Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2023 15:33
Static task
static1
Behavioral task
behavioral1
Sample
ca7f398c36dc95d40bbf374943ea7cc3940489db6f87fe6c0223c3ffe679544b.exe
Resource
win10v2004-20220901-en
General
-
Target
ca7f398c36dc95d40bbf374943ea7cc3940489db6f87fe6c0223c3ffe679544b.exe
-
Size
744KB
-
MD5
65a3fc697de4af481d3cb865c6de762e
-
SHA1
a916d71ae5670f05fc6b78c6eac00ed1c462b956
-
SHA256
ca7f398c36dc95d40bbf374943ea7cc3940489db6f87fe6c0223c3ffe679544b
-
SHA512
a1efffead8d71deefd5bab31f3ff695cf4d450a6a6566d90ca6fab5475e71fd26dc2ee3a6a499f2d2ed1764861df287acee63411cfb2ba0f44721dc943b0e3ee
-
SSDEEP
12288:VMrEy90W2hMZJZfJ/Q3meFMAieRwQf9rgLvSZFjPQ72vDJ+VniVUsnrMT0Xo5k+b:tyD2iDZfJ/YmWRwVvEQ72vDQnir9ohbt
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ffs17tx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ffs17tx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ffs17tx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ffs17tx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ffs17tx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection ffs17tx.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation njY94kt.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 9 IoCs
pid Process 2920 sQk22Nw.exe 4808 sRh76zy.exe 1520 ffs17tx.exe 3060 heS76Eb.exe 1516 kGQ27IJ.exe 2860 njY94kt.exe 1240 mnolyk.exe 5096 mnolyk.exe 4232 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 1184 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" ffs17tx.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sQk22Nw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sQk22Nw.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sRh76zy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sRh76zy.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ca7f398c36dc95d40bbf374943ea7cc3940489db6f87fe6c0223c3ffe679544b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ca7f398c36dc95d40bbf374943ea7cc3940489db6f87fe6c0223c3ffe679544b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3452 1516 WerFault.exe 86 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1520 ffs17tx.exe 1520 ffs17tx.exe 3060 heS76Eb.exe 3060 heS76Eb.exe 1516 kGQ27IJ.exe 1516 kGQ27IJ.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1520 ffs17tx.exe Token: SeDebugPrivilege 3060 heS76Eb.exe Token: SeDebugPrivilege 1516 kGQ27IJ.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4868 wrote to memory of 2920 4868 ca7f398c36dc95d40bbf374943ea7cc3940489db6f87fe6c0223c3ffe679544b.exe 82 PID 4868 wrote to memory of 2920 4868 ca7f398c36dc95d40bbf374943ea7cc3940489db6f87fe6c0223c3ffe679544b.exe 82 PID 4868 wrote to memory of 2920 4868 ca7f398c36dc95d40bbf374943ea7cc3940489db6f87fe6c0223c3ffe679544b.exe 82 PID 2920 wrote to memory of 4808 2920 sQk22Nw.exe 83 PID 2920 wrote to memory of 4808 2920 sQk22Nw.exe 83 PID 2920 wrote to memory of 4808 2920 sQk22Nw.exe 83 PID 4808 wrote to memory of 1520 4808 sRh76zy.exe 84 PID 4808 wrote to memory of 1520 4808 sRh76zy.exe 84 PID 4808 wrote to memory of 3060 4808 sRh76zy.exe 85 PID 4808 wrote to memory of 3060 4808 sRh76zy.exe 85 PID 4808 wrote to memory of 3060 4808 sRh76zy.exe 85 PID 2920 wrote to memory of 1516 2920 sQk22Nw.exe 86 PID 2920 wrote to memory of 1516 2920 sQk22Nw.exe 86 PID 2920 wrote to memory of 1516 2920 sQk22Nw.exe 86 PID 4868 wrote to memory of 2860 4868 ca7f398c36dc95d40bbf374943ea7cc3940489db6f87fe6c0223c3ffe679544b.exe 90 PID 4868 wrote to memory of 2860 4868 ca7f398c36dc95d40bbf374943ea7cc3940489db6f87fe6c0223c3ffe679544b.exe 90 PID 4868 wrote to memory of 2860 4868 ca7f398c36dc95d40bbf374943ea7cc3940489db6f87fe6c0223c3ffe679544b.exe 90 PID 2860 wrote to memory of 1240 2860 njY94kt.exe 91 PID 2860 wrote to memory of 1240 2860 njY94kt.exe 91 PID 2860 wrote to memory of 1240 2860 njY94kt.exe 91 PID 1240 wrote to memory of 3096 1240 mnolyk.exe 92 PID 1240 wrote to memory of 3096 1240 mnolyk.exe 92 PID 1240 wrote to memory of 3096 1240 mnolyk.exe 92 PID 1240 wrote to memory of 2204 1240 mnolyk.exe 94 PID 1240 wrote to memory of 2204 1240 mnolyk.exe 94 PID 1240 wrote to memory of 2204 1240 mnolyk.exe 94 PID 2204 wrote to memory of 4180 2204 cmd.exe 96 PID 2204 wrote to memory of 4180 2204 cmd.exe 96 PID 2204 wrote to memory of 4180 2204 cmd.exe 96 PID 2204 wrote to memory of 1496 2204 cmd.exe 97 PID 2204 wrote to memory of 1496 2204 cmd.exe 97 PID 2204 wrote to memory of 1496 2204 cmd.exe 97 PID 2204 wrote to memory of 444 2204 cmd.exe 98 PID 2204 wrote to memory of 444 2204 cmd.exe 98 PID 2204 wrote to memory of 444 2204 cmd.exe 98 PID 2204 wrote to memory of 4024 2204 cmd.exe 100 PID 2204 wrote to memory of 4024 2204 cmd.exe 100 PID 2204 wrote to memory of 4024 2204 cmd.exe 100 PID 2204 wrote to memory of 2308 2204 cmd.exe 99 PID 2204 wrote to memory of 2308 2204 cmd.exe 99 PID 2204 wrote to memory of 2308 2204 cmd.exe 99 PID 2204 wrote to memory of 3496 2204 cmd.exe 101 PID 2204 wrote to memory of 3496 2204 cmd.exe 101 PID 2204 wrote to memory of 3496 2204 cmd.exe 101 PID 1240 wrote to memory of 1184 1240 mnolyk.exe 103 PID 1240 wrote to memory of 1184 1240 mnolyk.exe 103 PID 1240 wrote to memory of 1184 1240 mnolyk.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca7f398c36dc95d40bbf374943ea7cc3940489db6f87fe6c0223c3ffe679544b.exe"C:\Users\Admin\AppData\Local\Temp\ca7f398c36dc95d40bbf374943ea7cc3940489db6f87fe6c0223c3ffe679544b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sQk22Nw.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sQk22Nw.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sRh76zy.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sRh76zy.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ffs17tx.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ffs17tx.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\heS76Eb.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\heS76Eb.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kGQ27IJ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kGQ27IJ.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 13524⤵
- Program crash
PID:3452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\njY94kt.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\njY94kt.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:3096
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4180
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:1496
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"5⤵PID:2308
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E5⤵PID:3496
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1184
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1516 -ip 15161⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:5096
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
557KB
MD5b8ecf708fbda057b881b0b53b829f189
SHA1762341205777cb8ad7769db3226e251363a34b0a
SHA2560465a5b523750e24f59d1cfc47a2a57d69df2ded9c2dafdf13662a09336560da
SHA512d611ea0742d98d9b6fac8a7d3035dd909031df6893ab4cad6a4a4e0e0613ac1ae8a07ef96256752192b8e7cdcdfc93929daa46628dedd003e0b4dc20d3b484e6
-
Filesize
557KB
MD5b8ecf708fbda057b881b0b53b829f189
SHA1762341205777cb8ad7769db3226e251363a34b0a
SHA2560465a5b523750e24f59d1cfc47a2a57d69df2ded9c2dafdf13662a09336560da
SHA512d611ea0742d98d9b6fac8a7d3035dd909031df6893ab4cad6a4a4e0e0613ac1ae8a07ef96256752192b8e7cdcdfc93929daa46628dedd003e0b4dc20d3b484e6
-
Filesize
352KB
MD5dd858415b75360783fdc870c89eb958f
SHA1b3af4e657c2a0e4e1110d38cfc930cd814a28a5f
SHA2561cd184e3f9576e553ec992f0fc60a05d0aee6fd7f98bc5bf1484d796902b9674
SHA512fb0f42f6498c13147b04aad01f9d42b6f6ce79864f061ada0dc71fff35f4810a6790b8adc361c9616e83e55d0013b5617ac446b6649f4bbb62848d520ecc5179
-
Filesize
352KB
MD5dd858415b75360783fdc870c89eb958f
SHA1b3af4e657c2a0e4e1110d38cfc930cd814a28a5f
SHA2561cd184e3f9576e553ec992f0fc60a05d0aee6fd7f98bc5bf1484d796902b9674
SHA512fb0f42f6498c13147b04aad01f9d42b6f6ce79864f061ada0dc71fff35f4810a6790b8adc361c9616e83e55d0013b5617ac446b6649f4bbb62848d520ecc5179
-
Filesize
202KB
MD5f918850626410eed97b4a36302fe8815
SHA1e4bf64d8b01f71fea4c75d5f5d37e54339d5bd50
SHA25605d4c46a886b771d21ebc9001658a428d8ce9c8f3092d437e45567e2fb12a1f0
SHA512c651ccb686d83de34b67f1a4d73a4036737ac198c3675b3d3172596bb2b2b5fd796979ef68ad0c93e391343500ebe486f14959c4ab7593a2b01cd5de958c2a08
-
Filesize
202KB
MD5f918850626410eed97b4a36302fe8815
SHA1e4bf64d8b01f71fea4c75d5f5d37e54339d5bd50
SHA25605d4c46a886b771d21ebc9001658a428d8ce9c8f3092d437e45567e2fb12a1f0
SHA512c651ccb686d83de34b67f1a4d73a4036737ac198c3675b3d3172596bb2b2b5fd796979ef68ad0c93e391343500ebe486f14959c4ab7593a2b01cd5de958c2a08
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38