Analysis
-
max time kernel
124s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 03:56
Static task
static1
Behavioral task
behavioral1
Sample
4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe
Resource
win7-20220715-en
General
-
Target
4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe
-
Size
3.2MB
-
MD5
36cec5d837f6c92e84a1f3e3e684c75d
-
SHA1
25b9335f00f4c5df73b15075d80caacd7c1a61f4
-
SHA256
4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166
-
SHA512
d4a1ffcd1dc5583cc968056c64480733652d7d2de7cb5c85788ddc92c78b486b5d7019ec5ddb90d309c80d74f234f0d1bd9b0cf9a9531c86abaa9a130360aa26
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.sqlite3.module.dll acprotect \Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.sqlite3.module.dll acprotect -
Executes dropped EXE 7 IoCs
Processes:
Build.exeGH Inject.exeMP3DMOD.exeMP3DMOD.module.exeMP3DMOD.exeMP3DMOD.exepid process 1888 Build.exe 1332 GH Inject.exe 1384 2032 MP3DMOD.exe 832 MP3DMOD.module.exe 1068 MP3DMOD.exe 1896 MP3DMOD.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\GH Inject.exe upx \Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\GH Inject.exe upx C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\GH Inject.exe upx \Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\GH Inject.exe upx behavioral1/memory/1332-69-0x000000013FCE0000-0x000000013FECE000-memory.dmp upx \Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.sqlite3.module.dll upx behavioral1/memory/2032-75-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral1/memory/2032-76-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral1/memory/1332-77-0x000000013FCE0000-0x000000013FECE000-memory.dmp upx \Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.module.exe upx C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.module.exe upx \Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.module.exe upx behavioral1/memory/832-84-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral1/memory/832-87-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral1/memory/2032-88-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx -
Loads dropped DLL 9 IoCs
Processes:
4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exeMP3DMOD.exepid process 1576 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe 1576 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe 1576 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe 1576 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe 1576 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe 2032 MP3DMOD.exe 2032 MP3DMOD.exe 2032 MP3DMOD.exe 2032 MP3DMOD.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ipapi.co 6 ipapi.co -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\Build.exe autoit_exe \Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\Build.exe autoit_exe \Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\Build.exe autoit_exe \Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\Build.exe autoit_exe C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\Build.exe autoit_exe C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\Build.exe autoit_exe behavioral1/memory/1332-69-0x000000013FCE0000-0x000000013FECE000-memory.dmp autoit_exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exe autoit_exe behavioral1/memory/1332-77-0x000000013FCE0000-0x000000013FECE000-memory.dmp autoit_exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exe autoit_exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exe autoit_exe -
Drops file in System32 directory 2 IoCs
Processes:
MP3DMOD.exeMP3DMOD.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ MP3DMOD.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ MP3DMOD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
MP3DMOD.exeBuild.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\winmgmts:\localhost\ MP3DMOD.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ Build.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
MP3DMOD.exepid process 2032 MP3DMOD.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
MP3DMOD.module.exedescription pid process Token: SeRestorePrivilege 832 MP3DMOD.module.exe Token: 35 832 MP3DMOD.module.exe Token: SeSecurityPrivilege 832 MP3DMOD.module.exe Token: SeSecurityPrivilege 832 MP3DMOD.module.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exeBuild.exeMP3DMOD.exetaskeng.exedescription pid process target process PID 1576 wrote to memory of 1888 1576 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe Build.exe PID 1576 wrote to memory of 1888 1576 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe Build.exe PID 1576 wrote to memory of 1888 1576 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe Build.exe PID 1576 wrote to memory of 1888 1576 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe Build.exe PID 1576 wrote to memory of 1332 1576 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe GH Inject.exe PID 1576 wrote to memory of 1332 1576 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe GH Inject.exe PID 1576 wrote to memory of 1332 1576 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe GH Inject.exe PID 1576 wrote to memory of 1332 1576 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe GH Inject.exe PID 1888 wrote to memory of 2032 1888 Build.exe MP3DMOD.exe PID 1888 wrote to memory of 2032 1888 Build.exe MP3DMOD.exe PID 1888 wrote to memory of 2032 1888 Build.exe MP3DMOD.exe PID 1888 wrote to memory of 2032 1888 Build.exe MP3DMOD.exe PID 2032 wrote to memory of 832 2032 MP3DMOD.exe MP3DMOD.module.exe PID 2032 wrote to memory of 832 2032 MP3DMOD.exe MP3DMOD.module.exe PID 2032 wrote to memory of 832 2032 MP3DMOD.exe MP3DMOD.module.exe PID 2032 wrote to memory of 832 2032 MP3DMOD.exe MP3DMOD.module.exe PID 2032 wrote to memory of 908 2032 MP3DMOD.exe attrib.exe PID 2032 wrote to memory of 908 2032 MP3DMOD.exe attrib.exe PID 2032 wrote to memory of 908 2032 MP3DMOD.exe attrib.exe PID 2032 wrote to memory of 908 2032 MP3DMOD.exe attrib.exe PID 1596 wrote to memory of 1068 1596 taskeng.exe MP3DMOD.exe PID 1596 wrote to memory of 1068 1596 taskeng.exe MP3DMOD.exe PID 1596 wrote to memory of 1068 1596 taskeng.exe MP3DMOD.exe PID 1596 wrote to memory of 1068 1596 taskeng.exe MP3DMOD.exe PID 1596 wrote to memory of 1896 1596 taskeng.exe MP3DMOD.exe PID 1596 wrote to memory of 1896 1596 taskeng.exe MP3DMOD.exe PID 1596 wrote to memory of 1896 1596 taskeng.exe MP3DMOD.exe PID 1596 wrote to memory of 1896 1596 taskeng.exe MP3DMOD.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe"C:\Users\Admin\AppData\Local\Temp\4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\Build.exe"C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\Build.exe"2⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.module.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\ENU_687FE97579347BEE9D41.7z" "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\1\*"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:908
-
-
-
-
C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\GH Inject.exe"C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\GH Inject.exe"2⤵
- Executes dropped EXE
PID:1332
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8A606476-3A33-4FC4-8344-BD338C617243} S-1-5-21-3440072777-2118400376-1759599358-1000:NKWDSIWE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1068
-
-
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1896
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f254964421cff630da092d12a30ce1ec
SHA1451f5a335848faa7dfbce0b83d374b99c6f6547c
SHA25622be2d834b09d6fa8c1f67dd41eb274fec05f5f6682d3be6fbc8642695556cc8
SHA512ec91c8fa3d1cc624e623314003536d17379cbf4660e9b8c2d7e873d4865df9f626d53d1ab3de27ddb42e42bf626713388d818ef001bdbef716f998acb98e4bbd
-
Filesize
51KB
MD5d9b2a1278121e8b70325c7b51d431bec
SHA1874687a530581a614ec6b2b882cb104b84497518
SHA256b0153060812c3b68cc6e4971768289c5e8a753cf32b22b61c28107487702f8bc
SHA51203124cd47c60f8e7749e0b9260c182fda0e71b47d7fb0d936de03a4da743be95330b0bc4ae9e50d38a5771c9ec9b203302674cefe55398084a65ad17a7f72a64
-
Filesize
1.8MB
MD52d3271bf27d0b16d36ae52c52a6fecc5
SHA1b81c84bea56690dabe6344ac073528fafdaa8628
SHA2560d198296d0d1e20baaa3d93a18d7b11057cd1ed8a9612bac414d79b5f749792f
SHA512dcd636b07a973ac2f91d190cc1baa793240d1832cc288aa6e39c421449612966d679cf19a74fe341246129d4b91732df8f6a3429a89739bf59009aa25f0d713b
-
Filesize
1.8MB
MD52d3271bf27d0b16d36ae52c52a6fecc5
SHA1b81c84bea56690dabe6344ac073528fafdaa8628
SHA2560d198296d0d1e20baaa3d93a18d7b11057cd1ed8a9612bac414d79b5f749792f
SHA512dcd636b07a973ac2f91d190cc1baa793240d1832cc288aa6e39c421449612966d679cf19a74fe341246129d4b91732df8f6a3429a89739bf59009aa25f0d713b
-
Filesize
1.8MB
MD52d3271bf27d0b16d36ae52c52a6fecc5
SHA1b81c84bea56690dabe6344ac073528fafdaa8628
SHA2560d198296d0d1e20baaa3d93a18d7b11057cd1ed8a9612bac414d79b5f749792f
SHA512dcd636b07a973ac2f91d190cc1baa793240d1832cc288aa6e39c421449612966d679cf19a74fe341246129d4b91732df8f6a3429a89739bf59009aa25f0d713b
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
1.8MB
MD52d3271bf27d0b16d36ae52c52a6fecc5
SHA1b81c84bea56690dabe6344ac073528fafdaa8628
SHA2560d198296d0d1e20baaa3d93a18d7b11057cd1ed8a9612bac414d79b5f749792f
SHA512dcd636b07a973ac2f91d190cc1baa793240d1832cc288aa6e39c421449612966d679cf19a74fe341246129d4b91732df8f6a3429a89739bf59009aa25f0d713b
-
Filesize
1.8MB
MD52d3271bf27d0b16d36ae52c52a6fecc5
SHA1b81c84bea56690dabe6344ac073528fafdaa8628
SHA2560d198296d0d1e20baaa3d93a18d7b11057cd1ed8a9612bac414d79b5f749792f
SHA512dcd636b07a973ac2f91d190cc1baa793240d1832cc288aa6e39c421449612966d679cf19a74fe341246129d4b91732df8f6a3429a89739bf59009aa25f0d713b
-
Filesize
880KB
MD54c5663d6ec18f7d05fe4ecb100c020aa
SHA1193c6eccd581e89ea2d85daccb356059e340e89a
SHA256d99c2d6662e6db724442451c5e83de94a2fb0cd624bb26654e9ef8e3e9df38f6
SHA512ec938a227aee3bfb92edcc6c20a35faa8f5a04efa25b65dec67b58606e6c199357a6eefe4e9a131e0adea52e612ac537ccb42a664abe8c9ada8108f7e717130a
-
Filesize
880KB
MD54c5663d6ec18f7d05fe4ecb100c020aa
SHA1193c6eccd581e89ea2d85daccb356059e340e89a
SHA256d99c2d6662e6db724442451c5e83de94a2fb0cd624bb26654e9ef8e3e9df38f6
SHA512ec938a227aee3bfb92edcc6c20a35faa8f5a04efa25b65dec67b58606e6c199357a6eefe4e9a131e0adea52e612ac537ccb42a664abe8c9ada8108f7e717130a
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
1.8MB
MD52d3271bf27d0b16d36ae52c52a6fecc5
SHA1b81c84bea56690dabe6344ac073528fafdaa8628
SHA2560d198296d0d1e20baaa3d93a18d7b11057cd1ed8a9612bac414d79b5f749792f
SHA512dcd636b07a973ac2f91d190cc1baa793240d1832cc288aa6e39c421449612966d679cf19a74fe341246129d4b91732df8f6a3429a89739bf59009aa25f0d713b
-
Filesize
1.8MB
MD52d3271bf27d0b16d36ae52c52a6fecc5
SHA1b81c84bea56690dabe6344ac073528fafdaa8628
SHA2560d198296d0d1e20baaa3d93a18d7b11057cd1ed8a9612bac414d79b5f749792f
SHA512dcd636b07a973ac2f91d190cc1baa793240d1832cc288aa6e39c421449612966d679cf19a74fe341246129d4b91732df8f6a3429a89739bf59009aa25f0d713b
-
Filesize
1.8MB
MD52d3271bf27d0b16d36ae52c52a6fecc5
SHA1b81c84bea56690dabe6344ac073528fafdaa8628
SHA2560d198296d0d1e20baaa3d93a18d7b11057cd1ed8a9612bac414d79b5f749792f
SHA512dcd636b07a973ac2f91d190cc1baa793240d1832cc288aa6e39c421449612966d679cf19a74fe341246129d4b91732df8f6a3429a89739bf59009aa25f0d713b
-
Filesize
1.8MB
MD52d3271bf27d0b16d36ae52c52a6fecc5
SHA1b81c84bea56690dabe6344ac073528fafdaa8628
SHA2560d198296d0d1e20baaa3d93a18d7b11057cd1ed8a9612bac414d79b5f749792f
SHA512dcd636b07a973ac2f91d190cc1baa793240d1832cc288aa6e39c421449612966d679cf19a74fe341246129d4b91732df8f6a3429a89739bf59009aa25f0d713b
-
Filesize
880KB
MD54c5663d6ec18f7d05fe4ecb100c020aa
SHA1193c6eccd581e89ea2d85daccb356059e340e89a
SHA256d99c2d6662e6db724442451c5e83de94a2fb0cd624bb26654e9ef8e3e9df38f6
SHA512ec938a227aee3bfb92edcc6c20a35faa8f5a04efa25b65dec67b58606e6c199357a6eefe4e9a131e0adea52e612ac537ccb42a664abe8c9ada8108f7e717130a
-
Filesize
880KB
MD54c5663d6ec18f7d05fe4ecb100c020aa
SHA1193c6eccd581e89ea2d85daccb356059e340e89a
SHA256d99c2d6662e6db724442451c5e83de94a2fb0cd624bb26654e9ef8e3e9df38f6
SHA512ec938a227aee3bfb92edcc6c20a35faa8f5a04efa25b65dec67b58606e6c199357a6eefe4e9a131e0adea52e612ac537ccb42a664abe8c9ada8108f7e717130a