Analysis
-
max time kernel
26s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 13:07
Behavioral task
behavioral1
Sample
b5347092718683fa5a74aff5b6656b72.exe
Resource
win7-20231215-en
General
-
Target
b5347092718683fa5a74aff5b6656b72.exe
-
Size
37KB
-
MD5
b5347092718683fa5a74aff5b6656b72
-
SHA1
6c6e334d3a52ad6e805209a015d31b793e2f0cea
-
SHA256
77c4253cbeb2ac6a2f73c7d24a9c8162452d82dee3b6070c6bf336467e57ee45
-
SHA512
30a3b21bc545e8278c411566d94eb729ec0814de7df939ba14dbe80fd2a6da316e6492ec9e4238764b215ca20b6ac87d8a3af9955bb8abfb8b66d89e7c4d6f0f
-
SSDEEP
768:3E45SLnQpEhOB/hAGflc5xOXhr7gvexzv36:3E4EqEhOPNfqStgvexzv3
Malware Config
Extracted
smokeloader
2022
http://185.215.113.68/fks/index.php
Extracted
amadey
4.13
http://5.42.65.125
-
install_dir
0de90fc5c7
-
install_file
Utsysc.exe
-
strings_key
b34dd8f60e55add4645c4650cc7f7e7e
-
url_paths
/k92lsA3dpb/index.php
Extracted
redline
@oleh_ps
176.123.7.190:32927
185.172.128.33:38294
Extracted
redline
666
195.20.16.103:18305
Signatures
-
Detect Lumma Stealer payload V4 5 IoCs
resource yara_rule behavioral2/memory/4376-50-0x0000000003100000-0x000000000317E000-memory.dmp family_lumma_v4 behavioral2/memory/4376-56-0x0000000003100000-0x000000000317E000-memory.dmp family_lumma_v4 behavioral2/memory/924-144-0x0000000000400000-0x000000000047E000-memory.dmp family_lumma_v4 behavioral2/memory/924-148-0x0000000000400000-0x000000000047E000-memory.dmp family_lumma_v4 behavioral2/memory/924-146-0x0000000000400000-0x000000000047E000-memory.dmp family_lumma_v4 -
Detect ZGRat V1 5 IoCs
resource yara_rule behavioral2/files/0x0009000000023206-11.dat family_zgrat_v1 behavioral2/files/0x0009000000023206-10.dat family_zgrat_v1 behavioral2/memory/3340-13-0x0000000000950000-0x0000000000DEE000-memory.dmp family_zgrat_v1 behavioral2/memory/2056-69-0x0000000000400000-0x0000000000468000-memory.dmp family_zgrat_v1 behavioral2/memory/2056-68-0x0000000000590000-0x00000000005EA000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 7 IoCs
resource yara_rule behavioral2/files/0x000900000002320c-37.dat family_redline behavioral2/memory/4432-38-0x0000000000AE0000-0x0000000000B1C000-memory.dmp family_redline behavioral2/files/0x000900000002320c-36.dat family_redline behavioral2/memory/2736-99-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral2/files/0x0007000000023224-134.dat family_redline behavioral2/memory/3820-135-0x0000000000770000-0x00000000007C2000-memory.dmp family_redline behavioral2/files/0x0007000000023224-133.dat family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 3412 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 3340 A4EB.exe 2484 A76C.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4856 3900 WerFault.exe 114 3400 3900 WerFault.exe 114 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b5347092718683fa5a74aff5b6656b72.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b5347092718683fa5a74aff5b6656b72.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b5347092718683fa5a74aff5b6656b72.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4048 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3404 b5347092718683fa5a74aff5b6656b72.exe 3404 b5347092718683fa5a74aff5b6656b72.exe 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found 3412 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3404 b5347092718683fa5a74aff5b6656b72.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3412 Process not Found Token: SeCreatePagefilePrivilege 3412 Process not Found Token: SeShutdownPrivilege 3412 Process not Found Token: SeCreatePagefilePrivilege 3412 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3412 wrote to memory of 3340 3412 Process not Found 95 PID 3412 wrote to memory of 3340 3412 Process not Found 95 PID 3412 wrote to memory of 3340 3412 Process not Found 95 PID 3412 wrote to memory of 2484 3412 Process not Found 96 PID 3412 wrote to memory of 2484 3412 Process not Found 96 PID 3412 wrote to memory of 2484 3412 Process not Found 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5347092718683fa5a74aff5b6656b72.exe"C:\Users\Admin\AppData\Local\Temp\b5347092718683fa5a74aff5b6656b72.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3404
-
C:\Users\Admin\AppData\Local\Temp\A4EB.exeC:\Users\Admin\AppData\Local\Temp\A4EB.exe1⤵
- Executes dropped EXE
PID:3340 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\A76C.exeC:\Users\Admin\AppData\Local\Temp\A76C.exe1⤵
- Executes dropped EXE
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\0de90fc5c7\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\0de90fc5c7\Utsysc.exe"2⤵PID:5072
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\0de90fc5c7\Utsysc.exe" /F1⤵
- Creates scheduled task(s)
PID:4048
-
C:\Users\Admin\AppData\Local\Temp\A9AF.exeC:\Users\Admin\AppData\Local\Temp\A9AF.exe1⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\AC50.exeC:\Users\Admin\AppData\Local\Temp\AC50.exe1⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\BCBC.exeC:\Users\Admin\AppData\Local\Temp\BCBC.exe1⤵PID:948
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\BF0F.exeC:\Users\Admin\AppData\Local\Temp\BF0F.exe1⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\0de90fc5c7\qemu-ga.exe"C:\Users\Admin\AppData\Local\Temp\0de90fc5c7\qemu-ga.exe"2⤵PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\D72C.exeC:\Users\Admin\AppData\Local\Temp\D72C.exe1⤵PID:3160
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 7523⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 7803⤵
- Program crash
PID:3400
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\0de90fc5c7\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\0de90fc5c7\Utsysc.exe1⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\D96F.exeC:\Users\Admin\AppData\Local\Temp\D96F.exe1⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3900 -ip 39001⤵PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3900 -ip 39001⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\0de90fc5c7\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\0de90fc5c7\Utsysc.exe1⤵PID:4416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5f38287db7123be9031758dec282d72df
SHA177897bce08cf8619a1c21aea5d577645666d3fbe
SHA256a957d596b684876da7b4f5edcc7f9c66572184f01b7a35a47e427607e9ac8ace
SHA51250d02886ff354c022bf6e090f250cd9c71ce0c0840bf3b8c9165ee3c1a6cf3aa90e62f239efa743dd125b80c4a00607278d44dab13339202598b35639dc118dc
-
Filesize
20KB
MD55c74b72c805d88a0f37a6df1e85ed652
SHA1df2f8bff979aafca4f1fe03256909313999730e3
SHA2567316e6d1c5b126c45fe9dcfd13b758bb5fa51a9717d706bb0f3f8cf9f072f92b
SHA512c0749424e12a6930fad040221c660abde5cd6e71152d6d5fee1e2ab5053b2a22737906eb6970f026bd0f395d966cb66dc0855993274afda00d90ceaef94d4814
-
Filesize
177KB
MD539cb46b1519f22a62205bfa1748c0cbb
SHA1ad511a9dd3a86a837146d28a186acf3f72e12720
SHA2569dc02d99154b0d73134ac273bf6f9aa3aedaad13a8350a11b5719b12cbb8a58a
SHA51277583ed2c72991c7b18127fd9de22295602f35e320d0f5b5941f928249c2a317524778bcf9443e27c876f0fd1e08211741cbb9f3ad9c7dc2bac20df8d94faf68
-
Filesize
90KB
MD5da06fb89ece1eef9ab94519835a53714
SHA1fa9efd6cc5772d120d62b35e1e124435732d02c4
SHA256c1dd7f03aaa24f62ab42eb053177798d1806d992ad89d524994f9706f820b1bf
SHA51271644f57608216807438b5652e5a19e51dfc79be9eca3e90145a618717c028d50b09d34df065b6f253ce7be6319c025c578ce92ac3787e5d2270c44802a127e4
-
Filesize
55KB
MD540095eb43b620ca3f3ec98549a036f26
SHA17af1e60c3adf51c2e41785de2771aa12be217c64
SHA25652e24ea547ce49e5be16ad01f0b8ee1c55cb68efd1d62c7eeaa1239fa66a3fc8
SHA512569c10e8b1d2a783af31d18124e4b51023b5384740684a1e8c8de0f8a5080995655592c5276beb9c95f10f1903ae3a5179a5fb5a97e7c2e084175e652563f9b9
-
Filesize
4KB
MD5d4910f56121ae1e3049ee0ed506ed5dc
SHA1be48eba194f3e507873740cb844c7724ff4ba616
SHA256ac70c1847bdf903a698de1badb72b9f9539ae9cc75cb3acc3062e4622977ee95
SHA512c551d52823886f9cec7024457a06028526e8581f3dabd63646db57b9fa4760ccd9a295431cb1d037c20ead0be96f9fa21b04b8611a66429467ef538a8f0468d6
-
Filesize
1KB
MD5205801640d409192170bf641a245d3af
SHA1d51c4f37e96371d243ca02255c1c42afdfe8e4e2
SHA2563298e490daa65cd621aec8fe78a8a5b81900d1700d3ae73a205e7272d0354ab4
SHA512b74b3aa5d23a288dbf7c4fdd571b02b9dc18064aeb3564807025a6cd81fe37b99f55ee3853db62f3717b1c266379412835683c9d8fd739bd9fa055398337417d
-
Filesize
27KB
MD52bf704ba55a3bd237ded0d930a39ca71
SHA1ca082a13040f3f2440256a8b20577ab6ab81e359
SHA256c662dd16da12862cd2b4282556ea6b8a609b88d2d031adea4d96b6323af73f48
SHA512b7755f68b1b8b3d836dafdcf54bbb615a2ed6aa5dfa55d1a092eae301fc3f2c5891541a3a33f2af46fbfdef9883a62bd03f4a07b96128b7513d30beb9909582b
-
Filesize
180KB
MD59fcc26fac14e4667c119193b48ca0ffe
SHA1c0605892f09b342ada6abe52e00553beed575b8e
SHA2567abbafb878454e9ca2ecaf1429c760fbc6168111d9bf52a07151d0f50e00dda7
SHA512c9ca0fc019c8d0af167f65bed02b7c9ad0d4a1584ab826fe65bea90afd9aafe8e456c26e807a12cd177280d081bf718756f7d95ddd45250283a429091d9ca44c
-
Filesize
190KB
MD5f6c040ce9b94bfaba6aaa8d50295c42e
SHA111af8e82c8af601d665798566dfba923ac63dd73
SHA256678e8d803559e71b04b9db44b73f98a91b1611ec0c2c71cbfaaf44848227aba1
SHA512e08646d9a2ef46215e67fbf38babf1daefcf906886cff3ecd75296e01bea817d78a030ec36c8daffe6785373e594c0f0a2b8186ea75805b77b68f95bfc3f2571
-
Filesize
104KB
MD53fbdb1cee531cf9b560252962994b7dd
SHA1eaa78fcf1c7d755e0775719c15bf9d483929962d
SHA2568fe4354b107b92c91c4558e54de33ec1fe27c5c8b7959fb2eb4ac72bf0b02340
SHA51290d8906a1ae5d85eed5a430f5981e14c0b85b454c49b5f468ae4600e4bd2a9572e4c749a9e3e237e667f5f2cbd8844eff810916a17ff18bc82c1221b30ce4c31
-
Filesize
56KB
MD5e3641731d5d69aff5f4fc84ec82a79fa
SHA1b8ef555db49bc019f343f26db5b49b9be5dfb5b0
SHA256b48720b47097fba383343b4ae3afc019a478c7954ae26f926ab2b01d691595d2
SHA51200aba6e3ebe8410f649bd18bc72522eaa4932143002cf7d76ec423d6067f466a11e05333a7ee67155c5af252be960623c842289ee391611db92b3556d68b9fa3
-
Filesize
154KB
MD5806c9bb3c13130626d78d8c7c4d9ad8c
SHA15c2ff261ac37ac0160dc224fc826c433ea92dcd9
SHA256c9dfde6b8f13306000793a0b6ee0217bcecf95665d6b31d27d41ad277af4e743
SHA5128055c77334d1bd35d52d43d8a1cbe4c0203039eb3d8b2cb3b0a553c2013a230ecbdd0a65fb72df71e3892dcb43f65c5655d9cc729a31b18fe61575b4f7e7dea5
-
Filesize
136KB
MD52a13f3297265142f2add24de0071f825
SHA1976a1c6f22041e4c15617c8652ec5bcccee85d13
SHA2564ad44c072b7dc73976de1b4793969ec46c1112c9fb4f0945452e9deae18e9c9a
SHA512abf7cbe6d69522465a8f039d3422d423080f362051ebcc1ceb17c63a3ea412205982c0df4ad15c2d8a92fd1d5ba28b51344389c11b644c27552d9b2c353a6fce
-
Filesize
148KB
MD539a7f8d529f87a3922334fbb9886e648
SHA15b0847734fc36034682dd0d9800c90771c0cbdb5
SHA256f7c99dedc1b0c389fb184ecb3b877b2c1cb73a6405c03abbc1127f4537ef6e2c
SHA5127dbffa3e5c042fe7b290db90a9e5d79a8631817c2cd25e4b419618690581cf0d06036b86a0c368a77f8097077795c1e504d38dc377274996e3ca3d3de8594784
-
Filesize
92KB
MD5d7dee44c3e6eff78c8cc10dcccede781
SHA12ff1e148a00e3b9cedde555c2d5e347f3f2b081d
SHA256a28be58a2ee8f0a0712471c277ff98115e24c949507ade83f41e35b393c05cc7
SHA512a534f50c202daa8ea86dcd19a2fda5e1c56e29ae0bf44059be03e60d8021674b3d6b982cb68ffc692d9061284baddcd315d0684fdb768307cd28a953e12a25f9
-
Filesize
46KB
MD5aa8423be754367707204188402976066
SHA1771c191da0e1f3c192a2fe4e5c43fb279d14e393
SHA2565badb5f972ff98a6d5e48447c96fa3d18cc725cacb17931ba54b37bd123e1a87
SHA512cab7d10292026505ab885aa6bb017c1fad0c27810f8eef52723cf6cef82b2909cd12be41e7553c3a6c8c792ad82f09800777527b9481f46f28fa3d9833f003b3
-
Filesize
118KB
MD53dc31abd0b940663d8c0f6480c263f07
SHA16017ad1147849cc6d25f47eaf7e46ab0045ea516
SHA25610b0908927f49a8daf02e0cf10d0abef91c4883a7638e3d94e66658b083ff96a
SHA5126882b7dc24ad8db4d97fd4fff463e7a1565daeb67bd740e0c72c41d170dcfd8a6e61dbac222d66dcdd0e7f2bf85d3e533a7928029c464533bb6f605b44a62120
-
Filesize
152KB
MD5c0f26c489ad3add4ab0d7a983e4b301f
SHA12583eadce69f31d84a233cee43e8c7ace6c0e4bf
SHA256c75e262bf703307edf7e9af245f632b33d39cd723e353df840c94f204331a891
SHA5128dfe176bae63d8a5ba5d508f749752894bed85b906d7306a9249db39457d17ed239ab5871f09ee715708a908ff1e5577d12da8ffb59f55e2e4fb3ec36e77c7a3
-
Filesize
17KB
MD58e9ec8849c9dc2bce97d5666cc97335b
SHA12654c80d9e382ee60582617d83a4566a1c2e93f6
SHA256cccc9d4a28b543fa17c31c625e33c220ddb53f9b22bb38f5d9ac6a952d5472ca
SHA512078426e147f85eca780a4c784d363a982c197f9a5fbd91c5dc454a0f1a510e1b850f796196954506ee163de679327eaf084b54e5f6217e7b713d125650db5d09
-
Filesize
108KB
MD52eabd84f5f3c64503ca9c16d985fa04b
SHA17bf591fffcd003ced6072144c53de09104a8e001
SHA2560fd3bde55779ee867d4d23b7ee167d2573265acbf03dcccaaa9651e579c5293e
SHA5128b9a12be5f69733a1e625b24f73173e4b5ac447fdf98db70d7e7a6a58ae0070b52da31f1c563f3544dbe39117497a45ea45ba169955b39208a2272543baf4d4c
-
Filesize
63KB
MD5f1bd3ac9a090bc025ccc337ec78515ae
SHA1a8b41d4e8fca36f43df4949d0ad76844f4e1a42e
SHA256e3af3f1bceba6267d9837ed6f22de889e9dc4266165d103d3b27289e575b6ffa
SHA5122798e3f0408250bb2a1425a65aa62e4f0a633bb2c3f15dc918cd1ec50f9b05694ca0efcd782f9b2504abf264bde0f619a468b1a508ab199d3ff6e6abf550878b
-
Filesize
57KB
MD5b890dcc7b93276bd8a3d05beaf9b2541
SHA1946349a938a78497e417141729365b10e9962f7f
SHA256174fef9661d16753134979e4098030cd98a2c2614d8543a4fa69de52fd0fc403
SHA512d5ba0d1a7a94ad904f7aaa99e8751ca149aa21164af350f0519bab1d46b935d553da12b30d87b3fb27104517d32a68e1280560594032414d429d5b7be0364f5f
-
Filesize
27KB
MD5f590ca45d96e0c85ff6c6efa3abc7b82
SHA1cf6c469b09b09717b9dc5b30e3bdd5b4cd86a170
SHA256eaec38653aff394e1ce33e2b7319d3ce7091998cf37b5e4e8e320d24c2b2f38b
SHA5124cce3e1df6014bfe221427d378511529b4ea4c307f908c82d52c48a714166c529b3883983bc4546f905324a4aebcbc8f937d0cf4452907314efd46042196aa7a
-
Filesize
92KB
MD5e7e93c800f74b84706a6cf60844e8e03
SHA124fa13318c0393f37d632e41cf7eebf4ed1cf826
SHA25680e2132f3e5b995b1128cb69991f0f02f01fb5b9323cf9b275b3b71b98805b46
SHA512bbc9367dba2618c5ffb4f20a301d4637e9326d42786472eb034b71a12be83635c70f8d4779ff454aa5c91ae63fd191ef90f17d60bb98bba358530bc287faa6b6
-
Filesize
219KB
MD52a4dcb0893659ceba6746074cecdea49
SHA1cd9f2757e637a52eac95dd3edc7514f838f67c3e
SHA2562f4e2321c5688efd3ec022d36c9af1622b147471434efb4d718366f64f77d894
SHA512c1fc44d7c40b2e7683f64dadc53b255adb3e0cc4dda089aeb75bb62e4f55121721bbd28cef78f0d05e87f1fd3ecf7675536e25c3a4911392bed03f315e6fb966
-
Filesize
43KB
MD511c541906ce75dcf8bd1f5a32770085c
SHA1759596a7de9ce617afffbf7ee7989122d57a79f6
SHA256724356db0dd05ca69c17cff930c72c9c5840e184ae8ca1bbc077112ebf4f3553
SHA512e2751a7010b45f8af31a98d36a701a39818306d1aebd0d777966a71fcc57cac7f108b4d91fcb16ef045bcfb4be75234d256da7c83c860532aa596536cf78ec3f