Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2023, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
69fe38a64095b9ddeb2e70767ff6bc00a3f5fa24639fdc7bd09578470934997b.exe
Resource
win10v2004-20220812-en
General
-
Target
69fe38a64095b9ddeb2e70767ff6bc00a3f5fa24639fdc7bd09578470934997b.exe
-
Size
722KB
-
MD5
9a03980c87a7396577580442c2ee90d4
-
SHA1
65f538e4340364fbb3c325f7f602165882859473
-
SHA256
69fe38a64095b9ddeb2e70767ff6bc00a3f5fa24639fdc7bd09578470934997b
-
SHA512
aa7c23ce5b212f56c2a6a3c42151ac6a67e60fdfcfecf7cb41e8102b14c5e3ccbae4634a83fafb12bf083a0de5c9d8cbef04c0f11eb635f3c572d86c1313a85c
-
SSDEEP
12288:/MrTy90uxtHE0FbNS1QNHoV/AnFEVXNFmlapr/G/uqaXQH3:wyzHBpNS1QNIV/KEVXWsp7GzaU3
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ftD09ej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection ftD09ej.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ftD09ej.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ftD09ej.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ftD09ej.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ftD09ej.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation nVT29YM.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 9 IoCs
pid Process 3344 sHc84WX.exe 3996 sqy96ms.exe 2952 ftD09ej.exe 4376 hPp61LX.exe 3088 kgW84Nq.exe 5016 nVT29YM.exe 2784 mnolyk.exe 1720 mnolyk.exe 2428 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 1284 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" ftD09ej.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sqy96ms.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 69fe38a64095b9ddeb2e70767ff6bc00a3f5fa24639fdc7bd09578470934997b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 69fe38a64095b9ddeb2e70767ff6bc00a3f5fa24639fdc7bd09578470934997b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sHc84WX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sHc84WX.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sqy96ms.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1968 3088 WerFault.exe 87 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4864 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2952 ftD09ej.exe 2952 ftD09ej.exe 4376 hPp61LX.exe 4376 hPp61LX.exe 3088 kgW84Nq.exe 3088 kgW84Nq.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2952 ftD09ej.exe Token: SeDebugPrivilege 4376 hPp61LX.exe Token: SeDebugPrivilege 3088 kgW84Nq.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3496 wrote to memory of 3344 3496 69fe38a64095b9ddeb2e70767ff6bc00a3f5fa24639fdc7bd09578470934997b.exe 81 PID 3496 wrote to memory of 3344 3496 69fe38a64095b9ddeb2e70767ff6bc00a3f5fa24639fdc7bd09578470934997b.exe 81 PID 3496 wrote to memory of 3344 3496 69fe38a64095b9ddeb2e70767ff6bc00a3f5fa24639fdc7bd09578470934997b.exe 81 PID 3344 wrote to memory of 3996 3344 sHc84WX.exe 82 PID 3344 wrote to memory of 3996 3344 sHc84WX.exe 82 PID 3344 wrote to memory of 3996 3344 sHc84WX.exe 82 PID 3996 wrote to memory of 2952 3996 sqy96ms.exe 83 PID 3996 wrote to memory of 2952 3996 sqy96ms.exe 83 PID 3996 wrote to memory of 4376 3996 sqy96ms.exe 84 PID 3996 wrote to memory of 4376 3996 sqy96ms.exe 84 PID 3996 wrote to memory of 4376 3996 sqy96ms.exe 84 PID 3344 wrote to memory of 3088 3344 sHc84WX.exe 87 PID 3344 wrote to memory of 3088 3344 sHc84WX.exe 87 PID 3344 wrote to memory of 3088 3344 sHc84WX.exe 87 PID 3496 wrote to memory of 5016 3496 69fe38a64095b9ddeb2e70767ff6bc00a3f5fa24639fdc7bd09578470934997b.exe 91 PID 3496 wrote to memory of 5016 3496 69fe38a64095b9ddeb2e70767ff6bc00a3f5fa24639fdc7bd09578470934997b.exe 91 PID 3496 wrote to memory of 5016 3496 69fe38a64095b9ddeb2e70767ff6bc00a3f5fa24639fdc7bd09578470934997b.exe 91 PID 5016 wrote to memory of 2784 5016 nVT29YM.exe 92 PID 5016 wrote to memory of 2784 5016 nVT29YM.exe 92 PID 5016 wrote to memory of 2784 5016 nVT29YM.exe 92 PID 2784 wrote to memory of 4864 2784 mnolyk.exe 93 PID 2784 wrote to memory of 4864 2784 mnolyk.exe 93 PID 2784 wrote to memory of 4864 2784 mnolyk.exe 93 PID 2784 wrote to memory of 5044 2784 mnolyk.exe 95 PID 2784 wrote to memory of 5044 2784 mnolyk.exe 95 PID 2784 wrote to memory of 5044 2784 mnolyk.exe 95 PID 5044 wrote to memory of 4796 5044 cmd.exe 97 PID 5044 wrote to memory of 4796 5044 cmd.exe 97 PID 5044 wrote to memory of 4796 5044 cmd.exe 97 PID 5044 wrote to memory of 4200 5044 cmd.exe 98 PID 5044 wrote to memory of 4200 5044 cmd.exe 98 PID 5044 wrote to memory of 4200 5044 cmd.exe 98 PID 5044 wrote to memory of 3268 5044 cmd.exe 99 PID 5044 wrote to memory of 3268 5044 cmd.exe 99 PID 5044 wrote to memory of 3268 5044 cmd.exe 99 PID 5044 wrote to memory of 5036 5044 cmd.exe 100 PID 5044 wrote to memory of 5036 5044 cmd.exe 100 PID 5044 wrote to memory of 5036 5044 cmd.exe 100 PID 5044 wrote to memory of 2336 5044 cmd.exe 101 PID 5044 wrote to memory of 2336 5044 cmd.exe 101 PID 5044 wrote to memory of 2336 5044 cmd.exe 101 PID 5044 wrote to memory of 4520 5044 cmd.exe 102 PID 5044 wrote to memory of 4520 5044 cmd.exe 102 PID 5044 wrote to memory of 4520 5044 cmd.exe 102 PID 2784 wrote to memory of 1284 2784 mnolyk.exe 104 PID 2784 wrote to memory of 1284 2784 mnolyk.exe 104 PID 2784 wrote to memory of 1284 2784 mnolyk.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\69fe38a64095b9ddeb2e70767ff6bc00a3f5fa24639fdc7bd09578470934997b.exe"C:\Users\Admin\AppData\Local\Temp\69fe38a64095b9ddeb2e70767ff6bc00a3f5fa24639fdc7bd09578470934997b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sHc84WX.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sHc84WX.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sqy96ms.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sqy96ms.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ftD09ej.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ftD09ej.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hPp61LX.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hPp61LX.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kgW84Nq.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kgW84Nq.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 15084⤵
- Program crash
PID:1968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nVT29YM.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nVT29YM.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:4864
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4796
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:4200
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:3268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5036
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"5⤵PID:2336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E5⤵PID:4520
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1284
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3088 -ip 30881⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:1720
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:2428
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
535KB
MD57e46d6e5e93259bf0a34d17e3cef592c
SHA1f0402f0b030875f21664e76858d0024232ae9350
SHA256290f9eebc6a603cd48361b168632bd00624dd09e0afd614c6f8864d175ead1cf
SHA5129ab02b69cab22a10763dd45f24e227bfe61fdbf234d76c58dbc3b4169cb10ae291e444300d0779a498a5bca0feae36a223c99f525a7ca6c3ed22765ba0317e98
-
Filesize
535KB
MD57e46d6e5e93259bf0a34d17e3cef592c
SHA1f0402f0b030875f21664e76858d0024232ae9350
SHA256290f9eebc6a603cd48361b168632bd00624dd09e0afd614c6f8864d175ead1cf
SHA5129ab02b69cab22a10763dd45f24e227bfe61fdbf234d76c58dbc3b4169cb10ae291e444300d0779a498a5bca0feae36a223c99f525a7ca6c3ed22765ba0317e98
-
Filesize
299KB
MD52e21d812c7c00c3c91b1d632595fa0b3
SHA16ddc68edd4fea9376e8ce3988eb6506d52122402
SHA256dc31e785818a0e46f2342cc27a724276607d6115382ecbee8fa0530a534e6345
SHA51227ad851dcb623165ef3c7af2aa8d226c40c3f89de188b0c284e1f69d305ea555f31dab4c07cfb994fd78f92f5906e147de478307e7995e822962aee9f426b706
-
Filesize
299KB
MD52e21d812c7c00c3c91b1d632595fa0b3
SHA16ddc68edd4fea9376e8ce3988eb6506d52122402
SHA256dc31e785818a0e46f2342cc27a724276607d6115382ecbee8fa0530a534e6345
SHA51227ad851dcb623165ef3c7af2aa8d226c40c3f89de188b0c284e1f69d305ea555f31dab4c07cfb994fd78f92f5906e147de478307e7995e822962aee9f426b706
-
Filesize
202KB
MD527cd9e74b29862c8a80e8f7f3986a1b7
SHA13944fb73c75633eec371b4d81cc7991ea01b4498
SHA25680e962a743d97dd392c95c73d7dd31b915542869073b22e2a8608eb6360dbb79
SHA5123f9baecf2c95e770eb2cfec51551e0d9ddf47a8812a66e52db13c74ee2701146669adc97c06bdbbcd37989f9220624f035c338729d27d89875e73411ce9c7656
-
Filesize
202KB
MD527cd9e74b29862c8a80e8f7f3986a1b7
SHA13944fb73c75633eec371b4d81cc7991ea01b4498
SHA25680e962a743d97dd392c95c73d7dd31b915542869073b22e2a8608eb6360dbb79
SHA5123f9baecf2c95e770eb2cfec51551e0d9ddf47a8812a66e52db13c74ee2701146669adc97c06bdbbcd37989f9220624f035c338729d27d89875e73411ce9c7656
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38