Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
16/02/2023, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
fc5babdb16671bd4f0c9e66ee06524f023fa27688bb461795c6b2131a262d632.exe
Resource
win10v2004-20220901-en
General
-
Target
fc5babdb16671bd4f0c9e66ee06524f023fa27688bb461795c6b2131a262d632.exe
-
Size
743KB
-
MD5
799819b6716ae21f4f8510f7a01aff75
-
SHA1
13f550cd693637003e757b434cc72d7d215cc1bf
-
SHA256
fc5babdb16671bd4f0c9e66ee06524f023fa27688bb461795c6b2131a262d632
-
SHA512
bb8f2ab9f206e99186113ed8e039cb12f0ee337725ae3f6ecf65167ce70870a2e190ba0b7b2656de839dc584df5498212fc735ab08071b1c021a7c6bec451d92
-
SSDEEP
12288:1Mrgy90zHKBVr+43te4YOdRtQxEwuD0QC8Ua3djfN8cK4HITT7+pJhmq9Byh:FyMuV6SdtQxEwuD06UaJ6cHMAqkyh
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" isA50hf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" isA50hf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" isA50hf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection isA50hf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" isA50hf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" isA50hf.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mnolyk.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation nzG28ib.exe -
Executes dropped EXE 9 IoCs
pid Process 4656 soL36od.exe 1912 sbX94De.exe 1324 isA50hf.exe 1252 klt59Sj.exe 3516 lti99Av.exe 4824 nzG28ib.exe 4744 mnolyk.exe 2980 mnolyk.exe 4628 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 2284 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" isA50hf.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" soL36od.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sbX94De.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sbX94De.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fc5babdb16671bd4f0c9e66ee06524f023fa27688bb461795c6b2131a262d632.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fc5babdb16671bd4f0c9e66ee06524f023fa27688bb461795c6b2131a262d632.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce soL36od.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4756 3516 WerFault.exe 92 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1324 isA50hf.exe 1324 isA50hf.exe 1252 klt59Sj.exe 1252 klt59Sj.exe 3516 lti99Av.exe 3516 lti99Av.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1324 isA50hf.exe Token: SeDebugPrivilege 1252 klt59Sj.exe Token: SeDebugPrivilege 3516 lti99Av.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2128 wrote to memory of 4656 2128 fc5babdb16671bd4f0c9e66ee06524f023fa27688bb461795c6b2131a262d632.exe 81 PID 2128 wrote to memory of 4656 2128 fc5babdb16671bd4f0c9e66ee06524f023fa27688bb461795c6b2131a262d632.exe 81 PID 2128 wrote to memory of 4656 2128 fc5babdb16671bd4f0c9e66ee06524f023fa27688bb461795c6b2131a262d632.exe 81 PID 4656 wrote to memory of 1912 4656 soL36od.exe 82 PID 4656 wrote to memory of 1912 4656 soL36od.exe 82 PID 4656 wrote to memory of 1912 4656 soL36od.exe 82 PID 1912 wrote to memory of 1324 1912 sbX94De.exe 83 PID 1912 wrote to memory of 1324 1912 sbX94De.exe 83 PID 1912 wrote to memory of 1252 1912 sbX94De.exe 88 PID 1912 wrote to memory of 1252 1912 sbX94De.exe 88 PID 1912 wrote to memory of 1252 1912 sbX94De.exe 88 PID 4656 wrote to memory of 3516 4656 soL36od.exe 92 PID 4656 wrote to memory of 3516 4656 soL36od.exe 92 PID 4656 wrote to memory of 3516 4656 soL36od.exe 92 PID 2128 wrote to memory of 4824 2128 fc5babdb16671bd4f0c9e66ee06524f023fa27688bb461795c6b2131a262d632.exe 97 PID 2128 wrote to memory of 4824 2128 fc5babdb16671bd4f0c9e66ee06524f023fa27688bb461795c6b2131a262d632.exe 97 PID 2128 wrote to memory of 4824 2128 fc5babdb16671bd4f0c9e66ee06524f023fa27688bb461795c6b2131a262d632.exe 97 PID 4824 wrote to memory of 4744 4824 nzG28ib.exe 98 PID 4824 wrote to memory of 4744 4824 nzG28ib.exe 98 PID 4824 wrote to memory of 4744 4824 nzG28ib.exe 98 PID 4744 wrote to memory of 1848 4744 mnolyk.exe 99 PID 4744 wrote to memory of 1848 4744 mnolyk.exe 99 PID 4744 wrote to memory of 1848 4744 mnolyk.exe 99 PID 4744 wrote to memory of 4124 4744 mnolyk.exe 101 PID 4744 wrote to memory of 4124 4744 mnolyk.exe 101 PID 4744 wrote to memory of 4124 4744 mnolyk.exe 101 PID 4124 wrote to memory of 3288 4124 cmd.exe 103 PID 4124 wrote to memory of 3288 4124 cmd.exe 103 PID 4124 wrote to memory of 3288 4124 cmd.exe 103 PID 4124 wrote to memory of 3056 4124 cmd.exe 104 PID 4124 wrote to memory of 3056 4124 cmd.exe 104 PID 4124 wrote to memory of 3056 4124 cmd.exe 104 PID 4124 wrote to memory of 892 4124 cmd.exe 105 PID 4124 wrote to memory of 892 4124 cmd.exe 105 PID 4124 wrote to memory of 892 4124 cmd.exe 105 PID 4124 wrote to memory of 1316 4124 cmd.exe 106 PID 4124 wrote to memory of 1316 4124 cmd.exe 106 PID 4124 wrote to memory of 1316 4124 cmd.exe 106 PID 4124 wrote to memory of 4364 4124 cmd.exe 107 PID 4124 wrote to memory of 4364 4124 cmd.exe 107 PID 4124 wrote to memory of 4364 4124 cmd.exe 107 PID 4124 wrote to memory of 4264 4124 cmd.exe 108 PID 4124 wrote to memory of 4264 4124 cmd.exe 108 PID 4124 wrote to memory of 4264 4124 cmd.exe 108 PID 4744 wrote to memory of 2284 4744 mnolyk.exe 110 PID 4744 wrote to memory of 2284 4744 mnolyk.exe 110 PID 4744 wrote to memory of 2284 4744 mnolyk.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc5babdb16671bd4f0c9e66ee06524f023fa27688bb461795c6b2131a262d632.exe"C:\Users\Admin\AppData\Local\Temp\fc5babdb16671bd4f0c9e66ee06524f023fa27688bb461795c6b2131a262d632.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\soL36od.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\soL36od.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sbX94De.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sbX94De.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\isA50hf.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\isA50hf.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\klt59Sj.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\klt59Sj.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lti99Av.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lti99Av.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 13124⤵
- Program crash
PID:4756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nzG28ib.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nzG28ib.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:1848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3288
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:3056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"5⤵PID:4364
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E5⤵PID:4264
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2284
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3516 -ip 35161⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:2980
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
557KB
MD56521dde045452bd861e68646f83f91f3
SHA1cb0841c83a61282846e52a54c0820090aa171c52
SHA256c1e477f38c97c5c2870c3657c47bdcca872170cb78b110378921cfaaef1289d6
SHA5122b4b9db9185acacebee864535dc2fe70a82600e8f3e0d6dbf1fdbf2409ec0a58fca77e4985c2cd99a78efb4a4bc4e1c5c5bbcd09390fd0c20e23e4d0f4119aa4
-
Filesize
557KB
MD56521dde045452bd861e68646f83f91f3
SHA1cb0841c83a61282846e52a54c0820090aa171c52
SHA256c1e477f38c97c5c2870c3657c47bdcca872170cb78b110378921cfaaef1289d6
SHA5122b4b9db9185acacebee864535dc2fe70a82600e8f3e0d6dbf1fdbf2409ec0a58fca77e4985c2cd99a78efb4a4bc4e1c5c5bbcd09390fd0c20e23e4d0f4119aa4
-
Filesize
352KB
MD5df7d202d9b57eda6183ee678d9424ccd
SHA1614ba684060c40c7d6022a37d066e578e1982513
SHA256f93557efd3fa8e2c6c0caad37b3e5ba5951f1c6e73568316e966283aaa618c5a
SHA51225092eb83de6d8a5e3bb79469e9147bf2bb48b5b6bc74892ed16d4c5529c3ec73f2a86cca5319f91778b656a3396fff7d2cae6c738d7504f0bd8f97b2ed0e843
-
Filesize
352KB
MD5df7d202d9b57eda6183ee678d9424ccd
SHA1614ba684060c40c7d6022a37d066e578e1982513
SHA256f93557efd3fa8e2c6c0caad37b3e5ba5951f1c6e73568316e966283aaa618c5a
SHA51225092eb83de6d8a5e3bb79469e9147bf2bb48b5b6bc74892ed16d4c5529c3ec73f2a86cca5319f91778b656a3396fff7d2cae6c738d7504f0bd8f97b2ed0e843
-
Filesize
202KB
MD518cce5b2de3d6e5c7af83cad876404e9
SHA170f3754909a55213110792eecb20e79666f3db53
SHA256bfca48537eba2ce6fb3d78f3cf0e3bec401d34cfc67765fc438e1306e8f13146
SHA512100e7ad9e9ea0cce801c61b490e29bd392a182a002376540a8ebf654f6279d044c4ee190ad7ca3fdc550afe36f93a19d45cf44fc37af5eaa6486e740d4f20a6a
-
Filesize
202KB
MD518cce5b2de3d6e5c7af83cad876404e9
SHA170f3754909a55213110792eecb20e79666f3db53
SHA256bfca48537eba2ce6fb3d78f3cf0e3bec401d34cfc67765fc438e1306e8f13146
SHA512100e7ad9e9ea0cce801c61b490e29bd392a182a002376540a8ebf654f6279d044c4ee190ad7ca3fdc550afe36f93a19d45cf44fc37af5eaa6486e740d4f20a6a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38