Analysis
-
max time kernel
128s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2023 02:40
Static task
static1
Behavioral task
behavioral1
Sample
a3e620970bd552a9d9ff4ff748cc17476ae2fd2d541fcf13c190e99f399ac761.exe
Resource
win10v2004-20221111-en
General
-
Target
a3e620970bd552a9d9ff4ff748cc17476ae2fd2d541fcf13c190e99f399ac761.exe
-
Size
721KB
-
MD5
bc0f79fcd157196fd896bf63c52e11fe
-
SHA1
b104b25675bea515f240ebdedd5fc085ca097db5
-
SHA256
a3e620970bd552a9d9ff4ff748cc17476ae2fd2d541fcf13c190e99f399ac761
-
SHA512
541f3df54f0428d073fe805f270950e8e46d9093d2e967af865b2216af5101f897f7967deb4a7a39f3e7efdc2827a3d7885743116c9bf2ec455c137885474a61
-
SSDEEP
12288:nMr4y90MGtP3RIx4gtxGB/kIvfvgFYTaJP63rWFFicH/gToM7hgOJ7EPb7J:PyDaP3RdRzXn0P6Gcq/sMt
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iUV48Re.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iUV48Re.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iUV48Re.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iUV48Re.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iUV48Re.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iUV48Re.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation mnolyk.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation nDq76NK.exe -
Executes dropped EXE 9 IoCs
pid Process 4948 sac75Hs.exe 4692 sLT68ko.exe 848 iUV48Re.exe 3564 kRP50yQ.exe 1076 lod63jc.exe 4244 nDq76NK.exe 4260 mnolyk.exe 2636 mnolyk.exe 2216 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 3476 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iUV48Re.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sac75Hs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sac75Hs.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sLT68ko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sLT68ko.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a3e620970bd552a9d9ff4ff748cc17476ae2fd2d541fcf13c190e99f399ac761.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a3e620970bd552a9d9ff4ff748cc17476ae2fd2d541fcf13c190e99f399ac761.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2604 1076 WerFault.exe 86 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 848 iUV48Re.exe 848 iUV48Re.exe 3564 kRP50yQ.exe 3564 kRP50yQ.exe 1076 lod63jc.exe 1076 lod63jc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 848 iUV48Re.exe Token: SeDebugPrivilege 3564 kRP50yQ.exe Token: SeDebugPrivilege 1076 lod63jc.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3540 wrote to memory of 4948 3540 a3e620970bd552a9d9ff4ff748cc17476ae2fd2d541fcf13c190e99f399ac761.exe 82 PID 3540 wrote to memory of 4948 3540 a3e620970bd552a9d9ff4ff748cc17476ae2fd2d541fcf13c190e99f399ac761.exe 82 PID 3540 wrote to memory of 4948 3540 a3e620970bd552a9d9ff4ff748cc17476ae2fd2d541fcf13c190e99f399ac761.exe 82 PID 4948 wrote to memory of 4692 4948 sac75Hs.exe 83 PID 4948 wrote to memory of 4692 4948 sac75Hs.exe 83 PID 4948 wrote to memory of 4692 4948 sac75Hs.exe 83 PID 4692 wrote to memory of 848 4692 sLT68ko.exe 84 PID 4692 wrote to memory of 848 4692 sLT68ko.exe 84 PID 4692 wrote to memory of 3564 4692 sLT68ko.exe 85 PID 4692 wrote to memory of 3564 4692 sLT68ko.exe 85 PID 4692 wrote to memory of 3564 4692 sLT68ko.exe 85 PID 4948 wrote to memory of 1076 4948 sac75Hs.exe 86 PID 4948 wrote to memory of 1076 4948 sac75Hs.exe 86 PID 4948 wrote to memory of 1076 4948 sac75Hs.exe 86 PID 3540 wrote to memory of 4244 3540 a3e620970bd552a9d9ff4ff748cc17476ae2fd2d541fcf13c190e99f399ac761.exe 90 PID 3540 wrote to memory of 4244 3540 a3e620970bd552a9d9ff4ff748cc17476ae2fd2d541fcf13c190e99f399ac761.exe 90 PID 3540 wrote to memory of 4244 3540 a3e620970bd552a9d9ff4ff748cc17476ae2fd2d541fcf13c190e99f399ac761.exe 90 PID 4244 wrote to memory of 4260 4244 nDq76NK.exe 91 PID 4244 wrote to memory of 4260 4244 nDq76NK.exe 91 PID 4244 wrote to memory of 4260 4244 nDq76NK.exe 91 PID 4260 wrote to memory of 3960 4260 mnolyk.exe 92 PID 4260 wrote to memory of 3960 4260 mnolyk.exe 92 PID 4260 wrote to memory of 3960 4260 mnolyk.exe 92 PID 4260 wrote to memory of 5108 4260 mnolyk.exe 94 PID 4260 wrote to memory of 5108 4260 mnolyk.exe 94 PID 4260 wrote to memory of 5108 4260 mnolyk.exe 94 PID 5108 wrote to memory of 1452 5108 cmd.exe 96 PID 5108 wrote to memory of 1452 5108 cmd.exe 96 PID 5108 wrote to memory of 1452 5108 cmd.exe 96 PID 5108 wrote to memory of 4164 5108 cmd.exe 97 PID 5108 wrote to memory of 4164 5108 cmd.exe 97 PID 5108 wrote to memory of 4164 5108 cmd.exe 97 PID 5108 wrote to memory of 476 5108 cmd.exe 98 PID 5108 wrote to memory of 476 5108 cmd.exe 98 PID 5108 wrote to memory of 476 5108 cmd.exe 98 PID 5108 wrote to memory of 1504 5108 cmd.exe 99 PID 5108 wrote to memory of 1504 5108 cmd.exe 99 PID 5108 wrote to memory of 1504 5108 cmd.exe 99 PID 5108 wrote to memory of 4360 5108 cmd.exe 100 PID 5108 wrote to memory of 4360 5108 cmd.exe 100 PID 5108 wrote to memory of 4360 5108 cmd.exe 100 PID 5108 wrote to memory of 2200 5108 cmd.exe 101 PID 5108 wrote to memory of 2200 5108 cmd.exe 101 PID 5108 wrote to memory of 2200 5108 cmd.exe 101 PID 4260 wrote to memory of 3476 4260 mnolyk.exe 103 PID 4260 wrote to memory of 3476 4260 mnolyk.exe 103 PID 4260 wrote to memory of 3476 4260 mnolyk.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3e620970bd552a9d9ff4ff748cc17476ae2fd2d541fcf13c190e99f399ac761.exe"C:\Users\Admin\AppData\Local\Temp\a3e620970bd552a9d9ff4ff748cc17476ae2fd2d541fcf13c190e99f399ac761.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sac75Hs.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sac75Hs.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sLT68ko.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sLT68ko.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iUV48Re.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iUV48Re.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kRP50yQ.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kRP50yQ.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lod63jc.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lod63jc.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 13284⤵
- Program crash
PID:2604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nDq76NK.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nDq76NK.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:3960
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:4164
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1504
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"5⤵PID:4360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E5⤵PID:2200
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3476
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1076 -ip 10761⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:2636
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:2216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
534KB
MD567ce0f582bd65c07427948b479b40824
SHA170c6878ca345c78232d660d70f17cdd08193a7e1
SHA2565d5a3d95dd7236a27403918d9225411cf6ce9afb3b6dc29c5321c30c0649605d
SHA51219357a11a19a4ffbf1ef474b682e03d5d2b9faece6a15bdf1dac907570d22b8fac0171fb64b522018721b23e8183e106cbfceaf324e92c8b8d8442990ade22ae
-
Filesize
534KB
MD567ce0f582bd65c07427948b479b40824
SHA170c6878ca345c78232d660d70f17cdd08193a7e1
SHA2565d5a3d95dd7236a27403918d9225411cf6ce9afb3b6dc29c5321c30c0649605d
SHA51219357a11a19a4ffbf1ef474b682e03d5d2b9faece6a15bdf1dac907570d22b8fac0171fb64b522018721b23e8183e106cbfceaf324e92c8b8d8442990ade22ae
-
Filesize
293KB
MD5825809e701f1b9c0d5385fc69bf068f6
SHA1d25ed66ed97e8ee3e4cdac8d3ad4b7e8b20fcd1d
SHA256d6e7b34117bc3ba8856ab3e0ec1c078093a98b748037d1268f522d30a088ecdb
SHA512c492f5d4c36ec797e5d1177a940c6d2571c60f76c434d8ab98bf8327f492c07f6b93a05d18b375fafa5208598158a03d6acda17d21686183bd89d320d00f2d6c
-
Filesize
293KB
MD5825809e701f1b9c0d5385fc69bf068f6
SHA1d25ed66ed97e8ee3e4cdac8d3ad4b7e8b20fcd1d
SHA256d6e7b34117bc3ba8856ab3e0ec1c078093a98b748037d1268f522d30a088ecdb
SHA512c492f5d4c36ec797e5d1177a940c6d2571c60f76c434d8ab98bf8327f492c07f6b93a05d18b375fafa5208598158a03d6acda17d21686183bd89d320d00f2d6c
-
Filesize
202KB
MD5946071597a409336785628c20d2500ea
SHA1b55370407d42279a99e34672d99ac3e42779a384
SHA256e6734ab299e0b2e6327e4264502dd772c7c8eae5abdbf9414b358e8bd1a255b5
SHA512a616c67057b8b4fdbc6d877829631cf7775b00307d6c4c63b49dbef420d65d8879218d9cd45dc7c301f96b09de542953e9b0a75a912489ccea409a751371f23b
-
Filesize
202KB
MD5946071597a409336785628c20d2500ea
SHA1b55370407d42279a99e34672d99ac3e42779a384
SHA256e6734ab299e0b2e6327e4264502dd772c7c8eae5abdbf9414b358e8bd1a255b5
SHA512a616c67057b8b4fdbc6d877829631cf7775b00307d6c4c63b49dbef420d65d8879218d9cd45dc7c301f96b09de542953e9b0a75a912489ccea409a751371f23b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38