Analysis
-
max time kernel
139s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2023, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168.exe
Resource
win10v2004-20220812-en
General
-
Target
180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168.exe
-
Size
724KB
-
MD5
e62f51cf3c50e5cc8cef37d69048a846
-
SHA1
8ad20268c2ff44c916ce2bb0b8add3d9507d78b8
-
SHA256
180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168
-
SHA512
184409de4d8933b5bad34325099c7082f87ba7b74993df1aadb8fa03029ad0759e15450f15ceee2c93cce736461fcdd60e84b062f702f0a4289cc1960cff46da
-
SSDEEP
12288:RMr4y90RNV1JMS5oUMjNNu2bJa25wjrk88dOyIPopXT1e5+TmtSGeGciZZ:1ySDMS5bMu2bJDw/k88dOyIQ5e5+T3GR
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rOc04Sh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection rOc04Sh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rOc04Sh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rOc04Sh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rOc04Sh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rOc04Sh.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation mqC95.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 9 IoCs
pid Process 1736 scg19If.exe 2728 seS58VP.exe 1032 kJJ83mS.exe 2316 mqC95.exe 4928 mnolyk.exe 1588 nGy55ew.exe 1040 mnolyk.exe 1296 rOc04Sh.exe 5108 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 3392 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rOc04Sh.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce scg19If.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" scg19If.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce seS58VP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" seS58VP.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3628 1588 WerFault.exe 84 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2892 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1032 kJJ83mS.exe 1032 kJJ83mS.exe 1588 nGy55ew.exe 1588 nGy55ew.exe 1296 rOc04Sh.exe 1296 rOc04Sh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1032 kJJ83mS.exe Token: SeDebugPrivilege 1588 nGy55ew.exe Token: SeDebugPrivilege 1296 rOc04Sh.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1736 3052 180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168.exe 79 PID 3052 wrote to memory of 1736 3052 180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168.exe 79 PID 3052 wrote to memory of 1736 3052 180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168.exe 79 PID 1736 wrote to memory of 2728 1736 scg19If.exe 80 PID 1736 wrote to memory of 2728 1736 scg19If.exe 80 PID 1736 wrote to memory of 2728 1736 scg19If.exe 80 PID 2728 wrote to memory of 1032 2728 seS58VP.exe 81 PID 2728 wrote to memory of 1032 2728 seS58VP.exe 81 PID 2728 wrote to memory of 1032 2728 seS58VP.exe 81 PID 2728 wrote to memory of 2316 2728 seS58VP.exe 82 PID 2728 wrote to memory of 2316 2728 seS58VP.exe 82 PID 2728 wrote to memory of 2316 2728 seS58VP.exe 82 PID 2316 wrote to memory of 4928 2316 mqC95.exe 83 PID 2316 wrote to memory of 4928 2316 mqC95.exe 83 PID 2316 wrote to memory of 4928 2316 mqC95.exe 83 PID 1736 wrote to memory of 1588 1736 scg19If.exe 84 PID 1736 wrote to memory of 1588 1736 scg19If.exe 84 PID 1736 wrote to memory of 1588 1736 scg19If.exe 84 PID 4928 wrote to memory of 2892 4928 mnolyk.exe 85 PID 4928 wrote to memory of 2892 4928 mnolyk.exe 85 PID 4928 wrote to memory of 2892 4928 mnolyk.exe 85 PID 4928 wrote to memory of 4784 4928 mnolyk.exe 87 PID 4928 wrote to memory of 4784 4928 mnolyk.exe 87 PID 4928 wrote to memory of 4784 4928 mnolyk.exe 87 PID 4784 wrote to memory of 3508 4784 cmd.exe 89 PID 4784 wrote to memory of 3508 4784 cmd.exe 89 PID 4784 wrote to memory of 3508 4784 cmd.exe 89 PID 4784 wrote to memory of 676 4784 cmd.exe 90 PID 4784 wrote to memory of 676 4784 cmd.exe 90 PID 4784 wrote to memory of 676 4784 cmd.exe 90 PID 4784 wrote to memory of 216 4784 cmd.exe 91 PID 4784 wrote to memory of 216 4784 cmd.exe 91 PID 4784 wrote to memory of 216 4784 cmd.exe 91 PID 4784 wrote to memory of 4892 4784 cmd.exe 92 PID 4784 wrote to memory of 4892 4784 cmd.exe 92 PID 4784 wrote to memory of 4892 4784 cmd.exe 92 PID 4784 wrote to memory of 4088 4784 cmd.exe 93 PID 4784 wrote to memory of 4088 4784 cmd.exe 93 PID 4784 wrote to memory of 4088 4784 cmd.exe 93 PID 4784 wrote to memory of 1180 4784 cmd.exe 94 PID 4784 wrote to memory of 1180 4784 cmd.exe 94 PID 4784 wrote to memory of 1180 4784 cmd.exe 94 PID 3052 wrote to memory of 1296 3052 180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168.exe 102 PID 3052 wrote to memory of 1296 3052 180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168.exe 102 PID 4928 wrote to memory of 3392 4928 mnolyk.exe 106 PID 4928 wrote to memory of 3392 4928 mnolyk.exe 106 PID 4928 wrote to memory of 3392 4928 mnolyk.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168.exe"C:\Users\Admin\AppData\Local\Temp\180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\scg19If.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\scg19If.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\seS58VP.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\seS58VP.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kJJ83mS.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kJJ83mS.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mqC95.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mqC95.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:2892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:216
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:4088
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:1180
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3392
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nGy55ew.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nGy55ew.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 13244⤵
- Program crash
PID:3628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rOc04Sh.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rOc04Sh.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1588 -ip 15881⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:5108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
620KB
MD5c29f1fa111048905dbc31b197e10238e
SHA1fcb2cd43966a565153757c185ad0cdf2dfb07bcc
SHA25643f5fb393a5e0c4cc5f4bc7f0ad751853261dee75996e48536ffe9a13ff6f586
SHA512ee596c7ebf3bf7e5f8c5a8de2959ca62046d811b2d2f8a20f48465f0ef703e3ac68ce83cec2de4ffa51f0f1edcfbdaf3d51b9637f250dc4389f69b518e965632
-
Filesize
620KB
MD5c29f1fa111048905dbc31b197e10238e
SHA1fcb2cd43966a565153757c185ad0cdf2dfb07bcc
SHA25643f5fb393a5e0c4cc5f4bc7f0ad751853261dee75996e48536ffe9a13ff6f586
SHA512ee596c7ebf3bf7e5f8c5a8de2959ca62046d811b2d2f8a20f48465f0ef703e3ac68ce83cec2de4ffa51f0f1edcfbdaf3d51b9637f250dc4389f69b518e965632
-
Filesize
297KB
MD5977257b3567e148686e088ba34ffc116
SHA1e81b28487fc9a9b9f856819647e377bd713f0b0c
SHA256a0b0252b79b2e27f0e594fce5e2eb40e9557e23305f756554ea428deb5c19017
SHA512afced5adbca67c56a46c23c1804e620bea330ccbac58b3a77e7f7abdbc5ca9b2accaf0608d3738046cb3905962ab7262533934dc07601c7a59558d783484a2cc
-
Filesize
297KB
MD5977257b3567e148686e088ba34ffc116
SHA1e81b28487fc9a9b9f856819647e377bd713f0b0c
SHA256a0b0252b79b2e27f0e594fce5e2eb40e9557e23305f756554ea428deb5c19017
SHA512afced5adbca67c56a46c23c1804e620bea330ccbac58b3a77e7f7abdbc5ca9b2accaf0608d3738046cb3905962ab7262533934dc07601c7a59558d783484a2cc
-
Filesize
286KB
MD5c956b04ea39d0ae92c243876d05bf118
SHA10574b07ff57fced3169b7308ad50b29955dc4a27
SHA256b6aeadd8be180af7d8cd55d3824558184e6af706b54fcda4619952c27d21d443
SHA512ae3adc4f7b362ca37be15ef2ebe7dbb3e6bc9d07177a7a7716653c3a03dcf6a402c33fd5ccec11d9d652c18d8b8c03861a6ed771dabd3132a382619988ded835
-
Filesize
286KB
MD5c956b04ea39d0ae92c243876d05bf118
SHA10574b07ff57fced3169b7308ad50b29955dc4a27
SHA256b6aeadd8be180af7d8cd55d3824558184e6af706b54fcda4619952c27d21d443
SHA512ae3adc4f7b362ca37be15ef2ebe7dbb3e6bc9d07177a7a7716653c3a03dcf6a402c33fd5ccec11d9d652c18d8b8c03861a6ed771dabd3132a382619988ded835
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3