Analysis
-
max time kernel
124s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 20:02
Static task
static1
Behavioral task
behavioral1
Sample
fc11687d5b4396c3d764d6e419b5b32ee389b54fa971ba0f98d8458a90a5c43a.exe
Resource
win10v2004-20221111-en
General
-
Target
fc11687d5b4396c3d764d6e419b5b32ee389b54fa971ba0f98d8458a90a5c43a.exe
-
Size
722KB
-
MD5
3b34f424e7bad78c03532e12ad5daedb
-
SHA1
573d1caf83cefb18d8703747e92ec032bd27b864
-
SHA256
fc11687d5b4396c3d764d6e419b5b32ee389b54fa971ba0f98d8458a90a5c43a
-
SHA512
4a5aaf384a54b4ffa0290123d0772e9e16da2a5ae6805a9fce4bf0357f7f19bd6308505265983602a5eacb82e6fcc7d82e9367466f001fdd97c7db28428e413a
-
SSDEEP
12288:IMrRy90xpzhLKhsSAf6Bp2BAfuMD5CUl5mhLyOd71xi1lXo72ke3Vq:pyw1LmsSAScKDAUlMhLyOd71WXo72A
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rme85jY.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection rme85jY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rme85jY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rme85jY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rme85jY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rme85jY.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation mnolyk.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation mse59.exe -
Executes dropped EXE 9 IoCs
pid Process 1552 sxf33ix.exe 2184 sVG31yN.exe 992 kMO65oe.exe 2976 mse59.exe 2800 mnolyk.exe 2728 nQf21ST.exe 1672 rme85jY.exe 684 mnolyk.exe 3632 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4628 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rme85jY.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sVG31yN.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fc11687d5b4396c3d764d6e419b5b32ee389b54fa971ba0f98d8458a90a5c43a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fc11687d5b4396c3d764d6e419b5b32ee389b54fa971ba0f98d8458a90a5c43a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sxf33ix.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sxf33ix.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sVG31yN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5100 2728 WerFault.exe 90 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 992 kMO65oe.exe 992 kMO65oe.exe 2728 nQf21ST.exe 2728 nQf21ST.exe 1672 rme85jY.exe 1672 rme85jY.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 992 kMO65oe.exe Token: SeDebugPrivilege 2728 nQf21ST.exe Token: SeDebugPrivilege 1672 rme85jY.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 996 wrote to memory of 1552 996 fc11687d5b4396c3d764d6e419b5b32ee389b54fa971ba0f98d8458a90a5c43a.exe 84 PID 996 wrote to memory of 1552 996 fc11687d5b4396c3d764d6e419b5b32ee389b54fa971ba0f98d8458a90a5c43a.exe 84 PID 996 wrote to memory of 1552 996 fc11687d5b4396c3d764d6e419b5b32ee389b54fa971ba0f98d8458a90a5c43a.exe 84 PID 1552 wrote to memory of 2184 1552 sxf33ix.exe 85 PID 1552 wrote to memory of 2184 1552 sxf33ix.exe 85 PID 1552 wrote to memory of 2184 1552 sxf33ix.exe 85 PID 2184 wrote to memory of 992 2184 sVG31yN.exe 86 PID 2184 wrote to memory of 992 2184 sVG31yN.exe 86 PID 2184 wrote to memory of 992 2184 sVG31yN.exe 86 PID 2184 wrote to memory of 2976 2184 sVG31yN.exe 88 PID 2184 wrote to memory of 2976 2184 sVG31yN.exe 88 PID 2184 wrote to memory of 2976 2184 sVG31yN.exe 88 PID 2976 wrote to memory of 2800 2976 mse59.exe 89 PID 2976 wrote to memory of 2800 2976 mse59.exe 89 PID 2976 wrote to memory of 2800 2976 mse59.exe 89 PID 1552 wrote to memory of 2728 1552 sxf33ix.exe 90 PID 1552 wrote to memory of 2728 1552 sxf33ix.exe 90 PID 1552 wrote to memory of 2728 1552 sxf33ix.exe 90 PID 2800 wrote to memory of 868 2800 mnolyk.exe 91 PID 2800 wrote to memory of 868 2800 mnolyk.exe 91 PID 2800 wrote to memory of 868 2800 mnolyk.exe 91 PID 2800 wrote to memory of 4120 2800 mnolyk.exe 93 PID 2800 wrote to memory of 4120 2800 mnolyk.exe 93 PID 2800 wrote to memory of 4120 2800 mnolyk.exe 93 PID 4120 wrote to memory of 1936 4120 cmd.exe 95 PID 4120 wrote to memory of 1936 4120 cmd.exe 95 PID 4120 wrote to memory of 1936 4120 cmd.exe 95 PID 4120 wrote to memory of 4800 4120 cmd.exe 96 PID 4120 wrote to memory of 4800 4120 cmd.exe 96 PID 4120 wrote to memory of 4800 4120 cmd.exe 96 PID 4120 wrote to memory of 2308 4120 cmd.exe 97 PID 4120 wrote to memory of 2308 4120 cmd.exe 97 PID 4120 wrote to memory of 2308 4120 cmd.exe 97 PID 4120 wrote to memory of 2768 4120 cmd.exe 98 PID 4120 wrote to memory of 2768 4120 cmd.exe 98 PID 4120 wrote to memory of 2768 4120 cmd.exe 98 PID 4120 wrote to memory of 1156 4120 cmd.exe 99 PID 4120 wrote to memory of 1156 4120 cmd.exe 99 PID 4120 wrote to memory of 1156 4120 cmd.exe 99 PID 4120 wrote to memory of 4268 4120 cmd.exe 100 PID 4120 wrote to memory of 4268 4120 cmd.exe 100 PID 4120 wrote to memory of 4268 4120 cmd.exe 100 PID 996 wrote to memory of 1672 996 fc11687d5b4396c3d764d6e419b5b32ee389b54fa971ba0f98d8458a90a5c43a.exe 105 PID 996 wrote to memory of 1672 996 fc11687d5b4396c3d764d6e419b5b32ee389b54fa971ba0f98d8458a90a5c43a.exe 105 PID 2800 wrote to memory of 4628 2800 mnolyk.exe 112 PID 2800 wrote to memory of 4628 2800 mnolyk.exe 112 PID 2800 wrote to memory of 4628 2800 mnolyk.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc11687d5b4396c3d764d6e419b5b32ee389b54fa971ba0f98d8458a90a5c43a.exe"C:\Users\Admin\AppData\Local\Temp\fc11687d5b4396c3d764d6e419b5b32ee389b54fa971ba0f98d8458a90a5c43a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sxf33ix.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sxf33ix.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sVG31yN.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sVG31yN.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kMO65oe.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kMO65oe.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mse59.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mse59.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:868
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1936
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:4800
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:2308
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:1156
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:4268
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4628
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nQf21ST.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nQf21ST.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 15164⤵
- Program crash
PID:5100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rme85jY.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rme85jY.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2728 -ip 27281⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:684
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:3632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
618KB
MD58bae8596e9fb0a71a073bbae1cd244c4
SHA10a8ef8f89b19421556bd6c04fde908f0429b225e
SHA256ef4990e5c52e58cbb105e9d2b728ef63dc50bd2fedffceff31929804278980d1
SHA512f1af1a4e91adc6b87710b74b4a4378ef400228439a83242098671f1835c8241128703b35762d05651309422a28c20d7c77457de9e9c3cedabf66eb7ed6be18c9
-
Filesize
618KB
MD58bae8596e9fb0a71a073bbae1cd244c4
SHA10a8ef8f89b19421556bd6c04fde908f0429b225e
SHA256ef4990e5c52e58cbb105e9d2b728ef63dc50bd2fedffceff31929804278980d1
SHA512f1af1a4e91adc6b87710b74b4a4378ef400228439a83242098671f1835c8241128703b35762d05651309422a28c20d7c77457de9e9c3cedabf66eb7ed6be18c9
-
Filesize
293KB
MD57cf461732cf9d151aed5ca9f15c9d689
SHA116308873863f9231638b81abe04b80afd0b98c18
SHA256971b14529405a8774ceb5552f3f12fcf455f530e567b71ae043ef166f4ff9d4f
SHA5121b27323c2386aa46b28ebd2b8a127dfa86ccefee0a104c73d0ec2fd56b7f72c65a46d0529716def211c747e386d101aa38cc7d2143839927971ba7788e381e75
-
Filesize
293KB
MD57cf461732cf9d151aed5ca9f15c9d689
SHA116308873863f9231638b81abe04b80afd0b98c18
SHA256971b14529405a8774ceb5552f3f12fcf455f530e567b71ae043ef166f4ff9d4f
SHA5121b27323c2386aa46b28ebd2b8a127dfa86ccefee0a104c73d0ec2fd56b7f72c65a46d0529716def211c747e386d101aa38cc7d2143839927971ba7788e381e75
-
Filesize
286KB
MD502626d719ee4d0d808a592a56bebd69e
SHA1d5c12835bdce4f97ee26b6c4162df0760bad2db1
SHA256b27ac8e5b2598898747eea9e11086d137b93b5a51fe8ddc56a0b324de0773d9f
SHA512460a2f4a2a84e2170df080627c7406915321ae8fbf4409fe118366071ee55a11aa9bd8e0735943f24fcdbc0a45641488cb120ba3dbd58417a5df297c188e0015
-
Filesize
286KB
MD502626d719ee4d0d808a592a56bebd69e
SHA1d5c12835bdce4f97ee26b6c4162df0760bad2db1
SHA256b27ac8e5b2598898747eea9e11086d137b93b5a51fe8ddc56a0b324de0773d9f
SHA512460a2f4a2a84e2170df080627c7406915321ae8fbf4409fe118366071ee55a11aa9bd8e0735943f24fcdbc0a45641488cb120ba3dbd58417a5df297c188e0015
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38