Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
30/08/2023, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
img0581.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
img0581.exe
Resource
win10v2004-20230703-en
General
-
Target
img0581.exe
-
Size
829KB
-
MD5
206f84e9cc0df7ae39147aa076ae9f8f
-
SHA1
d65c255ee546b296e6173051aa9cd4e31fa283c4
-
SHA256
23bf98ab984c24e91f36d2c71278441a6ea7d7b847abc11e2b00580125a3ddf7
-
SHA512
427aa9e620475b72a16c8619a7d62b5a2458aaed8db6acb3fc213856aef26e9a791461dc0ab146ba0ec159060277103add06ce31b3598bfe339dc3caa0609950
-
SSDEEP
12288:BMrYy90N+XBSmXTxD8ILWo2rQ8AibRRMti94cMEkZMzNGHyf5A3UvHn6HGj:5yhAmXx8Ho2PRaiJM/ZMw8/HnR
Malware Config
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral1/files/0x0007000000016cdd-44.dat healer behavioral1/files/0x0007000000016cdd-45.dat healer behavioral1/files/0x0007000000016cdd-47.dat healer behavioral1/memory/2984-48-0x0000000000360000-0x000000000036A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7607508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7607508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7607508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7607508.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a7607508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7607508.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1308 v3500610.exe 2888 v0415012.exe 624 v4519024.exe 3020 v4023060.exe 2984 a7607508.exe 2156 b9551583.exe 2360 c8132038.exe -
Loads dropped DLL 13 IoCs
pid Process 1636 img0581.exe 1308 v3500610.exe 1308 v3500610.exe 2888 v0415012.exe 2888 v0415012.exe 624 v4519024.exe 624 v4519024.exe 3020 v4023060.exe 3020 v4023060.exe 3020 v4023060.exe 2156 b9551583.exe 624 v4519024.exe 2360 c8132038.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features a7607508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a7607508.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" img0581.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3500610.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0415012.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4519024.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v4023060.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2984 a7607508.exe 2984 a7607508.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2984 a7607508.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1308 1636 img0581.exe 28 PID 1636 wrote to memory of 1308 1636 img0581.exe 28 PID 1636 wrote to memory of 1308 1636 img0581.exe 28 PID 1636 wrote to memory of 1308 1636 img0581.exe 28 PID 1636 wrote to memory of 1308 1636 img0581.exe 28 PID 1636 wrote to memory of 1308 1636 img0581.exe 28 PID 1636 wrote to memory of 1308 1636 img0581.exe 28 PID 1308 wrote to memory of 2888 1308 v3500610.exe 29 PID 1308 wrote to memory of 2888 1308 v3500610.exe 29 PID 1308 wrote to memory of 2888 1308 v3500610.exe 29 PID 1308 wrote to memory of 2888 1308 v3500610.exe 29 PID 1308 wrote to memory of 2888 1308 v3500610.exe 29 PID 1308 wrote to memory of 2888 1308 v3500610.exe 29 PID 1308 wrote to memory of 2888 1308 v3500610.exe 29 PID 2888 wrote to memory of 624 2888 v0415012.exe 30 PID 2888 wrote to memory of 624 2888 v0415012.exe 30 PID 2888 wrote to memory of 624 2888 v0415012.exe 30 PID 2888 wrote to memory of 624 2888 v0415012.exe 30 PID 2888 wrote to memory of 624 2888 v0415012.exe 30 PID 2888 wrote to memory of 624 2888 v0415012.exe 30 PID 2888 wrote to memory of 624 2888 v0415012.exe 30 PID 624 wrote to memory of 3020 624 v4519024.exe 31 PID 624 wrote to memory of 3020 624 v4519024.exe 31 PID 624 wrote to memory of 3020 624 v4519024.exe 31 PID 624 wrote to memory of 3020 624 v4519024.exe 31 PID 624 wrote to memory of 3020 624 v4519024.exe 31 PID 624 wrote to memory of 3020 624 v4519024.exe 31 PID 624 wrote to memory of 3020 624 v4519024.exe 31 PID 3020 wrote to memory of 2984 3020 v4023060.exe 32 PID 3020 wrote to memory of 2984 3020 v4023060.exe 32 PID 3020 wrote to memory of 2984 3020 v4023060.exe 32 PID 3020 wrote to memory of 2984 3020 v4023060.exe 32 PID 3020 wrote to memory of 2984 3020 v4023060.exe 32 PID 3020 wrote to memory of 2984 3020 v4023060.exe 32 PID 3020 wrote to memory of 2984 3020 v4023060.exe 32 PID 3020 wrote to memory of 2156 3020 v4023060.exe 33 PID 3020 wrote to memory of 2156 3020 v4023060.exe 33 PID 3020 wrote to memory of 2156 3020 v4023060.exe 33 PID 3020 wrote to memory of 2156 3020 v4023060.exe 33 PID 3020 wrote to memory of 2156 3020 v4023060.exe 33 PID 3020 wrote to memory of 2156 3020 v4023060.exe 33 PID 3020 wrote to memory of 2156 3020 v4023060.exe 33 PID 624 wrote to memory of 2360 624 v4519024.exe 35 PID 624 wrote to memory of 2360 624 v4519024.exe 35 PID 624 wrote to memory of 2360 624 v4519024.exe 35 PID 624 wrote to memory of 2360 624 v4519024.exe 35 PID 624 wrote to memory of 2360 624 v4519024.exe 35 PID 624 wrote to memory of 2360 624 v4519024.exe 35 PID 624 wrote to memory of 2360 624 v4519024.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\img0581.exe"C:\Users\Admin\AppData\Local\Temp\img0581.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3500610.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3500610.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0415012.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0415012.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4519024.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4519024.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4023060.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4023060.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7607508.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7607508.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9551583.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9551583.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2156
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8132038.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8132038.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2360
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD55fb814cc815dc7ebfcbd6be7a7e8654d
SHA1d795f4bc7bd942b37ec4c2d2d389eb3e538f66b6
SHA256f2b95c9a0c92ee5c906b198392fe7581ac67615b021e497cedd0cb2be5867279
SHA51246a3a6b6c17eb76f22cd0ddaafeb972a9a414b73748c29e65edd72589830fb77d0a208fa55a6f5f39b2070071c93345c06e3c8139f2a34b104174d3a54a9f871
-
Filesize
723KB
MD55fb814cc815dc7ebfcbd6be7a7e8654d
SHA1d795f4bc7bd942b37ec4c2d2d389eb3e538f66b6
SHA256f2b95c9a0c92ee5c906b198392fe7581ac67615b021e497cedd0cb2be5867279
SHA51246a3a6b6c17eb76f22cd0ddaafeb972a9a414b73748c29e65edd72589830fb77d0a208fa55a6f5f39b2070071c93345c06e3c8139f2a34b104174d3a54a9f871
-
Filesize
497KB
MD5c91195e20339013a76675bcc5e357c5a
SHA159526aca2d8dedfaf1e5b49ec90159b7890800bd
SHA256c97dee4258f424560f6656d150c8f0f3721d0d7e82df3007a2351e73c619b2d4
SHA5129437b1fadedea0783ae5242b4510b61e4b28031086085a0488719f303a7062006adf03053cf65a46eedabed3674835380715d94b5f83363569345e7178109673
-
Filesize
497KB
MD5c91195e20339013a76675bcc5e357c5a
SHA159526aca2d8dedfaf1e5b49ec90159b7890800bd
SHA256c97dee4258f424560f6656d150c8f0f3721d0d7e82df3007a2351e73c619b2d4
SHA5129437b1fadedea0783ae5242b4510b61e4b28031086085a0488719f303a7062006adf03053cf65a46eedabed3674835380715d94b5f83363569345e7178109673
-
Filesize
372KB
MD51cf17d08ea699c76e0743cbe171a5d44
SHA1bbc2ce42af1730c44cd5faf7d9e1ea2efa8bbe2e
SHA256e3e2ed892014edd1acd8cf7182cab4a654131515e7e200fc94e54f0287694c42
SHA5123aeea78e1ac254c329e0b042ae8c002a7789bdf72ca56e5f5f241b3e492436e1d3157d36fe75cd2dfcbca4202e8f063016b621b07e3b52c34b6e454430231c51
-
Filesize
372KB
MD51cf17d08ea699c76e0743cbe171a5d44
SHA1bbc2ce42af1730c44cd5faf7d9e1ea2efa8bbe2e
SHA256e3e2ed892014edd1acd8cf7182cab4a654131515e7e200fc94e54f0287694c42
SHA5123aeea78e1ac254c329e0b042ae8c002a7789bdf72ca56e5f5f241b3e492436e1d3157d36fe75cd2dfcbca4202e8f063016b621b07e3b52c34b6e454430231c51
-
Filesize
175KB
MD5d7664f7eb74bb9ff363eae163eaa0177
SHA1f86d7988864df15eba6651c70429ce2913c5891c
SHA256d3e1bdec1ed827675cd2814412e2bcd0d15b9c09ce42983c03dd26c16552d88b
SHA51222bef8bf07f1656589b36be98576f919002fc799a7e97150f5b161440e2ffb9c6cb96709a926858efb5390ab7b5e2f9ef28738536660e259ac210b10abe1b7ba
-
Filesize
175KB
MD5d7664f7eb74bb9ff363eae163eaa0177
SHA1f86d7988864df15eba6651c70429ce2913c5891c
SHA256d3e1bdec1ed827675cd2814412e2bcd0d15b9c09ce42983c03dd26c16552d88b
SHA51222bef8bf07f1656589b36be98576f919002fc799a7e97150f5b161440e2ffb9c6cb96709a926858efb5390ab7b5e2f9ef28738536660e259ac210b10abe1b7ba
-
Filesize
217KB
MD5eac702600fb8262f0bb6498fbe8ab39e
SHA161f1a1fc86abf627c0a7f7696b2dbefb079b8d9b
SHA256dbf0d52910b66f3a580e4b2fd6ae025aaea7fef95cfb69774972b2ae48894441
SHA512e84f826cccab70a41120d858be6488d6f5aa931d54c1d17eb8d210c44daf48b34180fcbc809b120c343e5f45189b20591e7fc878b88edc2a3e411157e5cd5202
-
Filesize
217KB
MD5eac702600fb8262f0bb6498fbe8ab39e
SHA161f1a1fc86abf627c0a7f7696b2dbefb079b8d9b
SHA256dbf0d52910b66f3a580e4b2fd6ae025aaea7fef95cfb69774972b2ae48894441
SHA512e84f826cccab70a41120d858be6488d6f5aa931d54c1d17eb8d210c44daf48b34180fcbc809b120c343e5f45189b20591e7fc878b88edc2a3e411157e5cd5202
-
Filesize
17KB
MD5e74cda8dc05280260517bb66229b7b69
SHA1363c0dd7adfa26b1027235987019b52b9b7024b2
SHA256a1e7f708b602e24a71575a40e55c34f4b9bb0dab95f2756250fa0adbe7324249
SHA512c476dde2b224399d1c8bcbb47a9a223f9e83f6089e321e099c052cea26340f5ad1568be28b358fea964c1ab13f831aaefe476e4cbb2a170f4da1714cd99e3a65
-
Filesize
17KB
MD5e74cda8dc05280260517bb66229b7b69
SHA1363c0dd7adfa26b1027235987019b52b9b7024b2
SHA256a1e7f708b602e24a71575a40e55c34f4b9bb0dab95f2756250fa0adbe7324249
SHA512c476dde2b224399d1c8bcbb47a9a223f9e83f6089e321e099c052cea26340f5ad1568be28b358fea964c1ab13f831aaefe476e4cbb2a170f4da1714cd99e3a65
-
Filesize
140KB
MD5ba600a947e004a27970da12ea854bd43
SHA1445acae3c3264a9b27ef109510f74ac4bf0436e8
SHA25682c7bd490b6a84253da2d0a425358608f358a753194887a336cc12af9229bef6
SHA5128259a8e55eab2252a5b397e328f23a52c3d33b2f49c4d038389c635671df5784fafd9e025a7862b1695adec8608a2bdc7c2cc4dd2aca0cdf03c74914d87948a4
-
Filesize
140KB
MD5ba600a947e004a27970da12ea854bd43
SHA1445acae3c3264a9b27ef109510f74ac4bf0436e8
SHA25682c7bd490b6a84253da2d0a425358608f358a753194887a336cc12af9229bef6
SHA5128259a8e55eab2252a5b397e328f23a52c3d33b2f49c4d038389c635671df5784fafd9e025a7862b1695adec8608a2bdc7c2cc4dd2aca0cdf03c74914d87948a4
-
Filesize
723KB
MD55fb814cc815dc7ebfcbd6be7a7e8654d
SHA1d795f4bc7bd942b37ec4c2d2d389eb3e538f66b6
SHA256f2b95c9a0c92ee5c906b198392fe7581ac67615b021e497cedd0cb2be5867279
SHA51246a3a6b6c17eb76f22cd0ddaafeb972a9a414b73748c29e65edd72589830fb77d0a208fa55a6f5f39b2070071c93345c06e3c8139f2a34b104174d3a54a9f871
-
Filesize
723KB
MD55fb814cc815dc7ebfcbd6be7a7e8654d
SHA1d795f4bc7bd942b37ec4c2d2d389eb3e538f66b6
SHA256f2b95c9a0c92ee5c906b198392fe7581ac67615b021e497cedd0cb2be5867279
SHA51246a3a6b6c17eb76f22cd0ddaafeb972a9a414b73748c29e65edd72589830fb77d0a208fa55a6f5f39b2070071c93345c06e3c8139f2a34b104174d3a54a9f871
-
Filesize
497KB
MD5c91195e20339013a76675bcc5e357c5a
SHA159526aca2d8dedfaf1e5b49ec90159b7890800bd
SHA256c97dee4258f424560f6656d150c8f0f3721d0d7e82df3007a2351e73c619b2d4
SHA5129437b1fadedea0783ae5242b4510b61e4b28031086085a0488719f303a7062006adf03053cf65a46eedabed3674835380715d94b5f83363569345e7178109673
-
Filesize
497KB
MD5c91195e20339013a76675bcc5e357c5a
SHA159526aca2d8dedfaf1e5b49ec90159b7890800bd
SHA256c97dee4258f424560f6656d150c8f0f3721d0d7e82df3007a2351e73c619b2d4
SHA5129437b1fadedea0783ae5242b4510b61e4b28031086085a0488719f303a7062006adf03053cf65a46eedabed3674835380715d94b5f83363569345e7178109673
-
Filesize
372KB
MD51cf17d08ea699c76e0743cbe171a5d44
SHA1bbc2ce42af1730c44cd5faf7d9e1ea2efa8bbe2e
SHA256e3e2ed892014edd1acd8cf7182cab4a654131515e7e200fc94e54f0287694c42
SHA5123aeea78e1ac254c329e0b042ae8c002a7789bdf72ca56e5f5f241b3e492436e1d3157d36fe75cd2dfcbca4202e8f063016b621b07e3b52c34b6e454430231c51
-
Filesize
372KB
MD51cf17d08ea699c76e0743cbe171a5d44
SHA1bbc2ce42af1730c44cd5faf7d9e1ea2efa8bbe2e
SHA256e3e2ed892014edd1acd8cf7182cab4a654131515e7e200fc94e54f0287694c42
SHA5123aeea78e1ac254c329e0b042ae8c002a7789bdf72ca56e5f5f241b3e492436e1d3157d36fe75cd2dfcbca4202e8f063016b621b07e3b52c34b6e454430231c51
-
Filesize
175KB
MD5d7664f7eb74bb9ff363eae163eaa0177
SHA1f86d7988864df15eba6651c70429ce2913c5891c
SHA256d3e1bdec1ed827675cd2814412e2bcd0d15b9c09ce42983c03dd26c16552d88b
SHA51222bef8bf07f1656589b36be98576f919002fc799a7e97150f5b161440e2ffb9c6cb96709a926858efb5390ab7b5e2f9ef28738536660e259ac210b10abe1b7ba
-
Filesize
175KB
MD5d7664f7eb74bb9ff363eae163eaa0177
SHA1f86d7988864df15eba6651c70429ce2913c5891c
SHA256d3e1bdec1ed827675cd2814412e2bcd0d15b9c09ce42983c03dd26c16552d88b
SHA51222bef8bf07f1656589b36be98576f919002fc799a7e97150f5b161440e2ffb9c6cb96709a926858efb5390ab7b5e2f9ef28738536660e259ac210b10abe1b7ba
-
Filesize
217KB
MD5eac702600fb8262f0bb6498fbe8ab39e
SHA161f1a1fc86abf627c0a7f7696b2dbefb079b8d9b
SHA256dbf0d52910b66f3a580e4b2fd6ae025aaea7fef95cfb69774972b2ae48894441
SHA512e84f826cccab70a41120d858be6488d6f5aa931d54c1d17eb8d210c44daf48b34180fcbc809b120c343e5f45189b20591e7fc878b88edc2a3e411157e5cd5202
-
Filesize
217KB
MD5eac702600fb8262f0bb6498fbe8ab39e
SHA161f1a1fc86abf627c0a7f7696b2dbefb079b8d9b
SHA256dbf0d52910b66f3a580e4b2fd6ae025aaea7fef95cfb69774972b2ae48894441
SHA512e84f826cccab70a41120d858be6488d6f5aa931d54c1d17eb8d210c44daf48b34180fcbc809b120c343e5f45189b20591e7fc878b88edc2a3e411157e5cd5202
-
Filesize
17KB
MD5e74cda8dc05280260517bb66229b7b69
SHA1363c0dd7adfa26b1027235987019b52b9b7024b2
SHA256a1e7f708b602e24a71575a40e55c34f4b9bb0dab95f2756250fa0adbe7324249
SHA512c476dde2b224399d1c8bcbb47a9a223f9e83f6089e321e099c052cea26340f5ad1568be28b358fea964c1ab13f831aaefe476e4cbb2a170f4da1714cd99e3a65
-
Filesize
140KB
MD5ba600a947e004a27970da12ea854bd43
SHA1445acae3c3264a9b27ef109510f74ac4bf0436e8
SHA25682c7bd490b6a84253da2d0a425358608f358a753194887a336cc12af9229bef6
SHA5128259a8e55eab2252a5b397e328f23a52c3d33b2f49c4d038389c635671df5784fafd9e025a7862b1695adec8608a2bdc7c2cc4dd2aca0cdf03c74914d87948a4
-
Filesize
140KB
MD5ba600a947e004a27970da12ea854bd43
SHA1445acae3c3264a9b27ef109510f74ac4bf0436e8
SHA25682c7bd490b6a84253da2d0a425358608f358a753194887a336cc12af9229bef6
SHA5128259a8e55eab2252a5b397e328f23a52c3d33b2f49c4d038389c635671df5784fafd9e025a7862b1695adec8608a2bdc7c2cc4dd2aca0cdf03c74914d87948a4