Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2025 06:02
Behavioral task
behavioral1
Sample
bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe
Resource
win10v2004-20250217-en
General
-
Target
bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe
-
Size
1.1MB
-
MD5
2168efe511da4705864cc5ddef26edd1
-
SHA1
d934033eb8f74c47e69063d13574bf571a19ee2e
-
SHA256
bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206
-
SHA512
a3d23b94a8f0620c1ed0d1ed3529794ad2ae6909de5f0b9c79eb33af47a47d3f562d107e7e70dc7cef7ba4a8b27b76669e1679fefec3d12f1cc4db4cfa66ac2d
-
SSDEEP
24576:iap2f3ptaCOa6hw+6GD9kuu1OUjezCk4o5BSj17Qd:ufaC76hw5GDauukUjez+PpQd
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 6 IoCs
pid Process 8 svchost.exe 2196 bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe 4164 svchost.exe 2564 ._cache_bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe 1384 Synaptics.exe 2132 ._cache_Synaptics.exe -
Loads dropped DLL 4 IoCs
pid Process 2564 ._cache_bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe 2564 ._cache_bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe 2132 ._cache_Synaptics.exe 2132 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 52 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe svchost.exe File created C:\Program Files\Mem Reduct\memreduct.lng ._cache_Synaptics.exe File created C:\Program Files\Mem Reduct\History.txt ._cache_Synaptics.exe File opened for modification C:\Program Files\Mem Reduct\uninstall.exe ._cache_bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File created C:\Program Files\Mem Reduct\uninstall.exe ._cache_Synaptics.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe svchost.exe File created C:\Program Files\Mem Reduct\memreduct.exe ._cache_Synaptics.exe File created C:\Program Files\Mem Reduct\Readme.txt ._cache_Synaptics.exe File opened for modification C:\Program Files\Mem Reduct\memreduct.exe ._cache_bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe File opened for modification C:\Program Files\dotnet\dotnet.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File created C:\Program Files\Mem Reduct\memreduct.sig ._cache_Synaptics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe File created C:\Program Files\Mem Reduct\License.txt ._cache_Synaptics.exe File opened for modification C:\Program Files\Mem Reduct\History.txt ._cache_bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe svchost.exe File opened for modification C:\Program Files\Mem Reduct\memreduct.sig ._cache_bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe File opened for modification C:\Program Files\Mem Reduct\License.txt ._cache_bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe File opened for modification C:\Program Files\Mem Reduct\Readme.txt ._cache_bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Mem Reduct\memreduct.lng ._cache_bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4244 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4244 EXCEL.EXE 4244 EXCEL.EXE 4244 EXCEL.EXE 4244 EXCEL.EXE 4244 EXCEL.EXE 4244 EXCEL.EXE 4244 EXCEL.EXE 4244 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1696 wrote to memory of 8 1696 bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe 87 PID 1696 wrote to memory of 8 1696 bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe 87 PID 1696 wrote to memory of 8 1696 bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe 87 PID 8 wrote to memory of 2196 8 svchost.exe 89 PID 8 wrote to memory of 2196 8 svchost.exe 89 PID 8 wrote to memory of 2196 8 svchost.exe 89 PID 2196 wrote to memory of 2564 2196 bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe 92 PID 2196 wrote to memory of 2564 2196 bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe 92 PID 2196 wrote to memory of 2564 2196 bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe 92 PID 2196 wrote to memory of 1384 2196 bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe 93 PID 2196 wrote to memory of 1384 2196 bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe 93 PID 2196 wrote to memory of 1384 2196 bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe 93 PID 1384 wrote to memory of 2132 1384 Synaptics.exe 94 PID 1384 wrote to memory of 2132 1384 Synaptics.exe 94 PID 1384 wrote to memory of 2132 1384 Synaptics.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe"C:\Users\Admin\AppData\Local\Temp\bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe"C:\Users\Admin\AppData\Local\Temp\bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\._cache_bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe"C:\Users\Admin\AppData\Local\Temp\._cache_bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2132
-
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4164
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302KB
MD5fe8eb129610e454ad17b9d6ccbf1df8b
SHA128cfddbc7faf2e66aee0eec673c7eb7beab25510
SHA2568cea4adf5febfa9528d01259bf9b70afdb814ce8b41605b8c619a9738a9c9414
SHA5124aa488a5844eb65fe0f72d1ab325ba07a40fa0cae658bba38f59260c1467d5c902ae8bcd6d8e2f15a5c81139147155948f99a0e303ecca001f24a58d5c5de399
-
Filesize
86KB
MD56d97f86c3bfdd7932c664992c719b7ac
SHA10ebe79050d7d22ad7031d1a6b68907f7452e00ea
SHA256b6fd255bf6f0bd9ac665c7f2e930e5779f98059dbdbfa9656466b9bd484faacd
SHA51264fcf3dc8f8b08472b7b334872ada5269b993ed62829356b11912d81a7d655ca3fc56879a5915923d8552b4b96a9322e36ffedb254ddeccb015fb381fbbdf744
-
C:\Users\Admin\AppData\Local\Temp\._cache_bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe
Filesize357KB
MD525db35058f16b6fe4b1425b0986ba716
SHA117b4f5bca2480079e68ea41a52651f34c3cd6a37
SHA2563555b6148f8bf9415c1b0db8b03c649b530670c7775631d6f26fda5eee547f24
SHA512735b58bcafb9382c5d9846756ffa079bc4aac0fd4ff039883382cc0251fdf77bb660e51b9b133dc2fcdc2bfa93c75b6148e0c2cc71ea949c8694407a29fac679
-
Filesize
23KB
MD5524fb5522730101d4b1fa89b77290af1
SHA1845042dff9abc22200c43353daf64c286dbbc790
SHA256ac023d59cb73f300109b786acf9cb447334edd13ec5f21ce1dca7b600b0fb15d
SHA5127620c04fae56a3681402da7dce7a28ce3fe6dd8d5fd024a8de4a3b8dfe308f242c59a0a81f79a7aa01fd52b60ee0c7e677fc577cb8badc60d92ec3e6b43c7b5f
-
C:\Users\Admin\AppData\Local\Temp\bc24fa45f522637e923c1e64346be2a9b0d02f64a1beeed3a0e70170ddea0206.exe
Filesize1.1MB
MD546fe00b3d1eadceba58ded687916b27f
SHA1f08fb994e842a4cfc62e7bd942a0879b27a94774
SHA256d3bf3fae35f44dcd791049693ebb9985dc97400cd882a12ec06cfbbe50b88ee3
SHA512a12458c6ab2a9a45d21133491574a9c027bb7745261c1ea670ff07736ded618c9ee9f68da066cedfd104cbb108301b43fe24848de17c37e62d268006b8ea8b8a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
11KB
MD575ed96254fbf894e42058062b4b4f0d1
SHA1996503f1383b49021eb3427bc28d13b5bbd11977
SHA256a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
SHA51258174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4
-
Filesize
9KB
MD5ca95c9da8cef7062813b989ab9486201
SHA1c555af25df3de51aa18d487d47408d5245dba2d1
SHA256feb6364375d0ab081e9cdf11271c40cb966af295c600903383b0730f0821c0be
SHA512a30d94910204d1419c803dc12d90a9d22f63117e4709b1a131d8c4d5ead7e4121150e2c8b004a546b33c40c294df0a74567013001f55f37147d86bb847d7bbc9
-
Filesize
150KB
MD552ff52eee3b944b862c11c268a02c196
SHA18d041966e6fba10aa5e10ce5dc1dc5175f11b2fe
SHA2562079f7a3eba60e0d9ee827a7208aa052a71b384873b641de5e299aeb8e733109
SHA5122861ae5a06f8413810947c08994f4c0da54a1acee8c4df72cd8b03a9503b26e5512809f8d70fd584239b04a651e7329a701bf7ddcee2dec2c2e14d05ae74f220
-
Filesize
903B
MD5ca97c8d434c047a83c596211c11f6c7e
SHA19f60d3f5d19ae3b5dc9446b63c26370a4bc94aeb
SHA25695434c94367bcbae8ba65400306563db6ee58e311f3f0a451d25feff88d570cc
SHA51283dd90fb1446d10adee0b6366db383f64d00473d2c2437afbf7933a86088c967603ddb575f31b578e3a48e43971795ba719fb8c216984601253a6c05664fc5ac
-
Filesize
903B
MD52ecdac1bbfced66dda3f8b987227ce81
SHA1aa30e98e50f4cd7907ae14e7a8f6ed712d615dad
SHA25689b4f4def43dfc4fd09c01fedb6cc724c8d65e8fe468130047d7aa685c532866
SHA5126c7b3004cbeb327db11ab0fb625312394c492446408ca436244fa164d902b44d7c54a29c5217ac3882f02a241c3e9e73ad4329275c10cc117482c0e7756b9e6c
-
Filesize
898B
MD540724a504a57ca1256349f30b4f812f9
SHA1b9e3aa4ef8012269a6bfb3bfff9afd9614d0fb99
SHA256841fc6910ae8334b371538dbdb317fa62e9aae33a700c9baa984abdc27215937
SHA512df338b3077142a34b8a1c1f872d2797dcab2a56be479d160430f8bb8ce5f69498bbaec23feb28ee99904259777ff92ad1616e6cd1793cb9136481929c5ad32f2
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b