Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16/02/2023, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
67bfd0a0ec759ce4bad8b537f69a86735bd81b8ffc0251a77c7c06132f99a5d6.exe
Resource
win10v2004-20221111-en
General
-
Target
67bfd0a0ec759ce4bad8b537f69a86735bd81b8ffc0251a77c7c06132f99a5d6.exe
-
Size
725KB
-
MD5
21d14bd91cc50b58f1f9c9898a547102
-
SHA1
03ddba55b9051ecaf1a04c5842aa06acad8267f0
-
SHA256
67bfd0a0ec759ce4bad8b537f69a86735bd81b8ffc0251a77c7c06132f99a5d6
-
SHA512
935f3d79c08f7738aebdf1b671e6f17e0c09fcd2aed74e43cc1aa2a2222e58f8b0e40d867ed9d0196ceb7d6a08e3327849870b1b9d10de365dd9763b00fc1bf5
-
SSDEEP
12288:QMr6y90raoMIvsQOBsWcKblXLDZm/JIROVBO7Li6TAfaIpjsBjOsxBjkjDVdKCt:6yEjMIU1x/bdL9m/awiH6fdjE4VdK6
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" itw27hQ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" itw27hQ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" itw27hQ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" itw27hQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection itw27hQ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" itw27hQ.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation nua40vq.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 9 IoCs
pid Process 5024 soG03ZW.exe 3988 sJK95Wz.exe 4984 itw27hQ.exe 2448 kVP89ie.exe 2836 lGl17RY.exe 2824 nua40vq.exe 4604 mnolyk.exe 1860 mnolyk.exe 2680 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 996 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" itw27hQ.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" soG03ZW.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sJK95Wz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sJK95Wz.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 67bfd0a0ec759ce4bad8b537f69a86735bd81b8ffc0251a77c7c06132f99a5d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 67bfd0a0ec759ce4bad8b537f69a86735bd81b8ffc0251a77c7c06132f99a5d6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce soG03ZW.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 212 2836 WerFault.exe 85 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4984 itw27hQ.exe 4984 itw27hQ.exe 2448 kVP89ie.exe 2448 kVP89ie.exe 2836 lGl17RY.exe 2836 lGl17RY.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4984 itw27hQ.exe Token: SeDebugPrivilege 2448 kVP89ie.exe Token: SeDebugPrivilege 2836 lGl17RY.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1276 wrote to memory of 5024 1276 67bfd0a0ec759ce4bad8b537f69a86735bd81b8ffc0251a77c7c06132f99a5d6.exe 81 PID 1276 wrote to memory of 5024 1276 67bfd0a0ec759ce4bad8b537f69a86735bd81b8ffc0251a77c7c06132f99a5d6.exe 81 PID 1276 wrote to memory of 5024 1276 67bfd0a0ec759ce4bad8b537f69a86735bd81b8ffc0251a77c7c06132f99a5d6.exe 81 PID 5024 wrote to memory of 3988 5024 soG03ZW.exe 82 PID 5024 wrote to memory of 3988 5024 soG03ZW.exe 82 PID 5024 wrote to memory of 3988 5024 soG03ZW.exe 82 PID 3988 wrote to memory of 4984 3988 sJK95Wz.exe 83 PID 3988 wrote to memory of 4984 3988 sJK95Wz.exe 83 PID 3988 wrote to memory of 2448 3988 sJK95Wz.exe 84 PID 3988 wrote to memory of 2448 3988 sJK95Wz.exe 84 PID 3988 wrote to memory of 2448 3988 sJK95Wz.exe 84 PID 5024 wrote to memory of 2836 5024 soG03ZW.exe 85 PID 5024 wrote to memory of 2836 5024 soG03ZW.exe 85 PID 5024 wrote to memory of 2836 5024 soG03ZW.exe 85 PID 1276 wrote to memory of 2824 1276 67bfd0a0ec759ce4bad8b537f69a86735bd81b8ffc0251a77c7c06132f99a5d6.exe 89 PID 1276 wrote to memory of 2824 1276 67bfd0a0ec759ce4bad8b537f69a86735bd81b8ffc0251a77c7c06132f99a5d6.exe 89 PID 1276 wrote to memory of 2824 1276 67bfd0a0ec759ce4bad8b537f69a86735bd81b8ffc0251a77c7c06132f99a5d6.exe 89 PID 2824 wrote to memory of 4604 2824 nua40vq.exe 90 PID 2824 wrote to memory of 4604 2824 nua40vq.exe 90 PID 2824 wrote to memory of 4604 2824 nua40vq.exe 90 PID 4604 wrote to memory of 3464 4604 mnolyk.exe 91 PID 4604 wrote to memory of 3464 4604 mnolyk.exe 91 PID 4604 wrote to memory of 3464 4604 mnolyk.exe 91 PID 4604 wrote to memory of 4740 4604 mnolyk.exe 93 PID 4604 wrote to memory of 4740 4604 mnolyk.exe 93 PID 4604 wrote to memory of 4740 4604 mnolyk.exe 93 PID 4740 wrote to memory of 2548 4740 cmd.exe 95 PID 4740 wrote to memory of 2548 4740 cmd.exe 95 PID 4740 wrote to memory of 2548 4740 cmd.exe 95 PID 4740 wrote to memory of 4168 4740 cmd.exe 96 PID 4740 wrote to memory of 4168 4740 cmd.exe 96 PID 4740 wrote to memory of 4168 4740 cmd.exe 96 PID 4740 wrote to memory of 2276 4740 cmd.exe 97 PID 4740 wrote to memory of 2276 4740 cmd.exe 97 PID 4740 wrote to memory of 2276 4740 cmd.exe 97 PID 4740 wrote to memory of 5012 4740 cmd.exe 98 PID 4740 wrote to memory of 5012 4740 cmd.exe 98 PID 4740 wrote to memory of 5012 4740 cmd.exe 98 PID 4740 wrote to memory of 440 4740 cmd.exe 99 PID 4740 wrote to memory of 440 4740 cmd.exe 99 PID 4740 wrote to memory of 440 4740 cmd.exe 99 PID 4740 wrote to memory of 5096 4740 cmd.exe 100 PID 4740 wrote to memory of 5096 4740 cmd.exe 100 PID 4740 wrote to memory of 5096 4740 cmd.exe 100 PID 4604 wrote to memory of 996 4604 mnolyk.exe 102 PID 4604 wrote to memory of 996 4604 mnolyk.exe 102 PID 4604 wrote to memory of 996 4604 mnolyk.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\67bfd0a0ec759ce4bad8b537f69a86735bd81b8ffc0251a77c7c06132f99a5d6.exe"C:\Users\Admin\AppData\Local\Temp\67bfd0a0ec759ce4bad8b537f69a86735bd81b8ffc0251a77c7c06132f99a5d6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\soG03ZW.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\soG03ZW.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sJK95Wz.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sJK95Wz.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\itw27hQ.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\itw27hQ.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kVP89ie.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kVP89ie.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lGl17RY.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lGl17RY.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 13204⤵
- Program crash
PID:212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nua40vq.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nua40vq.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:3464
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2548
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:4168
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:2276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"5⤵PID:440
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E5⤵PID:5096
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:996
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2836 -ip 28361⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:1860
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:2680
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
538KB
MD5d52290cc14a37a5843fe4db9e3435edb
SHA103b485f7f262080d165f7c34d6fbee0549e6a097
SHA2562466afe677f01137de535feb83865104dd5d34fb184811fa5a1699eafa7b67d1
SHA512b62ecc1fce91ff15e1bd398da6ace4f787872525a6b92cc70e9529f591722e5a07599e6c87e2d6e889d44761977462e0f3b15de6d2bac538fdc719e3e0249f3d
-
Filesize
538KB
MD5d52290cc14a37a5843fe4db9e3435edb
SHA103b485f7f262080d165f7c34d6fbee0549e6a097
SHA2562466afe677f01137de535feb83865104dd5d34fb184811fa5a1699eafa7b67d1
SHA512b62ecc1fce91ff15e1bd398da6ace4f787872525a6b92cc70e9529f591722e5a07599e6c87e2d6e889d44761977462e0f3b15de6d2bac538fdc719e3e0249f3d
-
Filesize
306KB
MD5de842f0090c1073a3ff7e689a1710d90
SHA1918b1f7b0ccb3517426e64737da6164632161ce8
SHA256ee96a9320f19143a6119f293b7ef381faf433e8a1fc32cfda5f6fd3ab6ce32e2
SHA5120cc8f7604930d487bde81deef6f41aa0b1701d72e15d689f99660659f0d950e66e7a7680fbe104b4cb598b27016bbfeb1ad8150578da119090dc5687ef1e911e
-
Filesize
306KB
MD5de842f0090c1073a3ff7e689a1710d90
SHA1918b1f7b0ccb3517426e64737da6164632161ce8
SHA256ee96a9320f19143a6119f293b7ef381faf433e8a1fc32cfda5f6fd3ab6ce32e2
SHA5120cc8f7604930d487bde81deef6f41aa0b1701d72e15d689f99660659f0d950e66e7a7680fbe104b4cb598b27016bbfeb1ad8150578da119090dc5687ef1e911e
-
Filesize
202KB
MD54ae935184fd09120851c2048ff9b20a5
SHA1b5ff5c0593c972d248ca56d84184650f225ff514
SHA2568274efcda216489a8ed30ac85bad33839c8f7b09e85482e0832235a891224ad0
SHA5129c91574f845f39576c25e51100932faef1d3c1851afe5e22b35cc9ad12dee88ff533ee95b7c214cdaff5b64a0dc7f66d801756ebfeba3f2bb5720bce61a8265d
-
Filesize
202KB
MD54ae935184fd09120851c2048ff9b20a5
SHA1b5ff5c0593c972d248ca56d84184650f225ff514
SHA2568274efcda216489a8ed30ac85bad33839c8f7b09e85482e0832235a891224ad0
SHA5129c91574f845f39576c25e51100932faef1d3c1851afe5e22b35cc9ad12dee88ff533ee95b7c214cdaff5b64a0dc7f66d801756ebfeba3f2bb5720bce61a8265d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38