Analysis
-
max time kernel
117s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2023, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
a2c956fffc29a1edf6cfc2a44b5517c54104b43f34f97dbc72a58f9888b361dc.exe
Resource
win10v2004-20221111-en
General
-
Target
a2c956fffc29a1edf6cfc2a44b5517c54104b43f34f97dbc72a58f9888b361dc.exe
-
Size
728KB
-
MD5
f13fa76249887ac42a3405cc0919f8f1
-
SHA1
5a868cc57a375ad725c19a20eecae61328706f9d
-
SHA256
a2c956fffc29a1edf6cfc2a44b5517c54104b43f34f97dbc72a58f9888b361dc
-
SHA512
f0577495c1e7da090b8432b14edcad5851efae015ff7ec13ac24cced6e167d14d50a701bc0755dfa66fcae95beceee72da3d3ed9a3e3e919644a44894db6d476
-
SSDEEP
12288:AMr1y90Sy0p5R+EHpiFynXy0yB0s4Pmy8neJYsuRXFwkGynfS50P+ksQgPLCBK:FyPy0pyEHpiMw0s47dYLwkRr+2gPmg
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection ffE45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ffE45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ffE45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ffE45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ffE45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ffE45.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation bfJ03BV.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 9 IoCs
pid Process 2548 grZ96pt.exe 4220 gGO03vd.exe 3756 aBF57Ie.exe 1364 bfJ03BV.exe 2576 mnolyk.exe 1544 dkN7966.exe 4116 ffE45.exe 2436 mnolyk.exe 688 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 2996 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" ffE45.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a2c956fffc29a1edf6cfc2a44b5517c54104b43f34f97dbc72a58f9888b361dc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce grZ96pt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" grZ96pt.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce gGO03vd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" gGO03vd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a2c956fffc29a1edf6cfc2a44b5517c54104b43f34f97dbc72a58f9888b361dc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1572 1544 WerFault.exe 87 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3756 aBF57Ie.exe 3756 aBF57Ie.exe 1544 dkN7966.exe 1544 dkN7966.exe 4116 ffE45.exe 4116 ffE45.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3756 aBF57Ie.exe Token: SeDebugPrivilege 1544 dkN7966.exe Token: SeDebugPrivilege 4116 ffE45.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4776 wrote to memory of 2548 4776 a2c956fffc29a1edf6cfc2a44b5517c54104b43f34f97dbc72a58f9888b361dc.exe 82 PID 4776 wrote to memory of 2548 4776 a2c956fffc29a1edf6cfc2a44b5517c54104b43f34f97dbc72a58f9888b361dc.exe 82 PID 4776 wrote to memory of 2548 4776 a2c956fffc29a1edf6cfc2a44b5517c54104b43f34f97dbc72a58f9888b361dc.exe 82 PID 2548 wrote to memory of 4220 2548 grZ96pt.exe 83 PID 2548 wrote to memory of 4220 2548 grZ96pt.exe 83 PID 2548 wrote to memory of 4220 2548 grZ96pt.exe 83 PID 4220 wrote to memory of 3756 4220 gGO03vd.exe 84 PID 4220 wrote to memory of 3756 4220 gGO03vd.exe 84 PID 4220 wrote to memory of 3756 4220 gGO03vd.exe 84 PID 4220 wrote to memory of 1364 4220 gGO03vd.exe 85 PID 4220 wrote to memory of 1364 4220 gGO03vd.exe 85 PID 4220 wrote to memory of 1364 4220 gGO03vd.exe 85 PID 1364 wrote to memory of 2576 1364 bfJ03BV.exe 86 PID 1364 wrote to memory of 2576 1364 bfJ03BV.exe 86 PID 1364 wrote to memory of 2576 1364 bfJ03BV.exe 86 PID 2548 wrote to memory of 1544 2548 grZ96pt.exe 87 PID 2548 wrote to memory of 1544 2548 grZ96pt.exe 87 PID 2548 wrote to memory of 1544 2548 grZ96pt.exe 87 PID 2576 wrote to memory of 4868 2576 mnolyk.exe 88 PID 2576 wrote to memory of 4868 2576 mnolyk.exe 88 PID 2576 wrote to memory of 4868 2576 mnolyk.exe 88 PID 2576 wrote to memory of 4036 2576 mnolyk.exe 90 PID 2576 wrote to memory of 4036 2576 mnolyk.exe 90 PID 2576 wrote to memory of 4036 2576 mnolyk.exe 90 PID 4036 wrote to memory of 1732 4036 cmd.exe 92 PID 4036 wrote to memory of 1732 4036 cmd.exe 92 PID 4036 wrote to memory of 1732 4036 cmd.exe 92 PID 4036 wrote to memory of 4208 4036 cmd.exe 93 PID 4036 wrote to memory of 4208 4036 cmd.exe 93 PID 4036 wrote to memory of 4208 4036 cmd.exe 93 PID 4036 wrote to memory of 3644 4036 cmd.exe 94 PID 4036 wrote to memory of 3644 4036 cmd.exe 94 PID 4036 wrote to memory of 3644 4036 cmd.exe 94 PID 4036 wrote to memory of 3648 4036 cmd.exe 95 PID 4036 wrote to memory of 3648 4036 cmd.exe 95 PID 4036 wrote to memory of 3648 4036 cmd.exe 95 PID 4036 wrote to memory of 2900 4036 cmd.exe 96 PID 4036 wrote to memory of 2900 4036 cmd.exe 96 PID 4036 wrote to memory of 2900 4036 cmd.exe 96 PID 4036 wrote to memory of 2088 4036 cmd.exe 97 PID 4036 wrote to memory of 2088 4036 cmd.exe 97 PID 4036 wrote to memory of 2088 4036 cmd.exe 97 PID 4776 wrote to memory of 4116 4776 a2c956fffc29a1edf6cfc2a44b5517c54104b43f34f97dbc72a58f9888b361dc.exe 104 PID 4776 wrote to memory of 4116 4776 a2c956fffc29a1edf6cfc2a44b5517c54104b43f34f97dbc72a58f9888b361dc.exe 104 PID 2576 wrote to memory of 2996 2576 mnolyk.exe 110 PID 2576 wrote to memory of 2996 2576 mnolyk.exe 110 PID 2576 wrote to memory of 2996 2576 mnolyk.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2c956fffc29a1edf6cfc2a44b5517c54104b43f34f97dbc72a58f9888b361dc.exe"C:\Users\Admin\AppData\Local\Temp\a2c956fffc29a1edf6cfc2a44b5517c54104b43f34f97dbc72a58f9888b361dc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grZ96pt.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grZ96pt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gGO03vd.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gGO03vd.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aBF57Ie.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aBF57Ie.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bfJ03BV.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bfJ03BV.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:4868
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1732
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:4208
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:3644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:N"7⤵PID:2900
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:R" /E7⤵PID:2088
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2996
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dkN7966.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dkN7966.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 13364⤵
- Program crash
PID:1572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ffE45.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ffE45.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1544 -ip 15441⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:2436
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
624KB
MD576d5abd2e889027d7068b88e9872611e
SHA1151eb40e9cad40587afaff241659441170cd6ac3
SHA25608649e293bad94e49af1ba5f32b54e79a541c72cf8cb8473028dc6fbb081143c
SHA512c487ca06504c5db8e048dd9b24713668329e1984e0e45d51a7c088dcada27c79e3d62141c5c50a0231ea2070b4ddc7a0e2327d4ea31c53c5de93e11b7c777fbd
-
Filesize
624KB
MD576d5abd2e889027d7068b88e9872611e
SHA1151eb40e9cad40587afaff241659441170cd6ac3
SHA25608649e293bad94e49af1ba5f32b54e79a541c72cf8cb8473028dc6fbb081143c
SHA512c487ca06504c5db8e048dd9b24713668329e1984e0e45d51a7c088dcada27c79e3d62141c5c50a0231ea2070b4ddc7a0e2327d4ea31c53c5de93e11b7c777fbd
-
Filesize
306KB
MD5577146df410aba994868c6503b4c2acc
SHA153d454703a4b8dfd6729a1462ebd81406445a1ac
SHA256be665a8576c5b88fc46daeb50c0a75a6abdc31c073c2d89edb5a3ba0e0f079c2
SHA512a14de7a0ab4ab7b4f06f4c318d6ad7f343f94154a293d3c68186583d1627555910066a70c4c1ad1d9f4167b0dfb5a599058c7ecd182cfee1cfc08dceacc0c8f0
-
Filesize
306KB
MD5577146df410aba994868c6503b4c2acc
SHA153d454703a4b8dfd6729a1462ebd81406445a1ac
SHA256be665a8576c5b88fc46daeb50c0a75a6abdc31c073c2d89edb5a3ba0e0f079c2
SHA512a14de7a0ab4ab7b4f06f4c318d6ad7f343f94154a293d3c68186583d1627555910066a70c4c1ad1d9f4167b0dfb5a599058c7ecd182cfee1cfc08dceacc0c8f0
-
Filesize
286KB
MD52ad7ae7ba79946f6ea3d2c6a21ee6379
SHA1e5854f090aa342a5ee8e1ebacae663943b0201c5
SHA256bd2dab4fb1cb30652f7ab2c562363b2d9f8c4f91df4f35f4e905cf6fc7e5afff
SHA512a881ad06c0f19bac7d3f2a9a189c93347f9d0626cbf61914a6e1ad8c96951b1671bd3bc617dbe9461e6286453351e3bc376e596428c5c8c5607259fda1738b5e
-
Filesize
286KB
MD52ad7ae7ba79946f6ea3d2c6a21ee6379
SHA1e5854f090aa342a5ee8e1ebacae663943b0201c5
SHA256bd2dab4fb1cb30652f7ab2c562363b2d9f8c4f91df4f35f4e905cf6fc7e5afff
SHA512a881ad06c0f19bac7d3f2a9a189c93347f9d0626cbf61914a6e1ad8c96951b1671bd3bc617dbe9461e6286453351e3bc376e596428c5c8c5607259fda1738b5e
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba