Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/12/2022, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
227KB
-
MD5
6bf32612021913917fbb830d269ce6be
-
SHA1
266cd4686efbc4bc571ad58f4025da39283fe18b
-
SHA256
6be9c20a1a148f3867bc21d009d60db9e04d315535ccf9dcaed8372ff0963448
-
SHA512
542595e1e03571194cf45b2e7c3320d37fa249bb4dde1c0d53355350f9097bfde6e71f8dc67305b9f861168f05798ee22b36f731b2526440fc8b621e107ce739
-
SSDEEP
3072:wDv4jLGg/Km5UnzTT3a6j1Gp9ls8LW4P84nBRUijcNQK1+eJV5u43:KaLGg/mnzHK2Gp7siW85B2ijeRu4
Malware Config
Extracted
amadey
3.63
amadtrackings.com/g9TTnd3bS/index.php
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral2/files/0x0003000000000723-156.dat amadey_cred_module behavioral2/files/0x0003000000000723-157.dat amadey_cred_module -
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/4988-133-0x0000000000470000-0x0000000000479000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 123 208 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 2072 E331.exe 744 nbveek.exe 1844 nbveek.exe 4860 nbveek.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation E331.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation nbveek.exe -
Loads dropped DLL 1 IoCs
pid Process 208 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 24 IoCs
pid pid_target Process procid_target 224 2072 WerFault.exe 87 4424 2072 WerFault.exe 87 3664 2072 WerFault.exe 87 852 2072 WerFault.exe 87 4908 2072 WerFault.exe 87 444 2072 WerFault.exe 87 3380 2072 WerFault.exe 87 4724 744 WerFault.exe 101 4108 744 WerFault.exe 101 3456 744 WerFault.exe 101 4288 744 WerFault.exe 101 2716 744 WerFault.exe 101 4012 744 WerFault.exe 101 5100 744 WerFault.exe 101 2628 744 WerFault.exe 101 4760 744 WerFault.exe 101 3924 744 WerFault.exe 101 4788 744 WerFault.exe 101 4364 1844 WerFault.exe 128 3220 744 WerFault.exe 101 316 744 WerFault.exe 101 4700 744 WerFault.exe 101 3844 4860 WerFault.exe 138 3916 744 WerFault.exe 101 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3224 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4988 file.exe 4988 file.exe 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found 2720 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2720 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4988 file.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found Token: SeShutdownPrivilege 2720 Process not Found Token: SeCreatePagefilePrivilege 2720 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2072 2720 Process not Found 87 PID 2720 wrote to memory of 2072 2720 Process not Found 87 PID 2720 wrote to memory of 2072 2720 Process not Found 87 PID 2072 wrote to memory of 744 2072 E331.exe 101 PID 2072 wrote to memory of 744 2072 E331.exe 101 PID 2072 wrote to memory of 744 2072 E331.exe 101 PID 744 wrote to memory of 3224 744 nbveek.exe 118 PID 744 wrote to memory of 3224 744 nbveek.exe 118 PID 744 wrote to memory of 3224 744 nbveek.exe 118 PID 744 wrote to memory of 208 744 nbveek.exe 135 PID 744 wrote to memory of 208 744 nbveek.exe 135 PID 744 wrote to memory of 208 744 nbveek.exe 135 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4988
-
C:\Users\Admin\AppData\Local\Temp\E331.exeC:\Users\Admin\AppData\Local\Temp\E331.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 8922⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 9562⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 10962⤵
- Program crash
PID:3664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 9442⤵
- Program crash
PID:852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 9602⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 11242⤵
- Program crash
PID:444
-
-
C:\Users\Admin\AppData\Local\Temp\320d7ecc7e\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\320d7ecc7e\nbveek.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 5843⤵
- Program crash
PID:4724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 7083⤵
- Program crash
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 7843⤵
- Program crash
PID:3456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 9443⤵
- Program crash
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 9443⤵
- Program crash
PID:2716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 9443⤵
- Program crash
PID:4012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 9763⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\320d7ecc7e\nbveek.exe" /F3⤵
- Creates scheduled task(s)
PID:3224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 8963⤵
- Program crash
PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 11963⤵
- Program crash
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 8923⤵
- Program crash
PID:3924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 6643⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 10043⤵
- Program crash
PID:3220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 15923⤵
- Program crash
PID:316
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\253fa33afbb5b2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- outlook_win_path
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 15443⤵
- Program crash
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 16003⤵
- Program crash
PID:3916
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 11762⤵
- Program crash
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2072 -ip 20721⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2072 -ip 20721⤵PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2072 -ip 20721⤵PID:3584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2072 -ip 20721⤵PID:3480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2072 -ip 20721⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2072 -ip 20721⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2072 -ip 20721⤵PID:4884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 744 -ip 7441⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 744 -ip 7441⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 744 -ip 7441⤵PID:896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 744 -ip 7441⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 744 -ip 7441⤵PID:824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 744 -ip 7441⤵PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 744 -ip 7441⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 744 -ip 7441⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 744 -ip 7441⤵PID:2180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 744 -ip 7441⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 744 -ip 7441⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\320d7ecc7e\nbveek.exeC:\Users\Admin\AppData\Local\Temp\320d7ecc7e\nbveek.exe1⤵
- Executes dropped EXE
PID:1844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 3122⤵
- Program crash
PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 1844 -ip 18441⤵PID:1676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 744 -ip 7441⤵PID:3408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 744 -ip 7441⤵PID:3448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 744 -ip 7441⤵PID:32
-
C:\Users\Admin\AppData\Local\Temp\320d7ecc7e\nbveek.exeC:\Users\Admin\AppData\Local\Temp\320d7ecc7e\nbveek.exe1⤵
- Executes dropped EXE
PID:4860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 3122⤵
- Program crash
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4860 -ip 48601⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 744 -ip 7441⤵PID:4132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD59b5be7c16e4803fdb868e86adf4d68f1
SHA101dda801ea44313fb9d858a38c16b1d9bacc52c8
SHA256258823e5296543f589f71fef5ad2d68c93b1498eab2a8ddef4ef3af5cb5914d6
SHA51238d174227c2bc31127790e58eeb0ff9aff885e40a1fac20619ba82d76cad941ce462ec95ceea43b9421d45f6c5e0a16258b70f2c372caed76998659a2d39e8d2
-
Filesize
284KB
MD59b5be7c16e4803fdb868e86adf4d68f1
SHA101dda801ea44313fb9d858a38c16b1d9bacc52c8
SHA256258823e5296543f589f71fef5ad2d68c93b1498eab2a8ddef4ef3af5cb5914d6
SHA51238d174227c2bc31127790e58eeb0ff9aff885e40a1fac20619ba82d76cad941ce462ec95ceea43b9421d45f6c5e0a16258b70f2c372caed76998659a2d39e8d2
-
Filesize
284KB
MD59b5be7c16e4803fdb868e86adf4d68f1
SHA101dda801ea44313fb9d858a38c16b1d9bacc52c8
SHA256258823e5296543f589f71fef5ad2d68c93b1498eab2a8ddef4ef3af5cb5914d6
SHA51238d174227c2bc31127790e58eeb0ff9aff885e40a1fac20619ba82d76cad941ce462ec95ceea43b9421d45f6c5e0a16258b70f2c372caed76998659a2d39e8d2
-
Filesize
284KB
MD59b5be7c16e4803fdb868e86adf4d68f1
SHA101dda801ea44313fb9d858a38c16b1d9bacc52c8
SHA256258823e5296543f589f71fef5ad2d68c93b1498eab2a8ddef4ef3af5cb5914d6
SHA51238d174227c2bc31127790e58eeb0ff9aff885e40a1fac20619ba82d76cad941ce462ec95ceea43b9421d45f6c5e0a16258b70f2c372caed76998659a2d39e8d2
-
Filesize
284KB
MD59b5be7c16e4803fdb868e86adf4d68f1
SHA101dda801ea44313fb9d858a38c16b1d9bacc52c8
SHA256258823e5296543f589f71fef5ad2d68c93b1498eab2a8ddef4ef3af5cb5914d6
SHA51238d174227c2bc31127790e58eeb0ff9aff885e40a1fac20619ba82d76cad941ce462ec95ceea43b9421d45f6c5e0a16258b70f2c372caed76998659a2d39e8d2
-
Filesize
284KB
MD59b5be7c16e4803fdb868e86adf4d68f1
SHA101dda801ea44313fb9d858a38c16b1d9bacc52c8
SHA256258823e5296543f589f71fef5ad2d68c93b1498eab2a8ddef4ef3af5cb5914d6
SHA51238d174227c2bc31127790e58eeb0ff9aff885e40a1fac20619ba82d76cad941ce462ec95ceea43b9421d45f6c5e0a16258b70f2c372caed76998659a2d39e8d2
-
Filesize
126KB
MD5bfee01170eb2d9a9d881a27d3c590b21
SHA11fce13219189f12350427570cf3f00eced380978
SHA25678edd4d43c88a72fb597719e580a54f566eb146d0b4ce9fc660063971c90adcf
SHA512123bbf0f8d8c9b8d98e44f2a38041afb3cbba68d24564976a39a9143c85fe988b4645dd092957060f6498a399210a808edebd7d35a85495927ea4b0bb5f1883a
-
Filesize
126KB
MD5bfee01170eb2d9a9d881a27d3c590b21
SHA11fce13219189f12350427570cf3f00eced380978
SHA25678edd4d43c88a72fb597719e580a54f566eb146d0b4ce9fc660063971c90adcf
SHA512123bbf0f8d8c9b8d98e44f2a38041afb3cbba68d24564976a39a9143c85fe988b4645dd092957060f6498a399210a808edebd7d35a85495927ea4b0bb5f1883a