Overview
overview
10Static
static
10Paypal cracker.exe
windows7-x64
10Paypal cracker.exe
windows10-2004-x64
libeay32.dll
windows7-x64
3libeay32.dll
windows10-2004-x64
3libssl32.dll
windows7-x64
3libssl32.dll
windows10-2004-x64
3msvcr71.dll
windows7-x64
3msvcr71.dll
windows10-2004-x64
3ssleay32.dll
windows7-x64
3ssleay32.dll
windows10-2004-x64
3Analysis
-
max time kernel
10s -
max time network
9s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 12:11
Behavioral task
behavioral1
Sample
Paypal cracker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Paypal cracker.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
libeay32.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
libeay32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
libssl32.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
libssl32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
msvcr71.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
msvcr71.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ssleay32.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ssleay32.dll
Resource
win10v2004-20241007-en
General
-
Target
Paypal cracker.exe
-
Size
6.6MB
-
MD5
5627dd16f023b8be51ed365d2fb6fee5
-
SHA1
fcccce747bf6c824233cfda366798fa0467d3daf
-
SHA256
2e2f6fe5b310d843656af43b60c0faddf6eb0f329efc8353272437db44b5f247
-
SHA512
e475f903d2afd4c1b985f368f77610270df54bb8207130f6339e59595777718cfadadbb732775523a11aa035cbbf3c6d81896a33d84b40f6c01f182a1654f637
-
SSDEEP
98304:xRlI+LjNr86mjj/UYviu26bbyKS2myX0rPpIh1KcV:xRlVmj72wblTmyEpG17V
Malware Config
Extracted
quasar
2.1.0.0
windows security
quasarrat220-24487.portmap.io:24487
VNM_MUTEX_mOPqShedZxvAqgLrWL
-
encryption_key
7mvA2TfKjvMIY0zZeMKF
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 4 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x0008000000016c53-27.dat disable_win_def behavioral1/files/0x0005000000019399-43.dat disable_win_def behavioral1/memory/2784-45-0x0000000000030000-0x00000000000BC000-memory.dmp disable_win_def behavioral1/memory/2408-58-0x0000000001160000-0x00000000011BC000-memory.dmp disable_win_def -
Quasar family
-
Quasar payload 4 IoCs
resource yara_rule behavioral1/files/0x0008000000016c53-27.dat family_quasar behavioral1/files/0x0005000000019399-43.dat family_quasar behavioral1/memory/2784-45-0x0000000000030000-0x00000000000BC000-memory.dmp family_quasar behavioral1/memory/2408-58-0x0000000001160000-0x00000000011BC000-memory.dmp family_quasar -
Venomrat family
-
Executes dropped EXE 7 IoCs
pid Process 1868 systemsvc.exe 2408 systemkvc.exe 2752 Checker.exe 2684 PAYPAL.EXE 2784 WINDOWS SECURITY.EXE 2724 6D9F65642DE.exe 1048 mdXDB80.exe -
Loads dropped DLL 13 IoCs
pid Process 2128 Paypal cracker.exe 2128 Paypal cracker.exe 2752 Checker.exe 2752 Checker.exe 2408 systemkvc.exe 2408 systemkvc.exe 2724 6D9F65642DE.exe 2724 6D9F65642DE.exe 1524 WerFault.exe 1524 WerFault.exe 1524 WerFault.exe 1524 WerFault.exe 1524 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\6FC310B030643235114199\\6FC310B030643235114199.exe" systemsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\4Y3Y0C3AWA2J7V0BECAXEIWGMU = "C:\\Services\\6D9F65642DE.exe" mdXDB80.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1524 2784 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Checker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PAYPAL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOWS SECURITY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6D9F65642DE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemkvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdXDB80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1568 PING.EXE -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PhishingFilter mdXDB80.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" mdXDB80.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" mdXDB80.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery mdXDB80.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" mdXDB80.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1568 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2276 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2408 systemkvc.exe 1868 systemsvc.exe 2408 systemkvc.exe 2724 6D9F65642DE.exe 1048 mdXDB80.exe 1048 mdXDB80.exe 1048 mdXDB80.exe 1048 mdXDB80.exe 1048 mdXDB80.exe 1048 mdXDB80.exe 1048 mdXDB80.exe 1048 mdXDB80.exe 1048 mdXDB80.exe 1048 mdXDB80.exe 1048 mdXDB80.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1868 systemsvc.exe Token: SeSecurityPrivilege 1868 systemsvc.exe Token: SeTakeOwnershipPrivilege 1868 systemsvc.exe Token: SeLoadDriverPrivilege 1868 systemsvc.exe Token: SeSystemProfilePrivilege 1868 systemsvc.exe Token: SeSystemtimePrivilege 1868 systemsvc.exe Token: SeProfSingleProcessPrivilege 1868 systemsvc.exe Token: SeIncBasePriorityPrivilege 1868 systemsvc.exe Token: SeCreatePagefilePrivilege 1868 systemsvc.exe Token: SeBackupPrivilege 1868 systemsvc.exe Token: SeRestorePrivilege 1868 systemsvc.exe Token: SeShutdownPrivilege 1868 systemsvc.exe Token: SeDebugPrivilege 1868 systemsvc.exe Token: SeSystemEnvironmentPrivilege 1868 systemsvc.exe Token: SeRemoteShutdownPrivilege 1868 systemsvc.exe Token: SeUndockPrivilege 1868 systemsvc.exe Token: SeManageVolumePrivilege 1868 systemsvc.exe Token: 33 1868 systemsvc.exe Token: 34 1868 systemsvc.exe Token: 35 1868 systemsvc.exe Token: SeDebugPrivilege 2408 systemkvc.exe Token: SeDebugPrivilege 2408 systemkvc.exe Token: SeDebugPrivilege 2408 systemkvc.exe Token: SeDebugPrivilege 2408 systemkvc.exe Token: SeDebugPrivilege 2724 6D9F65642DE.exe Token: SeDebugPrivilege 2724 6D9F65642DE.exe Token: SeDebugPrivilege 1048 mdXDB80.exe Token: SeDebugPrivilege 1048 mdXDB80.exe Token: SeDebugPrivilege 2784 WINDOWS SECURITY.EXE Token: SeDebugPrivilege 1048 mdXDB80.exe Token: SeDebugPrivilege 2784 WINDOWS SECURITY.EXE Token: SeDebugPrivilege 1048 mdXDB80.exe Token: SeDebugPrivilege 1048 mdXDB80.exe Token: SeDebugPrivilege 1048 mdXDB80.exe Token: SeDebugPrivilege 1048 mdXDB80.exe Token: SeDebugPrivilege 1048 mdXDB80.exe Token: SeDebugPrivilege 1048 mdXDB80.exe Token: SeDebugPrivilege 1048 mdXDB80.exe Token: SeDebugPrivilege 1048 mdXDB80.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2684 PAYPAL.EXE 2784 WINDOWS SECURITY.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1868 2128 Paypal cracker.exe 31 PID 2128 wrote to memory of 1868 2128 Paypal cracker.exe 31 PID 2128 wrote to memory of 1868 2128 Paypal cracker.exe 31 PID 2128 wrote to memory of 2408 2128 Paypal cracker.exe 32 PID 2128 wrote to memory of 2408 2128 Paypal cracker.exe 32 PID 2128 wrote to memory of 2408 2128 Paypal cracker.exe 32 PID 2128 wrote to memory of 2408 2128 Paypal cracker.exe 32 PID 2128 wrote to memory of 2752 2128 Paypal cracker.exe 33 PID 2128 wrote to memory of 2752 2128 Paypal cracker.exe 33 PID 2128 wrote to memory of 2752 2128 Paypal cracker.exe 33 PID 2128 wrote to memory of 2752 2128 Paypal cracker.exe 33 PID 2752 wrote to memory of 2684 2752 Checker.exe 34 PID 2752 wrote to memory of 2684 2752 Checker.exe 34 PID 2752 wrote to memory of 2684 2752 Checker.exe 34 PID 2752 wrote to memory of 2684 2752 Checker.exe 34 PID 2752 wrote to memory of 2784 2752 Checker.exe 35 PID 2752 wrote to memory of 2784 2752 Checker.exe 35 PID 2752 wrote to memory of 2784 2752 Checker.exe 35 PID 2752 wrote to memory of 2784 2752 Checker.exe 35 PID 2408 wrote to memory of 2724 2408 systemkvc.exe 36 PID 2408 wrote to memory of 2724 2408 systemkvc.exe 36 PID 2408 wrote to memory of 2724 2408 systemkvc.exe 36 PID 2408 wrote to memory of 2724 2408 systemkvc.exe 36 PID 2724 wrote to memory of 1048 2724 6D9F65642DE.exe 37 PID 2724 wrote to memory of 1048 2724 6D9F65642DE.exe 37 PID 2724 wrote to memory of 1048 2724 6D9F65642DE.exe 37 PID 2724 wrote to memory of 1048 2724 6D9F65642DE.exe 37 PID 2724 wrote to memory of 1048 2724 6D9F65642DE.exe 37 PID 2724 wrote to memory of 1048 2724 6D9F65642DE.exe 37 PID 1048 wrote to memory of 2408 1048 mdXDB80.exe 32 PID 1048 wrote to memory of 2408 1048 mdXDB80.exe 32 PID 1048 wrote to memory of 2408 1048 mdXDB80.exe 32 PID 1048 wrote to memory of 2408 1048 mdXDB80.exe 32 PID 1048 wrote to memory of 2684 1048 mdXDB80.exe 34 PID 1048 wrote to memory of 2684 1048 mdXDB80.exe 34 PID 1048 wrote to memory of 2684 1048 mdXDB80.exe 34 PID 1048 wrote to memory of 2684 1048 mdXDB80.exe 34 PID 1048 wrote to memory of 2784 1048 mdXDB80.exe 35 PID 1048 wrote to memory of 2784 1048 mdXDB80.exe 35 PID 1048 wrote to memory of 2784 1048 mdXDB80.exe 35 PID 1048 wrote to memory of 2784 1048 mdXDB80.exe 35 PID 2784 wrote to memory of 2276 2784 WINDOWS SECURITY.EXE 39 PID 2784 wrote to memory of 2276 2784 WINDOWS SECURITY.EXE 39 PID 2784 wrote to memory of 2276 2784 WINDOWS SECURITY.EXE 39 PID 2784 wrote to memory of 2276 2784 WINDOWS SECURITY.EXE 39 PID 1048 wrote to memory of 2276 1048 mdXDB80.exe 39 PID 1048 wrote to memory of 2276 1048 mdXDB80.exe 39 PID 1048 wrote to memory of 2276 1048 mdXDB80.exe 39 PID 1048 wrote to memory of 2276 1048 mdXDB80.exe 39 PID 2784 wrote to memory of 2992 2784 WINDOWS SECURITY.EXE 42 PID 2784 wrote to memory of 2992 2784 WINDOWS SECURITY.EXE 42 PID 2784 wrote to memory of 2992 2784 WINDOWS SECURITY.EXE 42 PID 2784 wrote to memory of 2992 2784 WINDOWS SECURITY.EXE 42 PID 2784 wrote to memory of 1524 2784 WINDOWS SECURITY.EXE 44 PID 2784 wrote to memory of 1524 2784 WINDOWS SECURITY.EXE 44 PID 2784 wrote to memory of 1524 2784 WINDOWS SECURITY.EXE 44 PID 2784 wrote to memory of 1524 2784 WINDOWS SECURITY.EXE 44 PID 2992 wrote to memory of 1640 2992 cmd.exe 45 PID 2992 wrote to memory of 1640 2992 cmd.exe 45 PID 2992 wrote to memory of 1640 2992 cmd.exe 45 PID 2992 wrote to memory of 1640 2992 cmd.exe 45 PID 2992 wrote to memory of 1568 2992 cmd.exe 46 PID 2992 wrote to memory of 1568 2992 cmd.exe 46 PID 2992 wrote to memory of 1568 2992 cmd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\Paypal cracker.exe"C:\Users\Admin\AppData\Local\Temp\Paypal cracker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Roaming\systemsvc.exe"C:\Users\Admin\AppData\Roaming\systemsvc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Users\Admin\AppData\Roaming\systemkvc.exe"C:\Users\Admin\AppData\Roaming\systemkvc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Services\6D9F65642DE.exe"C:\Services\6D9F65642DE.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\mdXDB80.exe"C:\Users\Admin\AppData\Local\Temp\mdXDB80.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Checker.exe"Checker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\PAYPAL.EXE"C:\Users\Admin\AppData\Local\Temp\PAYPAL.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS SECURITY.EXE"C:\Users\Admin\AppData\Local\Temp\WINDOWS SECURITY.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\WINDOWS SECURITY.EXE" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2276
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\fsiA4tgT9KZZ.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵
- System Location Discovery: System Language Discovery
PID:1640
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 14444⤵
- Loads dropped DLL
- Program crash
PID:1524
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD56a172fdb857f0ac1921efc443e407e7d
SHA19401bd19abe0750b866625107f146c1cf55c75b8
SHA256ab3adcd792f9526fc8634b1de30773d74becadaf056c8d3b1aeee1641f4d640b
SHA512195a632b76a2a19227cbd1364b810148764c6e5b94971d3e34f93e83d38d410d122db52671a9ebca4087e0216361c6e54db7f959a83832cb5ca2d769cec04ef2
-
Filesize
5.9MB
MD53425a9f00842bf28a0bafc5c1571b881
SHA13009eca32bcf159981d37a8620836b1d215aa33e
SHA2567328321fccd71cfda94a18656158ce54b0e3a0831d48f46f559b442a33a1790a
SHA512868b816f376a3bc38d24850808eb5410e4037acedd0849ad73868065525444a4cca54e3484d5ac0b14523217f3d6da24fc6132942632653439f0ea5310084bc7
-
Filesize
534KB
MD59e14775490cee79c73cb45c2f24f7a73
SHA1ddd6c7485a5e64a66a0a7598777abdafa7a63950
SHA256d53df5b6b080ba24773ca16c7a8b70eeb783ead278712e0c5b44abc84805e60e
SHA5121c0aec61a64400bcf18f6f0e5a950c68b7a25492b07290e3793a759f616c1b361ed6472d260d0f379b691567216a1f9e53af53b2dc89711df618a4463c8d0317
-
Filesize
213B
MD513c54779f2b468bd213141c0184ef42d
SHA1a94965739794cf660e389bf4ed06966d771cb595
SHA2561af09e8b7c2dab7f88bb91711e558c2e39ee0ced445be865cbc7bee7db45c6d4
SHA5124ddb7dfba69a3a7c789dbfb4ab8f34b244fd2ce5f007799101b5b1aa40848e6cd5037e13859be3674197ce8c0bafdec265e24aa18ecefa61e4b14b81492827a5
-
Filesize
355KB
MD533ed3913ea48a41363644e37261fddc2
SHA1f52b405849a5bcffa792ee44643c7d6c9db9044f
SHA2563859cde03ca6389bb5973e274ab9da5b51b9593a319e1b16330225b2aea8bd63
SHA5121b4c87215b7da10166ddfc9a9f214a8fc4292905517f4632fea937fd5aff83f8cec3c99cf15dac0d6d34f0a180b592e2f3fc8346e6aa52bcf064c396b547e053
-
Filesize
5.3MB
MD5341b34b571af06277c2f3b4156bd86df
SHA1ba120240400cc6dcf0e92e732d4f460f3763102b
SHA2569a579053ee79c9ee45e29ac1887aba8cb87936c01026b5f3d830456547adc441
SHA5122cbb482d2e087e18b7461c9a317aa249adf12821de17d6dd59f3c17e01394047df31e875a551d23d32a64a46f8db46003c2feced7e967dd159bc65d3bff76e66
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
299KB
MD55d5392e5c3edac5337a75692f75b4c8e
SHA180b9f25c4162e69fc24a5a056e2c3fc029b68f02
SHA256e7c8df1d1cf7e5abf9c6c025ee99acad9ce907d5f584bb38c5eeb32706251109
SHA51215141c710c41ff75b23b8b406d91b105dcfe5bb8819ae067baf1d2383a599e081ce14c978bdae151129352ccb096cd587e4ab1bf4f0995c284907e606ed66227