Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2023, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
45741225bec164bfa4e4c45a0c3cabf219dfeb4851fb8020024f03e4de2803fd.exe
Resource
win10v2004-20220901-en
General
-
Target
45741225bec164bfa4e4c45a0c3cabf219dfeb4851fb8020024f03e4de2803fd.exe
-
Size
725KB
-
MD5
1f3152ffe6c2f410ce9d09a5e6e729e9
-
SHA1
7e83f338653805db955089866121b5c751b96684
-
SHA256
45741225bec164bfa4e4c45a0c3cabf219dfeb4851fb8020024f03e4de2803fd
-
SHA512
60a1f1100dde81f39680f527952058e91980c39eea3dbce2eea9290624179be1c12599048a47fdb35720623f0e4351d2ad573db874917a9e1c3cfbe05e161f2a
-
SSDEEP
12288:lMrby90zBdDeSUwEe5yWJmEWKPYp2/dG6bBw+th9qtLg8s96U1M6GRTviEF:myQBlexV2yTEWKPy2/Q6b9t6e99620Tr
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fxt49Nw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" fxt49Nw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fxt49Nw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" fxt49Nw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fxt49Nw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection fxt49Nw.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation ncw33yc.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 9 IoCs
pid Process 3660 sRm53Ax.exe 3288 szj87Lu.exe 2400 fxt49Nw.exe 932 hSA90OK.exe 1588 ksA39ln.exe 5092 ncw33yc.exe 4548 mnolyk.exe 4648 mnolyk.exe 4976 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4748 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" fxt49Nw.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sRm53Ax.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sRm53Ax.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce szj87Lu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" szj87Lu.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 45741225bec164bfa4e4c45a0c3cabf219dfeb4851fb8020024f03e4de2803fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 45741225bec164bfa4e4c45a0c3cabf219dfeb4851fb8020024f03e4de2803fd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 640 1588 WerFault.exe 84 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3876 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2400 fxt49Nw.exe 2400 fxt49Nw.exe 932 hSA90OK.exe 932 hSA90OK.exe 1588 ksA39ln.exe 1588 ksA39ln.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2400 fxt49Nw.exe Token: SeDebugPrivilege 932 hSA90OK.exe Token: SeDebugPrivilege 1588 ksA39ln.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3144 wrote to memory of 3660 3144 45741225bec164bfa4e4c45a0c3cabf219dfeb4851fb8020024f03e4de2803fd.exe 77 PID 3144 wrote to memory of 3660 3144 45741225bec164bfa4e4c45a0c3cabf219dfeb4851fb8020024f03e4de2803fd.exe 77 PID 3144 wrote to memory of 3660 3144 45741225bec164bfa4e4c45a0c3cabf219dfeb4851fb8020024f03e4de2803fd.exe 77 PID 3660 wrote to memory of 3288 3660 sRm53Ax.exe 79 PID 3660 wrote to memory of 3288 3660 sRm53Ax.exe 79 PID 3660 wrote to memory of 3288 3660 sRm53Ax.exe 79 PID 3288 wrote to memory of 2400 3288 szj87Lu.exe 78 PID 3288 wrote to memory of 2400 3288 szj87Lu.exe 78 PID 3288 wrote to memory of 932 3288 szj87Lu.exe 82 PID 3288 wrote to memory of 932 3288 szj87Lu.exe 82 PID 3288 wrote to memory of 932 3288 szj87Lu.exe 82 PID 3660 wrote to memory of 1588 3660 sRm53Ax.exe 84 PID 3660 wrote to memory of 1588 3660 sRm53Ax.exe 84 PID 3660 wrote to memory of 1588 3660 sRm53Ax.exe 84 PID 3144 wrote to memory of 5092 3144 45741225bec164bfa4e4c45a0c3cabf219dfeb4851fb8020024f03e4de2803fd.exe 89 PID 3144 wrote to memory of 5092 3144 45741225bec164bfa4e4c45a0c3cabf219dfeb4851fb8020024f03e4de2803fd.exe 89 PID 3144 wrote to memory of 5092 3144 45741225bec164bfa4e4c45a0c3cabf219dfeb4851fb8020024f03e4de2803fd.exe 89 PID 5092 wrote to memory of 4548 5092 ncw33yc.exe 90 PID 5092 wrote to memory of 4548 5092 ncw33yc.exe 90 PID 5092 wrote to memory of 4548 5092 ncw33yc.exe 90 PID 4548 wrote to memory of 3876 4548 mnolyk.exe 91 PID 4548 wrote to memory of 3876 4548 mnolyk.exe 91 PID 4548 wrote to memory of 3876 4548 mnolyk.exe 91 PID 4548 wrote to memory of 1344 4548 mnolyk.exe 93 PID 4548 wrote to memory of 1344 4548 mnolyk.exe 93 PID 4548 wrote to memory of 1344 4548 mnolyk.exe 93 PID 1344 wrote to memory of 2244 1344 cmd.exe 95 PID 1344 wrote to memory of 2244 1344 cmd.exe 95 PID 1344 wrote to memory of 2244 1344 cmd.exe 95 PID 1344 wrote to memory of 316 1344 cmd.exe 96 PID 1344 wrote to memory of 316 1344 cmd.exe 96 PID 1344 wrote to memory of 316 1344 cmd.exe 96 PID 1344 wrote to memory of 4848 1344 cmd.exe 97 PID 1344 wrote to memory of 4848 1344 cmd.exe 97 PID 1344 wrote to memory of 4848 1344 cmd.exe 97 PID 1344 wrote to memory of 1584 1344 cmd.exe 98 PID 1344 wrote to memory of 1584 1344 cmd.exe 98 PID 1344 wrote to memory of 1584 1344 cmd.exe 98 PID 1344 wrote to memory of 4812 1344 cmd.exe 99 PID 1344 wrote to memory of 4812 1344 cmd.exe 99 PID 1344 wrote to memory of 4812 1344 cmd.exe 99 PID 1344 wrote to memory of 4804 1344 cmd.exe 100 PID 1344 wrote to memory of 4804 1344 cmd.exe 100 PID 1344 wrote to memory of 4804 1344 cmd.exe 100 PID 4548 wrote to memory of 4748 4548 mnolyk.exe 102 PID 4548 wrote to memory of 4748 4548 mnolyk.exe 102 PID 4548 wrote to memory of 4748 4548 mnolyk.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\45741225bec164bfa4e4c45a0c3cabf219dfeb4851fb8020024f03e4de2803fd.exe"C:\Users\Admin\AppData\Local\Temp\45741225bec164bfa4e4c45a0c3cabf219dfeb4851fb8020024f03e4de2803fd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sRm53Ax.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sRm53Ax.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\szj87Lu.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\szj87Lu.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hSA90OK.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hSA90OK.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ksA39ln.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ksA39ln.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 16044⤵
- Program crash
PID:640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ncw33yc.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ncw33yc.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:3876
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2244
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:4848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1584
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"5⤵PID:4812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E5⤵PID:4804
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fxt49Nw.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fxt49Nw.exe1⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1588 -ip 15881⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4648
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4976
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
538KB
MD5c4d6991ceadcd810f66571051dec6798
SHA1253cfeb81271272d85dfc05a5eccac9ad197e967
SHA256f0132f32e34d72a2d40031ad2d141a48a84ad9695438c1f07d3db1ae907bf159
SHA512db4422b750bbd4dafa40fbf1326e6e453fe5a2e9273d702585126471db5bc5801ae90294ca7875d309418152db6d1611a4b4552ef5957d3ce85f4a107626eb3f
-
Filesize
538KB
MD5c4d6991ceadcd810f66571051dec6798
SHA1253cfeb81271272d85dfc05a5eccac9ad197e967
SHA256f0132f32e34d72a2d40031ad2d141a48a84ad9695438c1f07d3db1ae907bf159
SHA512db4422b750bbd4dafa40fbf1326e6e453fe5a2e9273d702585126471db5bc5801ae90294ca7875d309418152db6d1611a4b4552ef5957d3ce85f4a107626eb3f
-
Filesize
306KB
MD5e3bd469e3fd01ab3983d387a7f7c9074
SHA12f1b1a7599ec24688b797675477acdb121eb910d
SHA256301891941f3791dcf7239324e82bba9b891ab4fcc53c27f0944a775db3a66e61
SHA512782fbc92de0384d98f3e5b6831e608853640e41f264e5449c1a95343c80e39e1bdf1d039b83246a8f90aba37db306a14cf4ea3d51e7bf95ba8ae9fe62bb0d6db
-
Filesize
306KB
MD5e3bd469e3fd01ab3983d387a7f7c9074
SHA12f1b1a7599ec24688b797675477acdb121eb910d
SHA256301891941f3791dcf7239324e82bba9b891ab4fcc53c27f0944a775db3a66e61
SHA512782fbc92de0384d98f3e5b6831e608853640e41f264e5449c1a95343c80e39e1bdf1d039b83246a8f90aba37db306a14cf4ea3d51e7bf95ba8ae9fe62bb0d6db
-
Filesize
202KB
MD5e019c1a5fbcce423f1faa8ab210c15d6
SHA10abbd9ed89ee40401a6bf36e2090589415f5b701
SHA256152775ba0234ac64362e97941ddb3e7d6cfe2588100ee0bd94ff45db13a4c836
SHA5120a521d7003e23a78f6e8a8fde93fbfe53891946d838edafb61b01a3359135e7367158a4c20a197d7255d27028f91074126f36bf52b9cf55cdfc28f296c8682b7
-
Filesize
202KB
MD5e019c1a5fbcce423f1faa8ab210c15d6
SHA10abbd9ed89ee40401a6bf36e2090589415f5b701
SHA256152775ba0234ac64362e97941ddb3e7d6cfe2588100ee0bd94ff45db13a4c836
SHA5120a521d7003e23a78f6e8a8fde93fbfe53891946d838edafb61b01a3359135e7367158a4c20a197d7255d27028f91074126f36bf52b9cf55cdfc28f296c8682b7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38