b635e8e2d6109a675e93b1b2f0e7d0232a5edf3c822c81d72d8111d2202441.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8128401.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1404372.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0330595.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 400 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2828 g7842819.exe 2828 g7842819.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2828 g7842819.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4060 wrote to memory of 2428 4060 40b635e8e2d6109a675e93b1b2f0e7d0232a5edf3c822c81d72d8111d2202441.exe 82 PID 4060 wrote to memory of 2428 4060 40b635e8e2d6109a675e93b1b2f0e7d0232a5edf3c822c81d72d8111d2202441.exe 82 PID 4060 wrote to memory of 2428 4060 40b635e8e2d6109a675e93b1b2f0e7d0232a5edf3c822c81d72d8111d2202441.exe 82 PID 2428 wrote to memory of 1556 2428 x8128401.exe 83 PID 2428 wrote to memory of 1556 2428 x8128401.exe 83 PID 2428 wrote to memory of 1556 2428 x8128401.exe 83 PID 1556 wrote to memory of 2464 1556 x1404372.exe 84 PID 1556 wrote to memory of 2464 1556 x1404372.exe 84 PID 1556 wrote to memory of 2464 1556 x1404372.exe 84 PID 2464 wrote to memory of 2828 2464 x0330595.exe 85 PID 2464 wrote to memory of 2828 2464 x0330595.exe 85 PID 2464 wrote to memory of 3264 2464 x0330595.exe 91 PID 2464 wrote to memory of 3264 2464 x0330595.exe 91 PID 2464 wrote to memory of 3264 2464 x0330595.exe 91 PID 3264 wrote to memory of 4028 3264 h3296567.exe 92 PID 3264 wrote to memory of 4028 3264 h3296567.exe 92 PID 3264 wrote to memory of 4028 3264 h3296567.exe 92 PID 1556 wrote to memory of 4196 1556 x1404372.exe 93 PID 1556 wrote to memory of 4196 1556 x1404372.exe 93 PID 1556 wrote to memory of 4196 1556 x1404372.exe 93 PID 4028 wrote to memory of 2556 4028 saves.exe 94 PID 4028 wrote to memory of 2556 4028 saves.exe 94 PID 4028 wrote to memory of 2556 4028 saves.exe 94 PID 4028 wrote to memory of 1632 4028 saves.exe 96 PID 4028 wrote to memory of 1632 4028 saves.exe 96 PID 4028 wrote to memory of 1632 4028 saves.exe 96 PID 1632 wrote to memory of 1076 1632 cmd.exe 98 PID 1632 wrote to memory of 1076 1632 cmd.exe 98 PID 1632 wrote to memory of 1076 1632 cmd.exe 98 PID 1632 wrote to memory of 4576 1632 cmd.exe 99 PID 1632 wrote to memory of 4576 1632 cmd.exe 99 PID 1632 wrote to memory of 4576 1632 cmd.exe 99 PID 1632 wrote to memory of 4896 1632 cmd.exe 100 PID 1632 wrote to memory of 4896 1632 cmd.exe 100 PID 1632 wrote to memory of 4896 1632 cmd.exe 100 PID 1632 wrote to memory of 4468 1632 cmd.exe 101 PID 1632 wrote to memory of 4468 1632 cmd.exe 101 PID 1632 wrote to memory of 4468 1632 cmd.exe 101 PID 1632 wrote to memory of 1876 1632 cmd.exe 102 PID 1632 wrote to memory of 1876 1632 cmd.exe 102 PID 1632 wrote to memory of 1876 1632 cmd.exe 102 PID 1632 wrote to memory of 3984 1632 cmd.exe 103 PID 1632 wrote to memory of 3984 1632 cmd.exe 103 PID 1632 wrote to memory of 3984 1632 cmd.exe 103 PID 4028 wrote to memory of 4552 4028 saves.exe 110 PID 4028 wrote to memory of 4552 4028 saves.exe 110 PID 4028 wrote to memory of 4552 4028 saves.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\40b635e8e2d6109a675e93b1b2f0e7d0232a5edf3c822c81d72d8111d2202441.exe"C:\Users\Admin\AppData\Local\Temp\40b635e8e2d6109a675e93b1b2f0e7d0232a5edf3c822c81d72d8111d2202441.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8128401.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8128401.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1404372.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1404372.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0330595.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0330595.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7842819.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7842819.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3296567.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3296567.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:2556
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4576
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4468
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1876
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3984
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4552
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1931894.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1931894.exe4⤵
- Executes dropped EXE
PID:4196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3772
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2484
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:400
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD503bfb9594eda9982e63b73a257c0c04c
SHA19d80ca46426b79b50076dc81b4beb5012345d01d
SHA256a8e4ad5dad5a63561c44031f808ff43cfe02d3d77f49962eca4b045fcfad0fa1
SHA51213126e654ef00b6b79858c9fc9c5a460f08a7b0fe9d528b6cf686a3eaef2ed8fa4ce995579a92f138eaa9347b1ad23c3e8e5e8eab2a691d3acfb359092f3a810
-
Filesize
599KB
MD503bfb9594eda9982e63b73a257c0c04c
SHA19d80ca46426b79b50076dc81b4beb5012345d01d
SHA256a8e4ad5dad5a63561c44031f808ff43cfe02d3d77f49962eca4b045fcfad0fa1
SHA51213126e654ef00b6b79858c9fc9c5a460f08a7b0fe9d528b6cf686a3eaef2ed8fa4ce995579a92f138eaa9347b1ad23c3e8e5e8eab2a691d3acfb359092f3a810
-
Filesize
433KB
MD513c5a01375b1ebb14b4992a5cfbb241e
SHA1540c694a3671820072ee2e6737b63b38015451e7
SHA256ba0edb5ad45d6066c625866c1eda649c5b0c88d59280aa0f12da9ab5f6a060bd
SHA512175b60c8ed79e3b3d77891f45aed96853e654fddefb528a1004f45ab1a20e45b10aebe94a9aab0a6da3b44a091243d940b9f87fda66fb71e52b1e01ca9e3b541
-
Filesize
433KB
MD513c5a01375b1ebb14b4992a5cfbb241e
SHA1540c694a3671820072ee2e6737b63b38015451e7
SHA256ba0edb5ad45d6066c625866c1eda649c5b0c88d59280aa0f12da9ab5f6a060bd
SHA512175b60c8ed79e3b3d77891f45aed96853e654fddefb528a1004f45ab1a20e45b10aebe94a9aab0a6da3b44a091243d940b9f87fda66fb71e52b1e01ca9e3b541
-
Filesize
175KB
MD50a47155d4d7c8b968f2e4ab821ace916
SHA1489d118bc5923d5d13b297db74126d791d4b10b9
SHA256aee7bb478ff55a201a2c6999679a7f5da5347926cba427a88efe73a1eef4d7a3
SHA5128f2c44f4e43ece44e013dfb39efb11b65fbf3226680f869c08980d13bcfd2bbe564dd69780d6b5df889a0eb6a3ce246d5baf75b2a791d0b9a3b30518df25d9f0
-
Filesize
175KB
MD50a47155d4d7c8b968f2e4ab821ace916
SHA1489d118bc5923d5d13b297db74126d791d4b10b9
SHA256aee7bb478ff55a201a2c6999679a7f5da5347926cba427a88efe73a1eef4d7a3
SHA5128f2c44f4e43ece44e013dfb39efb11b65fbf3226680f869c08980d13bcfd2bbe564dd69780d6b5df889a0eb6a3ce246d5baf75b2a791d0b9a3b30518df25d9f0
-
Filesize
277KB
MD5c18e5996b7adb745f8f3b0dcdee032ea
SHA1be40d60f2610c6b0d95c99fbf45a68610f1b8c06
SHA2562f2d5a6164862b445605ebb78443a5fff501d119bc3d1141585bf7a27e456a27
SHA51207ad0a5d536f73a2d7c30a71f34199af7e2fd0d7b6c96c336854f960635d631817c704f02bdfbc7a73d133d4465e97e6c83c7a46a554937e5a1972fc937cb38d
-
Filesize
277KB
MD5c18e5996b7adb745f8f3b0dcdee032ea
SHA1be40d60f2610c6b0d95c99fbf45a68610f1b8c06
SHA2562f2d5a6164862b445605ebb78443a5fff501d119bc3d1141585bf7a27e456a27
SHA51207ad0a5d536f73a2d7c30a71f34199af7e2fd0d7b6c96c336854f960635d631817c704f02bdfbc7a73d133d4465e97e6c83c7a46a554937e5a1972fc937cb38d
-
Filesize
16KB
MD5700089e3e87020168b252c5b573679ec
SHA11fce56d155836f49c697486c18a52e73eb2c801c
SHA2567265c2b6e5ee7a4a5440cfe4547ebbfb222b8699eab7c9e5f20e01b39d90dba9
SHA512d3470267bf3e80f1f0ea3ef2737ef0fc0b32f1dc79a113e81c72a4f23c5d9683b20d2ad46c50bb3d5fba79553f6b7009e8ec0f63514382b3f7fee44903e53825
-
Filesize
16KB
MD5700089e3e87020168b252c5b573679ec
SHA11fce56d155836f49c697486c18a52e73eb2c801c
SHA2567265c2b6e5ee7a4a5440cfe4547ebbfb222b8699eab7c9e5f20e01b39d90dba9
SHA512d3470267bf3e80f1f0ea3ef2737ef0fc0b32f1dc79a113e81c72a4f23c5d9683b20d2ad46c50bb3d5fba79553f6b7009e8ec0f63514382b3f7fee44903e53825
-
Filesize
324KB
MD5c0661a3fb6409ac2bbe2c4f072ef133c
SHA11062461c526359854c152c6de3e562b25f066649
SHA25672081a7ccddae607f95ecd6648f3983b520c8408871de390b7460ec31fa34f56
SHA512d23e1158849a04c49825602c9a7766ccfefa92c7ba65f230547dd9497c07d459b5eadfea31a24a0cffd93eab7c113314a7fd3983dfebc1c426edb1e1ae401b16
-
Filesize
324KB
MD5c0661a3fb6409ac2bbe2c4f072ef133c
SHA11062461c526359854c152c6de3e562b25f066649
SHA25672081a7ccddae607f95ecd6648f3983b520c8408871de390b7460ec31fa34f56
SHA512d23e1158849a04c49825602c9a7766ccfefa92c7ba65f230547dd9497c07d459b5eadfea31a24a0cffd93eab7c113314a7fd3983dfebc1c426edb1e1ae401b16
-
Filesize
324KB
MD5c0661a3fb6409ac2bbe2c4f072ef133c
SHA11062461c526359854c152c6de3e562b25f066649
SHA25672081a7ccddae607f95ecd6648f3983b520c8408871de390b7460ec31fa34f56
SHA512d23e1158849a04c49825602c9a7766ccfefa92c7ba65f230547dd9497c07d459b5eadfea31a24a0cffd93eab7c113314a7fd3983dfebc1c426edb1e1ae401b16
-
Filesize
324KB
MD5c0661a3fb6409ac2bbe2c4f072ef133c
SHA11062461c526359854c152c6de3e562b25f066649
SHA25672081a7ccddae607f95ecd6648f3983b520c8408871de390b7460ec31fa34f56
SHA512d23e1158849a04c49825602c9a7766ccfefa92c7ba65f230547dd9497c07d459b5eadfea31a24a0cffd93eab7c113314a7fd3983dfebc1c426edb1e1ae401b16
-
Filesize
324KB
MD5c0661a3fb6409ac2bbe2c4f072ef133c
SHA11062461c526359854c152c6de3e562b25f066649
SHA25672081a7ccddae607f95ecd6648f3983b520c8408871de390b7460ec31fa34f56
SHA512d23e1158849a04c49825602c9a7766ccfefa92c7ba65f230547dd9497c07d459b5eadfea31a24a0cffd93eab7c113314a7fd3983dfebc1c426edb1e1ae401b16
-
Filesize
324KB
MD5c0661a3fb6409ac2bbe2c4f072ef133c
SHA11062461c526359854c152c6de3e562b25f066649
SHA25672081a7ccddae607f95ecd6648f3983b520c8408871de390b7460ec31fa34f56
SHA512d23e1158849a04c49825602c9a7766ccfefa92c7ba65f230547dd9497c07d459b5eadfea31a24a0cffd93eab7c113314a7fd3983dfebc1c426edb1e1ae401b16
-
Filesize
324KB
MD5c0661a3fb6409ac2bbe2c4f072ef133c
SHA11062461c526359854c152c6de3e562b25f066649
SHA25672081a7ccddae607f95ecd6648f3983b520c8408871de390b7460ec31fa34f56
SHA512d23e1158849a04c49825602c9a7766ccfefa92c7ba65f230547dd9497c07d459b5eadfea31a24a0cffd93eab7c113314a7fd3983dfebc1c426edb1e1ae401b16
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7