Analysis
-
max time kernel
137s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
c2606494dc9c7db323d27b5fc51d5bada13f9214894144b7fce06adac8418ae7.exe
Resource
win10v2004-20230824-en
General
-
Target
c2606494dc9c7db323d27b5fc51d5bada13f9214894144b7fce06adac8418ae7.exe
-
Size
704KB
-
MD5
7a6d3f168c2f31b086b7dd6ae75d91d6
-
SHA1
a32d8c9f10df04cdef4a0190c802816ae4eb4b4a
-
SHA256
c2606494dc9c7db323d27b5fc51d5bada13f9214894144b7fce06adac8418ae7
-
SHA512
c4c79606a371b85859814b2e5c981daa7528026f3a09548153306fa27bb247f324bf0aaa79c6f4100daa0f82ea2e50d28746727229fab963e0b35021065e3dd8
-
SSDEEP
12288:TMr5y90QpVB4QuhL86zTprMh3cv8JfkMGsbp+u9GbOsGsL3ImE2:yy1ueuVMsgkjshMbOsGszIv2
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000900000002300d-26.dat healer behavioral1/files/0x000900000002300d-27.dat healer behavioral1/memory/4880-28-0x0000000000040000-0x000000000004A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g9567293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g9567293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g9567293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g9567293.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g9567293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g9567293.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000\Control Panel\International\Geo\Nation h8512919.exe Key value queried \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 9 IoCs
pid Process 3088 x1743307.exe 4268 x6682816.exe 4408 x0248361.exe 4880 g9567293.exe 2092 h8512919.exe 4792 saves.exe 2164 i5065715.exe 2632 saves.exe 1304 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 2228 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g9567293.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6682816.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0248361.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c2606494dc9c7db323d27b5fc51d5bada13f9214894144b7fce06adac8418ae7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1743307.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 436 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4880 g9567293.exe 4880 g9567293.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4880 g9567293.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2040 wrote to memory of 3088 2040 c2606494dc9c7db323d27b5fc51d5bada13f9214894144b7fce06adac8418ae7.exe 87 PID 2040 wrote to memory of 3088 2040 c2606494dc9c7db323d27b5fc51d5bada13f9214894144b7fce06adac8418ae7.exe 87 PID 2040 wrote to memory of 3088 2040 c2606494dc9c7db323d27b5fc51d5bada13f9214894144b7fce06adac8418ae7.exe 87 PID 3088 wrote to memory of 4268 3088 x1743307.exe 88 PID 3088 wrote to memory of 4268 3088 x1743307.exe 88 PID 3088 wrote to memory of 4268 3088 x1743307.exe 88 PID 4268 wrote to memory of 4408 4268 x6682816.exe 89 PID 4268 wrote to memory of 4408 4268 x6682816.exe 89 PID 4268 wrote to memory of 4408 4268 x6682816.exe 89 PID 4408 wrote to memory of 4880 4408 x0248361.exe 90 PID 4408 wrote to memory of 4880 4408 x0248361.exe 90 PID 4408 wrote to memory of 2092 4408 x0248361.exe 91 PID 4408 wrote to memory of 2092 4408 x0248361.exe 91 PID 4408 wrote to memory of 2092 4408 x0248361.exe 91 PID 2092 wrote to memory of 4792 2092 h8512919.exe 92 PID 2092 wrote to memory of 4792 2092 h8512919.exe 92 PID 2092 wrote to memory of 4792 2092 h8512919.exe 92 PID 4268 wrote to memory of 2164 4268 x6682816.exe 93 PID 4268 wrote to memory of 2164 4268 x6682816.exe 93 PID 4268 wrote to memory of 2164 4268 x6682816.exe 93 PID 4792 wrote to memory of 436 4792 saves.exe 94 PID 4792 wrote to memory of 436 4792 saves.exe 94 PID 4792 wrote to memory of 436 4792 saves.exe 94 PID 4792 wrote to memory of 208 4792 saves.exe 96 PID 4792 wrote to memory of 208 4792 saves.exe 96 PID 4792 wrote to memory of 208 4792 saves.exe 96 PID 208 wrote to memory of 4752 208 cmd.exe 98 PID 208 wrote to memory of 4752 208 cmd.exe 98 PID 208 wrote to memory of 4752 208 cmd.exe 98 PID 208 wrote to memory of 4100 208 cmd.exe 99 PID 208 wrote to memory of 4100 208 cmd.exe 99 PID 208 wrote to memory of 4100 208 cmd.exe 99 PID 208 wrote to memory of 4420 208 cmd.exe 100 PID 208 wrote to memory of 4420 208 cmd.exe 100 PID 208 wrote to memory of 4420 208 cmd.exe 100 PID 208 wrote to memory of 1852 208 cmd.exe 101 PID 208 wrote to memory of 1852 208 cmd.exe 101 PID 208 wrote to memory of 1852 208 cmd.exe 101 PID 208 wrote to memory of 4192 208 cmd.exe 102 PID 208 wrote to memory of 4192 208 cmd.exe 102 PID 208 wrote to memory of 4192 208 cmd.exe 102 PID 208 wrote to memory of 2216 208 cmd.exe 103 PID 208 wrote to memory of 2216 208 cmd.exe 103 PID 208 wrote to memory of 2216 208 cmd.exe 103 PID 4792 wrote to memory of 2228 4792 saves.exe 107 PID 4792 wrote to memory of 2228 4792 saves.exe 107 PID 4792 wrote to memory of 2228 4792 saves.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2606494dc9c7db323d27b5fc51d5bada13f9214894144b7fce06adac8418ae7.exe"C:\Users\Admin\AppData\Local\Temp\c2606494dc9c7db323d27b5fc51d5bada13f9214894144b7fce06adac8418ae7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1743307.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1743307.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6682816.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6682816.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0248361.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0248361.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9567293.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9567293.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8512919.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8512919.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:436
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4752
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1852
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4192
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2216
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2228
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5065715.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5065715.exe4⤵
- Executes dropped EXE
PID:2164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2632
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1304
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD52eb04372c162089f05783bdd918a008f
SHA10529a330f69c4b7701cc36749cc9b87cf5875ba2
SHA256389ff0ea6faaec0f7763033cd6a435e0420c7f136c56e322e53f014bab55d5f6
SHA5128ce7c9e49f49f6cac86ad32170b9d02bfedebb98db29f2e33aaec3de3cbbd061bc0d9f58b592085c87827060087bca3bd96a64b8f65d26a167f2d30b57bec397
-
Filesize
599KB
MD52eb04372c162089f05783bdd918a008f
SHA10529a330f69c4b7701cc36749cc9b87cf5875ba2
SHA256389ff0ea6faaec0f7763033cd6a435e0420c7f136c56e322e53f014bab55d5f6
SHA5128ce7c9e49f49f6cac86ad32170b9d02bfedebb98db29f2e33aaec3de3cbbd061bc0d9f58b592085c87827060087bca3bd96a64b8f65d26a167f2d30b57bec397
-
Filesize
433KB
MD58323b3a012155f2a76b4943308bbef43
SHA13ab1748f98afaef4633444874c0e8aba35c07f94
SHA2563949062551232d448588a104b735b4b1cd90b401d6cac29875dff21eaf6f6647
SHA512cad8a8e7a55cf4125764151c91b2e35df2932f30253ba76c49ae6f27cb1e762b6d9c31915258c9511aa662ed28d37401a91253e150dddb48dd81cd9c849fab6f
-
Filesize
433KB
MD58323b3a012155f2a76b4943308bbef43
SHA13ab1748f98afaef4633444874c0e8aba35c07f94
SHA2563949062551232d448588a104b735b4b1cd90b401d6cac29875dff21eaf6f6647
SHA512cad8a8e7a55cf4125764151c91b2e35df2932f30253ba76c49ae6f27cb1e762b6d9c31915258c9511aa662ed28d37401a91253e150dddb48dd81cd9c849fab6f
-
Filesize
176KB
MD54d9cb6937c7631e28b9fe10dcd6ef1f2
SHA1d2ee7c74ff8eb559d58ca03fb2bb4179fbb81927
SHA256d03428aeb61609ca5956026f365f1ccf09339ae394afbaa7c316a2eb8dc3864c
SHA512271df4be6ba02ff5faee62bf998e3013c7b7cedd5f82fd7e84f3c382ad10e2a1b3d2453bc5b856e35ee5d87e3380bc8b14a6ade0f92fe4c9e1699d3aa3ab1725
-
Filesize
176KB
MD54d9cb6937c7631e28b9fe10dcd6ef1f2
SHA1d2ee7c74ff8eb559d58ca03fb2bb4179fbb81927
SHA256d03428aeb61609ca5956026f365f1ccf09339ae394afbaa7c316a2eb8dc3864c
SHA512271df4be6ba02ff5faee62bf998e3013c7b7cedd5f82fd7e84f3c382ad10e2a1b3d2453bc5b856e35ee5d87e3380bc8b14a6ade0f92fe4c9e1699d3aa3ab1725
-
Filesize
277KB
MD5c7f62013796a747575d0dcde8a280595
SHA1827fd5c6352e427339c81a5ac02c49c6096bc866
SHA25689ca2f62f8c1f84d4c3a7dbe1cc4cda869f461c85abb8755b8cbe801c855e68f
SHA5123285d16eb998bdd51431218ba63840590732c818b915a925d68f62713a1a3b5389745fbe83ccfd23d4168621f6fc56241a544d1f622ce764b9d1ef5a23954e09
-
Filesize
277KB
MD5c7f62013796a747575d0dcde8a280595
SHA1827fd5c6352e427339c81a5ac02c49c6096bc866
SHA25689ca2f62f8c1f84d4c3a7dbe1cc4cda869f461c85abb8755b8cbe801c855e68f
SHA5123285d16eb998bdd51431218ba63840590732c818b915a925d68f62713a1a3b5389745fbe83ccfd23d4168621f6fc56241a544d1f622ce764b9d1ef5a23954e09
-
Filesize
18KB
MD557c9cdbff3c94d82d109c22f24d8d8d4
SHA1f54b09a6bd857ea870a3e8d08b6175421b60a25b
SHA256d31550bb647145de2b9f5d8fee7a3f3b50441b37db2acfc7b43c54078cd16ba4
SHA512cf5390f68978c1159b3db53b586e939167b386009e31da230d113caccbf90f3bb2ad600fd267b3ce85800294890649e9d6e8f8b6dbab2dfc4cff720e8c160a6b
-
Filesize
18KB
MD557c9cdbff3c94d82d109c22f24d8d8d4
SHA1f54b09a6bd857ea870a3e8d08b6175421b60a25b
SHA256d31550bb647145de2b9f5d8fee7a3f3b50441b37db2acfc7b43c54078cd16ba4
SHA512cf5390f68978c1159b3db53b586e939167b386009e31da230d113caccbf90f3bb2ad600fd267b3ce85800294890649e9d6e8f8b6dbab2dfc4cff720e8c160a6b
-
Filesize
328KB
MD5f7678d8edac9ffe1f5c8a90709c41e8b
SHA121f995b547de3fa27a68ec5d5f88c61a698c02b3
SHA256f6fd9de8da28a1a03cbbfcbdd9166121e608250999d59ec77d1506e547f8853a
SHA512f8c4ef52dac675a0f0fe9b46f1288077967a123ddba80808df1fc62c6177d3c077fb0d0345b896f4347a105772fd4f2c2665b660e1c6616df7364e739618ff2c
-
Filesize
328KB
MD5f7678d8edac9ffe1f5c8a90709c41e8b
SHA121f995b547de3fa27a68ec5d5f88c61a698c02b3
SHA256f6fd9de8da28a1a03cbbfcbdd9166121e608250999d59ec77d1506e547f8853a
SHA512f8c4ef52dac675a0f0fe9b46f1288077967a123ddba80808df1fc62c6177d3c077fb0d0345b896f4347a105772fd4f2c2665b660e1c6616df7364e739618ff2c
-
Filesize
328KB
MD5f7678d8edac9ffe1f5c8a90709c41e8b
SHA121f995b547de3fa27a68ec5d5f88c61a698c02b3
SHA256f6fd9de8da28a1a03cbbfcbdd9166121e608250999d59ec77d1506e547f8853a
SHA512f8c4ef52dac675a0f0fe9b46f1288077967a123ddba80808df1fc62c6177d3c077fb0d0345b896f4347a105772fd4f2c2665b660e1c6616df7364e739618ff2c
-
Filesize
328KB
MD5f7678d8edac9ffe1f5c8a90709c41e8b
SHA121f995b547de3fa27a68ec5d5f88c61a698c02b3
SHA256f6fd9de8da28a1a03cbbfcbdd9166121e608250999d59ec77d1506e547f8853a
SHA512f8c4ef52dac675a0f0fe9b46f1288077967a123ddba80808df1fc62c6177d3c077fb0d0345b896f4347a105772fd4f2c2665b660e1c6616df7364e739618ff2c
-
Filesize
328KB
MD5f7678d8edac9ffe1f5c8a90709c41e8b
SHA121f995b547de3fa27a68ec5d5f88c61a698c02b3
SHA256f6fd9de8da28a1a03cbbfcbdd9166121e608250999d59ec77d1506e547f8853a
SHA512f8c4ef52dac675a0f0fe9b46f1288077967a123ddba80808df1fc62c6177d3c077fb0d0345b896f4347a105772fd4f2c2665b660e1c6616df7364e739618ff2c
-
Filesize
328KB
MD5f7678d8edac9ffe1f5c8a90709c41e8b
SHA121f995b547de3fa27a68ec5d5f88c61a698c02b3
SHA256f6fd9de8da28a1a03cbbfcbdd9166121e608250999d59ec77d1506e547f8853a
SHA512f8c4ef52dac675a0f0fe9b46f1288077967a123ddba80808df1fc62c6177d3c077fb0d0345b896f4347a105772fd4f2c2665b660e1c6616df7364e739618ff2c
-
Filesize
328KB
MD5f7678d8edac9ffe1f5c8a90709c41e8b
SHA121f995b547de3fa27a68ec5d5f88c61a698c02b3
SHA256f6fd9de8da28a1a03cbbfcbdd9166121e608250999d59ec77d1506e547f8853a
SHA512f8c4ef52dac675a0f0fe9b46f1288077967a123ddba80808df1fc62c6177d3c077fb0d0345b896f4347a105772fd4f2c2665b660e1c6616df7364e739618ff2c
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7