Analysis
-
max time kernel
19s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 02:02
Static task
static1
Behavioral task
behavioral1
Sample
f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe
-
Size
1.6MB
-
MD5
f8773716460bbffd6ca7747301d73d78
-
SHA1
640643fb458e5f4faa92721faeda202e2096e387
-
SHA256
f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae
-
SHA512
68824288a6f8c9e8857ab5c5bcc3b34d166da53e24e6591d480d9e1050af57e14c00c1c2b20f60ded76fce2a4d3cabd4b441dc194f64a726861988c4e7897d7e
-
SSDEEP
24576:6tb20pUaCqT5TBWgNQ7aJXpGb3Lspm5Pd/pX6AXsqjnhMgeiCl7G0nehbGZpbD:nhg5tQ7aJXpGb3ImzB5rDmg27RnWGj
Malware Config
Extracted
redline
FOZ
212.162.149.53:36014
Extracted
agenttesla
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/1784-134-0x00000000055E0000-0x0000000005606000-memory.dmp family_xworm behavioral2/memory/1784-140-0x0000000005870000-0x0000000005894000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1784-510-0x0000000008090000-0x00000000080E2000-memory.dmp family_redline -
Redline family
-
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk svchost.exe -
Executes dropped EXE 8 IoCs
pid Process 3060 alg.exe 3308 DiagnosticsHub.StandardCollector.Service.exe 1900 fxssvc.exe 1244 elevation_service.exe 3224 elevation_service.exe 2644 maintenanceservice.exe 3332 msdtc.exe 2180 OSE.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" svchost.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/540-0-0x0000000000400000-0x00000000005A5000-memory.dmp autoit_exe behavioral2/memory/2644-82-0x0000000140000000-0x0000000140155000-memory.dmp autoit_exe behavioral2/memory/540-81-0x0000000000400000-0x00000000005A5000-memory.dmp autoit_exe behavioral2/memory/540-112-0x0000000000400000-0x00000000005A5000-memory.dmp autoit_exe -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe File opened for modification C:\Windows\system32\dllhost.exe f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe File opened for modification C:\Windows\system32\msiexec.exe f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\9e1d2effe5a029dd.bin alg.exe File opened for modification C:\Windows\system32\AppVClient.exe f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe File opened for modification C:\Windows\system32\fxssvc.exe f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe File opened for modification C:\Windows\System32\msdtc.exe f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 540 set thread context of 1784 540 f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe 92 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe alg.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{87F23B05-A117-4666-BB8C-A9C77E6BFB56}\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler64.exe alg.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateOnDemand.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe alg.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1784 svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1784 svchost.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 540 f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 540 f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe Token: SeAuditPrivilege 1900 fxssvc.exe Token: SeDebugPrivilege 1784 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1784 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 540 wrote to memory of 1784 540 f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe 92 PID 540 wrote to memory of 1784 540 f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe 92 PID 540 wrote to memory of 1784 540 f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe 92 PID 540 wrote to memory of 1784 540 f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe"C:\Users\Admin\AppData\Local\Temp\f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\f004d128db0d7e80af095757c5ca81e475e4323148a5a6528e974c66a1a76eae.exe"2⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1784
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
PID:3060
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:3308
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1712
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1244
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3224
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2644
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3332
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD50c9645890afab56f90acd44916f1406a
SHA1031b98397d784b425f05d697e24d29d7f5afb388
SHA256b4239d7530db9675677cc4073979d1a8d65a9dac92f8308db92d5899ba8f057e
SHA512984a50af8e1532d85ef5edf39566ae346223478bc3fd06387807100d1b0dadf8b359ac9637751b0494752435710f65d5192ed346e2bb4a67bcaa9270529fb47b
-
Filesize
1.3MB
MD506dcd5f18ca6583344fea738184828b5
SHA131f0581aeb4006cdd6a8cf5faba4a84ee69f7a51
SHA25658f0af1fb1202055973eb0df8ee691f4d4e9e16ad168b71a5698afa0cf42b100
SHA512eacd00f1592fe4a43b6fc25503623d8b44005c09a5bb844c413fe14f1826d2c2c9e6948dc777c1d9edb07e86a07cc129bba69aadcf2c7dcb20409eb113932cbb
-
Filesize
1.3MB
MD5f477da9a286a915298f09a7327d89236
SHA17573caa1a1d3db336a9d894754fff7a84cae8c43
SHA25625eda8e6d2c13a086f75a62c13831c48e763243c30567195246e9576b41dfe64
SHA5127e15d7eb7b6d191b9448602525456abf76a64262a5f2790e4901b16247fe629aef2f34a80ed27b4eafdcf01138769600325f3781e1a1be1b343d6c54d21e5d40
-
Filesize
2.1MB
MD52dc6603413e4d5f1aed8765ab13f0aad
SHA11a1312f6da22bd2590444284832325b760a1c146
SHA256391023a4656fceb2dcc58be6eb5000bd874b96168445e9f044cdddf1a69444fb
SHA512293577ff8cb83ddd3ed086899d86d9afd12d331d79f853ccf0398496b4450522df91aefc26c909fc354d5f8ea83dff636c46cb0c4261c29942482221b1ed3b92
-
Filesize
1.1MB
MD5cd747a2a10e48b08abff9063f730588a
SHA17c02843984da6db88c0be3d03d68e91b5c1518f2
SHA2565a11b5bac78cb76e108d9597fda90d1ab46995424dbcaecf0d00be3d4a2795cf
SHA5127955b455d9213b28ac357051c1f79a5c7902329a67030bc8a88182df7b76028457ed14ea98eaf9bf99949e0bed1cb1046038e11e5e9122897b2f2f79a5460142
-
Filesize
1.2MB
MD5ed5a1531c4892dce06e785c4f3825b69
SHA1ae8ad26d12cb7679186eddda1b4d6f6396cb48a0
SHA256d43afa086e1f3dc8462fb344edd1998c7c9795f134146ec62ca3c4caca1f4de7
SHA512bce918370ccc9707d07a88920947afaf4f770b702003bdba9027306289e034864337fe479e67305b241564f27f50654f2d74573717ba880bc0d754f33160bcdf
-
Filesize
1.2MB
MD551fcd6612ad42736433f98b1fb745d92
SHA13a5610a0fb17329c2fe6c5e5e5aee296ffd3612d
SHA2561cb78038111137e513513d82c9794241013c6eacacb99e2fe2c3f9b136e07ccd
SHA5124b64ced7a782db3b289df91ec508d74ce0fa452b7d7212c25ab34759f5f8bf573980fba1b07072713637ed4e9f30addc5b3311ab2d0ac93cfdc19aa3d0276d8d
-
Filesize
1.2MB
MD5758bed9fd7bb1c59a2d6adc6b8d21be4
SHA183b51ffe5867c4b7d50286b4c230dd30524b1f64
SHA256ce3bc8feef7b2d7bea6677a60a5930e868a8029a52c1d9ad9085d314d4ec721a
SHA51206f48d671b18e01763780ed9016c7cee21c6fa0089bd49bccfd88e2f9ce4a3c471de515cc25825d1a6ecf4cbe56594832a7b9c8f6840178875e8abfd09b5eeef
-
Filesize
1.2MB
MD5963228137690aa0260e381cd18a4a784
SHA1ff2e2b0176cdf961dee3790eff389578ff8696d3
SHA256e331a0760ba65aa55c35d18750c3a8b2b38ec360f742389ac3071c5c22eed875
SHA51295de3e52937f0329dda1f6d16711c630c985d168f8e282e81877872f5a282d6dbbcf5e6ebdd2798bf9052913dbafa1f9aaf9a984c02b18ae6e55eed51dec420e
-
Filesize
1.3MB
MD5d151a8488784d8a66579a5d213d04975
SHA1f8d21ff78c789823bb7b67a26ca4f3eb56d97eeb
SHA256195b830ae0f0fd77df4f0bd5d9df154599c540cc0ceb802ab85972a312299044
SHA5125ec7cbb4f1cf736cae701c9b1ac023146e8c2cadc3237c464c1fce2d2b5e93bd080acaf2db12d861c5dc53a804810c2eaab58dc378bd0af99c2cb201de689e6c
-
Filesize
1.1MB
MD5c13d60c75d2c5f8c41d9de55b2eb4a4b
SHA1b81e8c1f2a7a2416c6bae7354b0e5aaca0695137
SHA256c990371f6730af505ce25ac1865e634f347da16497f8ea9b104cb98d99e481c5
SHA51280a64369f3bfc9796b2b6b782d4cce11926b0980efa7bc9c9ed9ade9f9dfcdb424d782749b70ea79906d6b282c1375d451f05a18a1d2645269cc82a2f3047e25