Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/12/2024, 09:56
Behavioral task
behavioral1
Sample
d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe
Resource
win10v2004-20241007-en
General
-
Target
d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe
-
Size
8.4MB
-
MD5
5a7d823359c21af24512dd647c0c3063
-
SHA1
8478412d6375084597d944dc231a5b8ac16817bd
-
SHA256
d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18
-
SHA512
8e3ebafc02d4755fd7bccff4a9edb291e9b2642f5b47bc92fb78018602ebec2a12a432b53c290001444f77ff967229422711564ea21e5331143557d2f79e5778
-
SSDEEP
196608:tLUdwAmXaSMDdu+FtEF+mt6faSbMdoQDrCqIgxf0OKt72:tW5mKRDdu+MF+xfaSbuoQPLxFKt2
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x000500000001a463-597.dat behavioral1/files/0x000700000001a463-621.dat -
Executes dropped EXE 5 IoCs
pid Process 2116 ._cache_d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 2820 TeamViewer_.exe 2808 Synaptics.exe 1796 ._cache_Synaptics.exe 896 TeamViewer_.exe -
Loads dropped DLL 31 IoCs
pid Process 1300 d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 2116 ._cache_d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 2116 ._cache_d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 2820 TeamViewer_.exe 2820 TeamViewer_.exe 1300 d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 1300 d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 2820 TeamViewer_.exe 2820 TeamViewer_.exe 2820 TeamViewer_.exe 2820 TeamViewer_.exe 2820 TeamViewer_.exe 2820 TeamViewer_.exe 2820 TeamViewer_.exe 2820 TeamViewer_.exe 2820 TeamViewer_.exe 2808 Synaptics.exe 2808 Synaptics.exe 1796 ._cache_Synaptics.exe 1796 ._cache_Synaptics.exe 896 TeamViewer_.exe 896 TeamViewer_.exe 896 TeamViewer_.exe 896 TeamViewer_.exe 896 TeamViewer_.exe 896 TeamViewer_.exe 896 TeamViewer_.exe 896 TeamViewer_.exe 896 TeamViewer_.exe 896 TeamViewer_.exe 896 TeamViewer_.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeamViewer_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeamViewer_.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1060 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 896 TeamViewer_.exe 2820 TeamViewer_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1060 EXCEL.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2116 1300 d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 30 PID 1300 wrote to memory of 2116 1300 d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 30 PID 1300 wrote to memory of 2116 1300 d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 30 PID 1300 wrote to memory of 2116 1300 d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 30 PID 2116 wrote to memory of 2820 2116 ._cache_d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 31 PID 2116 wrote to memory of 2820 2116 ._cache_d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 31 PID 2116 wrote to memory of 2820 2116 ._cache_d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 31 PID 2116 wrote to memory of 2820 2116 ._cache_d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 31 PID 2116 wrote to memory of 2820 2116 ._cache_d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 31 PID 2116 wrote to memory of 2820 2116 ._cache_d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 31 PID 2116 wrote to memory of 2820 2116 ._cache_d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 31 PID 1300 wrote to memory of 2808 1300 d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 32 PID 1300 wrote to memory of 2808 1300 d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 32 PID 1300 wrote to memory of 2808 1300 d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 32 PID 1300 wrote to memory of 2808 1300 d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe 32 PID 2808 wrote to memory of 1796 2808 Synaptics.exe 33 PID 2808 wrote to memory of 1796 2808 Synaptics.exe 33 PID 2808 wrote to memory of 1796 2808 Synaptics.exe 33 PID 2808 wrote to memory of 1796 2808 Synaptics.exe 33 PID 1796 wrote to memory of 896 1796 ._cache_Synaptics.exe 35 PID 1796 wrote to memory of 896 1796 ._cache_Synaptics.exe 35 PID 1796 wrote to memory of 896 1796 ._cache_Synaptics.exe 35 PID 1796 wrote to memory of 896 1796 ._cache_Synaptics.exe 35 PID 1796 wrote to memory of 896 1796 ._cache_Synaptics.exe 35 PID 1796 wrote to memory of 896 1796 ._cache_Synaptics.exe 35 PID 1796 wrote to memory of 896 1796 ._cache_Synaptics.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe"C:\Users\Admin\AppData\Local\Temp\d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\._cache_d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe"C:\Users\Admin\AppData\Local\Temp\._cache_d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer_.exe"C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer_.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2820
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer_.exe"C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer_.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:896
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD55a7d823359c21af24512dd647c0c3063
SHA18478412d6375084597d944dc231a5b8ac16817bd
SHA256d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18
SHA5128e3ebafc02d4755fd7bccff4a9edb291e9b2642f5b47bc92fb78018602ebec2a12a432b53c290001444f77ff967229422711564ea21e5331143557d2f79e5778
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
27KB
MD5933fef0dbab5506b45a49d18afcb873c
SHA104503fd9084abb2066ac14eab958039b16857dea
SHA2562a828b3c262b10fa1816da43c484036e62569ae413db3fb9908b2a326332bdff
SHA512f29d80d83ccb3231de9ee04b7a0a1320bc0484d3a56644130a2b5e3ebb588ba0a5acbc8f033b001a8be552c3e038b4a37fe89a6a0ed35c479e2d5bb2c803188e
-
Filesize
29KB
MD58bc98ec76f91313ce52fa157ea4d00ca
SHA13dee2ceb34f23ad39c26cf3644d579f62062b808
SHA256840e6807f00a8e2a03d847c2133ed8fea9aa029e390e14afee2213f5a6a75d62
SHA512c3f9dc865b8c7c91431f41710280037b0fc823a8cd6daf70fe3717fecf1e536f4bfce64d7760c0283f9ff4959f94665641a1e4de3e28ca35a8b8e2cdff47b72a
-
Filesize
30KB
MD5d3c8b13988a86f7da3800fddc8cad6d0
SHA13f4b84dc2ab8320332a3a301c0914fd0e22178c7
SHA256259a8bdbb4af8747ef9a01b3d3df50b9bd04daed52359535b5dd7226f83bbc47
SHA51272a8c2fb3b2c5417a3d0e1e82d6dd217f166cfe88521c1a8735195c54f33d69b766455d77dd0091915b606d36cda780283a55cf36da3780b242c45484f579bed
-
Filesize
7.5MB
MD52f33659e551eac0332b2bd9f228fb811
SHA15e8c5e0e5e6d871740d163b7a81beeae709b3942
SHA256a52f02c33354022b329f86f6283235aa7a58942e60659dcce3069d3a873845bb
SHA512653b8632c1aeddfbe90a9a8e94966a8f3660bb42edb7dcce303f23f5d95f568a7e2d7dc3d7b3a2ba0657877812829f7aae49a08c1a4da792d450f2d4a9b5df51
-
Filesize
47B
MD5b79df1c7a14576aeee74a58fdac22c69
SHA13cb7c8558f62f0c7b641c451d5c871cbd1bb951c
SHA2566fc06809746090e4c55613cc16b7f673b89e4dd49a34f0f72c6f3d54225a5f75
SHA512cfc5207320b56f5df83d5afc6256a9a594bcdc3de846747e09306ecfa5a4d1ff33f14327e5e4dddb26fab2b4fbd59dc912c5e7d5d9791e88179cfc3b3d919930
-
Filesize
102B
MD569a564a941c3b40b7745d8d30f77095c
SHA105a5b4e997bcdd9d8214ed7c77425eb871546fd5
SHA256dc2f88879af6cc7301370feac2e0fc83724e1641bfa3224b228c83eee8c680a5
SHA5126100b07556d54f4f953b9584383299bb5cfe42743fad45565144392c75b469c0d5db66e91680fff7f824da7ae139f6642197dbb016192a20e6f4b06ad034ca5a
-
Filesize
2KB
MD54083fafdd57e2e1ecf772e3b6f519127
SHA1d875623dcd4217ba098166243649a5625c03e9ed
SHA25641ef0753c96e910c05b249e86cf36a6f29b8e86fa921e976a2a8e81eb377b84f
SHA5127efd62d188690f4a347ee08660a8132dc0fed7a6f865e71d2ce8940072d9d1daf8bfc60927496bc6a82eb4c3e308c35261934d4bb4bffe3fe88a5514d6b226b7
-
Filesize
2KB
MD55e75d47fb8bfa4ae6badc693b7f6b931
SHA1e5a16186bed439d03e765cda4bdc68e72c75886a
SHA256e2233fcc2d03a1151b4fac1a10fcb50cb6bda247633e899d17c417cf8175aaa5
SHA51246d666bd096559e19913417b33506d68fd36cd7d99b6ccca2caf4830184e8f5d4892cbb8057cb4c285abac3517e4ae4227879dddc1db027be5175a38b56b132c
-
Filesize
2KB
MD550287aa66db8bd36ace375dc05bbc15d
SHA1d7df4f7e56c21b6c6d466f4934f0e07e0be15225
SHA2569a4dbb32dbbdb6c36ef2f5127b32e8b8d1e4cb5151376a4c47889b363d36f818
SHA512c86229c42d33811bc88a408747f5cddd52621c80607675f2dc4b08c1036cfaa860b1096047fa8a33548b595ed796fde6c79a5227705e38f5eb078840b585ec78
-
Filesize
2KB
MD5068690331214ec69c7431310ea725cfb
SHA14469ae178989aec50a3f784a58a491a5e9d0b113
SHA256cb3d06aebb190e5c5d66b5652da729ceea5b462b28abe47d222acef2f669aad6
SHA512cc952a4077c31e82c36c1c44612867d7ead5cdd0b14228007398b12efcb67a934022a110720e4619287549282b37d088976063fcdef6bc6f765c2c205ed94873
-
Filesize
2KB
MD5d40ae8e5e1890cabdb6745f455be4c16
SHA179541e1d10f40cd067297b29ddaee71772429d46
SHA256a8ce6fb2050975d4d3c281f28f64acaa2f2226869b504c2aec6079caa5c1f9df
SHA512ada63d638e62cec4077819ec0a7076d5678674d000baa01464e434d3bd9960194899724b64c15c96741bcbcaace85bb04b557653f9e2d5dfdd7b467de117d893
-
Filesize
2KB
MD5bfde71137ae33efeb3826ece9eecfb44
SHA1436ab1716f23d0139a7c79454f392feb6d88a8ab
SHA256ab8826fa1877a1049941490d32013486cfff3b9b73d7c002d8eaaa6638b8181e
SHA512c0f305cb87c92c83b75c3a1dc96b905d80e954722c0d2598e65548517462b8801b05a86b9631c2468e80662675379aaa4503955cc18be13cac48bbfef3f817dc
-
Filesize
153KB
MD5a366cd40b73d191cdb1aa7b14267213f
SHA1d7bad68f24127972b1363c44ad3a225fdf3d3659
SHA2563d661aaac7698a5b4611ca22bda5e0194d90ec238d9dfe7e4ab38a8d866176b0
SHA51296ea62df2ec21d80eae9a48c23fe38601564aa942e1e02013f1d78497ff4d9a332f41a4105c4d79e632b24bb7e75b1532d1a58e790c929570da51d6584e2eb8e
-
Filesize
1KB
MD58b3e104f11c5d046bd93df4e9fb40f4e
SHA10362bb65744a07563dc05cd612dd54a865233d79
SHA256cc18c611578d796a879cac46746406dbaa96eddd544d7a12d4fa56856cb2cbc1
SHA512edc08be542234c3ed6a94c46c610eb5398782c580859eda11f35df6112b3dfee10cf4be068c7a87f39a339f10a9176350cae9f657857375d641a35d5d151ced8
-
Filesize
2KB
MD56138b2d6d6aed09dba5e804e5ac7e66b
SHA1e70407a9934cb73fe1a308d47697d79e649e9e4f
SHA2563962204dfef72b646696c1706201b0df0ee80d6745f4d6b6d389e6d8000005bf
SHA512516fbd080024330c4ee0ced662571818561678a9f032a4ff3ee1ddef9aa945667dcf248dac221224f5aef728a0cc899380e76d9213614a4d65d44b86b822b156
-
Filesize
2KB
MD5f6df0f2a0f1c75e6723dc686f6cc36d7
SHA1e96bcd0d9189aec9ffda8de30ed50e31c62332f5
SHA256470d659b01ee033083c38fa42fa124af74101ff56410f96c576256954bd33bf1
SHA512e49bcc13d5968346b31e53a7f07ce5aa60b2d7a85483184385d599fadc971dd154a246c5a6fc3e16a7be1a42446b224475d5dc8420f0e94073c514182c5dc980
-
Filesize
2KB
MD5bd9dca7cab230b21bc4dba7a83bd0d2c
SHA1a10cf0d5fed42bd795bec3e86227c541c394c46c
SHA256b82b65d759765d704fe252f3495a80806bace743b1d0afb9636e73551db1b8a7
SHA51228465e1e27922696557622b9659a9eb402ffa604c4d7dde60054c50ad7a1bd334fc9ce5fc8a120cee0a85a9f4772e1a174cd914a015874ff014eb72594283474
-
Filesize
2KB
MD50b9af32e630b312bcdadad85a3eb8c91
SHA1595cb4e086929bde69d4127f3da106c97a9e9ba1
SHA256038d4f2aad8020b17f892714aa48dafdbcb638dd67551fb04b7e87b8508479df
SHA5125ee17da10b15a51efc64afb95403c75951a715f1d8caf123a74f1be2ca3518029a06d3cdd832f35a2755e6d1c2a0f7160ffdd2ba3670bc1259f4c68914c181fe
-
\Users\Admin\AppData\Local\Temp\._cache_d584e58130d63580e6ad71f41f09ca5b765d0516d26749e9ace7bc85d49c7a18.exe
Filesize7.7MB
MD56ff62388b265f3682a390417ae4b47d6
SHA18e7afffd442a54ce004972181b0eec6d34270634
SHA256b0edb941157eb8bb6b1e80d53b0ad2bce180f54abffddc08b7e7b2d20be445c1
SHA5123429572e0d634ea4eeb01cf903e6ca654b993a0abe698bb6e682a86c4d3405216c58da70a9d58aaf81cb19dad51a009974f746885a5545d44809db3257a81a68
-
Filesize
15KB
MD589351a0a6a89519c86c5531e20dab9ea
SHA19e801aaaae9e70d8f7fc52f6f12cedc55e4c8a00
SHA256f530069ef87a1c163c4fd63a3d5b053420ce3d7a98739c70211b4a99f90d6277
SHA51213168fa828b581383e5f64d3b54be357e98d2eb9362b45685e7426ffc2f0696ab432cc8a3f374ce8abd03c096f1662d954877afa886fc4aa74709e6044b75c08
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
45KB
MD54ac3f0ab2e423515ed9c575333342054
SHA1a3e4f2b2135157f964d471564044b023a64f2532
SHA256f223d6c72f86544b358a6301daf60ccdd86198f32e3447a1860acf3f59f2dae9
SHA5128fbd5b4989be51c27fa15af155d2921bea9aa5d0557a22d4224256e678dfe7dcaa5f80917a748c31dc9c9a91573e4618e2497ccfd47eefd7a0fa08c12366a1e5
-
Filesize
4KB
MD5c7ce0e47c83525983fd2c4c9566b4aad
SHA138b7ad7bb32ffae35540fce373b8a671878dc54e
SHA2566293408a5fa6d0f55f0a4d01528eb5b807ee9447a75a28b5986267475ebcd3ae
SHA512ee9f23ea5210f418d4c559628bbfb3a0f892440bcd5dc4c1901cb8e510078e4481ea8353b262795076a19055e70b88e08fee5fb7e8f35a6f49022096408df20e