Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
11-04-2022 19:40
Static task
static1
Behavioral task
behavioral1
Sample
b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe
Resource
win10v2004-20220331-en
General
-
Target
b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe
-
Size
107.9MB
-
MD5
e4c7e50f00bb0df010b2067178c7af0d
-
SHA1
eaf452720b75bec51f7e15b833192c39c318f09e
-
SHA256
b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c
-
SHA512
823c6eef9ec3dbf8cec1cdcdbbcd9180ed70cf41a673c9253d4eb1d2a4b489567345d4e9981003bcfab6b38e3c5f9fee538d3610d6c515557cf241e9885be5b8
Malware Config
Signatures
-
Babadeda Crypter 2 IoCs
resource yara_rule behavioral1/files/0x000500000001c85f-91.dat family_babadeda behavioral1/memory/1568-92-0x0000000005A60000-0x000000000AB60000-memory.dmp family_babadeda -
Executes dropped EXE 5 IoCs
pid Process 1028 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 948 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 1008 tracegen.exe 892 AdobeIPCBroker.exe 1568 AdobeIPCBroker.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ipcmanager.lnk AdobeIPCBroker.exe -
Loads dropped DLL 12 IoCs
pid Process 1332 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 952 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 948 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 948 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 892 AdobeIPCBroker.exe 892 AdobeIPCBroker.exe 1568 AdobeIPCBroker.exe 1568 AdobeIPCBroker.exe 892 AdobeIPCBroker.exe 1568 AdobeIPCBroker.exe 1568 AdobeIPCBroker.exe 1568 AdobeIPCBroker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3422572840-2899912402-917774768-1000\Software\Microsoft\Windows\CurrentVersion\Run\IPC Broker = "C:\\Users\\Admin\\AppData\\Roaming\\FX Draw Tools\\AdobeIPCBroker.exe" AdobeIPCBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Detects BABADEDA Crypter 2 IoCs
Detects BABADEDA Crypter.
resource yara_rule behavioral1/files/0x000500000001c85f-91.dat BABADEDA_Crypter behavioral1/memory/1568-92-0x0000000005A60000-0x000000000AB60000-memory.dmp BABADEDA_Crypter -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 948 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 948 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 892 AdobeIPCBroker.exe Token: SeDebugPrivilege 1568 AdobeIPCBroker.exe Token: SeDebugPrivilege 1568 AdobeIPCBroker.exe Token: SeDebugPrivilege 1568 AdobeIPCBroker.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 948 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1568 AdobeIPCBroker.exe 1568 AdobeIPCBroker.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1332 wrote to memory of 1028 1332 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 28 PID 1332 wrote to memory of 1028 1332 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 28 PID 1332 wrote to memory of 1028 1332 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 28 PID 1332 wrote to memory of 1028 1332 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 28 PID 1332 wrote to memory of 1028 1332 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 28 PID 1332 wrote to memory of 1028 1332 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 28 PID 1332 wrote to memory of 1028 1332 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 28 PID 1028 wrote to memory of 952 1028 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 29 PID 1028 wrote to memory of 952 1028 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 29 PID 1028 wrote to memory of 952 1028 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 29 PID 1028 wrote to memory of 952 1028 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 29 PID 1028 wrote to memory of 952 1028 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 29 PID 1028 wrote to memory of 952 1028 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 29 PID 1028 wrote to memory of 952 1028 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 29 PID 952 wrote to memory of 948 952 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 30 PID 952 wrote to memory of 948 952 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 30 PID 952 wrote to memory of 948 952 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 30 PID 952 wrote to memory of 948 952 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 30 PID 952 wrote to memory of 948 952 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 30 PID 952 wrote to memory of 948 952 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 30 PID 952 wrote to memory of 948 952 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe 30 PID 948 wrote to memory of 1008 948 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 31 PID 948 wrote to memory of 1008 948 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 31 PID 948 wrote to memory of 1008 948 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 31 PID 948 wrote to memory of 1008 948 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 31 PID 948 wrote to memory of 892 948 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 33 PID 948 wrote to memory of 892 948 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 33 PID 948 wrote to memory of 892 948 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 33 PID 948 wrote to memory of 892 948 b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe"C:\Users\Admin\AppData\Local\Temp\b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\is-CADEB.tmp\b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp"C:\Users\Admin\AppData\Local\Temp\is-CADEB.tmp\b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp" /SL5="$80124,112345715,875520,C:\Users\Admin\AppData\Local\Temp\b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe"C:\Users\Admin\AppData\Local\Temp\b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe" /VERYSILENT3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\is-8ML2J.tmp\b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp"C:\Users\Admin\AppData\Local\Temp\is-8ML2J.tmp\b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp" /SL5="$90124,112345715,875520,C:\Users\Admin\AppData\Local\Temp\b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Roaming\FX Draw Tools\tracegen.exe"C:\Users\Admin\AppData\Roaming\FX Draw Tools\tracegen.exe"5⤵
- Executes dropped EXE
PID:1008
-
-
C:\Users\Admin\AppData\Roaming\FX Draw Tools\AdobeIPCBroker.exe"C:\Users\Admin\AppData\Roaming\FX Draw Tools\AdobeIPCBroker.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:892 -
C:\Users\Admin\AppData\Roaming\FX Draw Tools\AdobeIPCBroker.exe"C:\Users\Admin\AppData\Roaming\FX Draw Tools\AdobeIPCBroker.exe" "-relaunchedForIntegrityLevel -launchedbyvulcan-892 C:\Users\Admin\AppData\Roaming\FX Draw Tools\AdobeIPCBroker.exe"6⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1568
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-8ML2J.tmp\b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp
Filesize3.1MB
MD531ca91499cc1010742c93ead43cfcfb0
SHA17c15d275586b5c676522e71ff2050fc034e367cc
SHA2560a261c1acd2ad1a40de2598e48677a3d2487e791fa15694a39749f1a6cbde4e2
SHA512bc13af635d813dd92e1a7594c54b04ca7abcceb63a50f7c21d5ce865da5a21ded34716bc456d775bfe5c25ecf4a5de369ab253091316ce4db0b535b47b6634fe
-
C:\Users\Admin\AppData\Local\Temp\is-CADEB.tmp\b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp
Filesize3.1MB
MD531ca91499cc1010742c93ead43cfcfb0
SHA17c15d275586b5c676522e71ff2050fc034e367cc
SHA2560a261c1acd2ad1a40de2598e48677a3d2487e791fa15694a39749f1a6cbde4e2
SHA512bc13af635d813dd92e1a7594c54b04ca7abcceb63a50f7c21d5ce865da5a21ded34716bc456d775bfe5c25ecf4a5de369ab253091316ce4db0b535b47b6634fe
-
Filesize
4.6MB
MD525d5826c1136dde91cb8ed3b9319c50d
SHA1627b989677c7d3d7431ca2d1c591fee095197a1e
SHA256098467cdf594b08bd6643592f24745f6f37132ab794da2d0263919d5d131bc81
SHA51273bf5a1b8371bd70df4fb40ed1c08e2ad0db72722634de0167c8bcca7423b0f7fec9fa20bea66521aa051d842442432c623d440873d448af07b85914dbdf532e
-
Filesize
4.6MB
MD525d5826c1136dde91cb8ed3b9319c50d
SHA1627b989677c7d3d7431ca2d1c591fee095197a1e
SHA256098467cdf594b08bd6643592f24745f6f37132ab794da2d0263919d5d131bc81
SHA51273bf5a1b8371bd70df4fb40ed1c08e2ad0db72722634de0167c8bcca7423b0f7fec9fa20bea66521aa051d842442432c623d440873d448af07b85914dbdf532e
-
Filesize
4.6MB
MD525d5826c1136dde91cb8ed3b9319c50d
SHA1627b989677c7d3d7431ca2d1c591fee095197a1e
SHA256098467cdf594b08bd6643592f24745f6f37132ab794da2d0263919d5d131bc81
SHA51273bf5a1b8371bd70df4fb40ed1c08e2ad0db72722634de0167c8bcca7423b0f7fec9fa20bea66521aa051d842442432c623d440873d448af07b85914dbdf532e
-
Filesize
831KB
MD5b138e3a09a23bb6bfee9c58a11efab07
SHA1fd268b9f98a811d66cbe595701abd4f3caa0f6d8
SHA256560a2eb2b1a31801bc6d20e1788736d41ebe2e859f6db364c8b1bee8f620eaf2
SHA51252c179d656aac9c0ccff05b02a30a57d4ebc1a72bf844cf277c0a3272d57b0f434e909bf41b29e2f0e6968ceed2a51130d431cfd474d53ca89170e86b76b59f2
-
Filesize
196KB
MD559acec969ffeafba1bd0a8de3f933833
SHA1ba2d6f092cfb9a0c53c4a2c85e87d23cf7accee6
SHA2567f11cbdb58400bf35f456735d62ab7e84361142a22076d595fec0a27a0c09920
SHA512f11865b3d0e76277a3c86b5be7ffd34d43ef68a7a1855b4af6dc7e986980d8973c49dea7676b83b359e6ccea15a35628467dc675b793b6d8bc9dc75645ff7400
-
Filesize
37.7MB
MD506dec030f09edb0a35645277215fff4e
SHA19c62763311cb8b33af23ea6210cde24d79d5c4e2
SHA2563a74626c27d5aa43bba0b3825074930d983da942aeef6574389ed0e214d37239
SHA512a92f0aa36fe6d3f5b7bc657ce9ad0cc27a717de8bbd07cdc6b99dc62de6b49ff666fde139ad58f9218580847c2e3a1dc7453cbf72d7fed2a6b15cf65e5373cc9
-
Filesize
1KB
MD5dcd02122ff75c24cee25500ad3a3d812
SHA176e733331554e9aaff6ccf0df22931db9ca852a4
SHA256059280e2b72f31d15fe6b83b9362be359ebd2f16a5de4763a21d0885183854ba
SHA512e7fb7605a3d46b302a977b21e14743a5d367ffd50a9ab339108a356894b5d75c7c2693609c9aed84cb8aeaddeb041dc018428ce20f7bc9bbc984b431db58ff21
-
Filesize
33.8MB
MD59a5a6bec397d50064962c7b08f295aa9
SHA14ec4d6857edadec3d810f8496690ea81f080c0c3
SHA2563ac5593edf44a93dda10a5bea109c0a09a57aa83065c7bb6a3451c10ce154dfe
SHA512a1407e4115c9dac754d559f94cd2ed66203827690437bdf2b551f24b21908ff6064127eed24e08e053a3fbbd9d5cb60794100778ab67a1cfe97e059f206f94bb
-
Filesize
2.4MB
MD579c513693d39b2121019e572d4ce4aaa
SHA1b61b04c71df5a8217510abdd7e76a8218056cb0f
SHA256765f3d4083faead4c36e9b7f6c631d78ba325643502bd7d1ccd3f811e5f47860
SHA5129572040d3fa29a31dbd773ab32c1607c8d94e4f3bef24c6104a003aaac936f32ec05c974966a82f49d31dc2766aa2e4ed30c03ac356567fc023031d13dd5b3bd
-
Filesize
1008KB
MD5f0ce1fc1ef4cdae853428faf62c7e0bb
SHA1cc68f5f4922095219de0ed10c39e225ddd1bd99c
SHA2561381c53093d2bc83d20e466a0e07f7d6963347862283d64582aa9960c187ad75
SHA512d8301bc03acd774d8216cbf95e6fa59d220c5d7a6182deafcc8d9af78fa53fb89964128b81f2b6247ec48a44c538cd604159415b69754368e3dcf62b98776837
-
\Users\Admin\AppData\Local\Temp\is-8ML2J.tmp\b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp
Filesize3.1MB
MD531ca91499cc1010742c93ead43cfcfb0
SHA17c15d275586b5c676522e71ff2050fc034e367cc
SHA2560a261c1acd2ad1a40de2598e48677a3d2487e791fa15694a39749f1a6cbde4e2
SHA512bc13af635d813dd92e1a7594c54b04ca7abcceb63a50f7c21d5ce865da5a21ded34716bc456d775bfe5c25ecf4a5de369ab253091316ce4db0b535b47b6634fe
-
\Users\Admin\AppData\Local\Temp\is-CADEB.tmp\b0966b0b2a38cb845932231c04b16d79f2c434a0171ebe151585f154a418e02c.tmp
Filesize3.1MB
MD531ca91499cc1010742c93ead43cfcfb0
SHA17c15d275586b5c676522e71ff2050fc034e367cc
SHA2560a261c1acd2ad1a40de2598e48677a3d2487e791fa15694a39749f1a6cbde4e2
SHA512bc13af635d813dd92e1a7594c54b04ca7abcceb63a50f7c21d5ce865da5a21ded34716bc456d775bfe5c25ecf4a5de369ab253091316ce4db0b535b47b6634fe
-
Filesize
4.6MB
MD525d5826c1136dde91cb8ed3b9319c50d
SHA1627b989677c7d3d7431ca2d1c591fee095197a1e
SHA256098467cdf594b08bd6643592f24745f6f37132ab794da2d0263919d5d131bc81
SHA51273bf5a1b8371bd70df4fb40ed1c08e2ad0db72722634de0167c8bcca7423b0f7fec9fa20bea66521aa051d842442432c623d440873d448af07b85914dbdf532e
-
Filesize
4.6MB
MD525d5826c1136dde91cb8ed3b9319c50d
SHA1627b989677c7d3d7431ca2d1c591fee095197a1e
SHA256098467cdf594b08bd6643592f24745f6f37132ab794da2d0263919d5d131bc81
SHA51273bf5a1b8371bd70df4fb40ed1c08e2ad0db72722634de0167c8bcca7423b0f7fec9fa20bea66521aa051d842442432c623d440873d448af07b85914dbdf532e
-
Filesize
831KB
MD5b138e3a09a23bb6bfee9c58a11efab07
SHA1fd268b9f98a811d66cbe595701abd4f3caa0f6d8
SHA256560a2eb2b1a31801bc6d20e1788736d41ebe2e859f6db364c8b1bee8f620eaf2
SHA51252c179d656aac9c0ccff05b02a30a57d4ebc1a72bf844cf277c0a3272d57b0f434e909bf41b29e2f0e6968ceed2a51130d431cfd474d53ca89170e86b76b59f2
-
Filesize
831KB
MD5b138e3a09a23bb6bfee9c58a11efab07
SHA1fd268b9f98a811d66cbe595701abd4f3caa0f6d8
SHA256560a2eb2b1a31801bc6d20e1788736d41ebe2e859f6db364c8b1bee8f620eaf2
SHA51252c179d656aac9c0ccff05b02a30a57d4ebc1a72bf844cf277c0a3272d57b0f434e909bf41b29e2f0e6968ceed2a51130d431cfd474d53ca89170e86b76b59f2
-
Filesize
196KB
MD559acec969ffeafba1bd0a8de3f933833
SHA1ba2d6f092cfb9a0c53c4a2c85e87d23cf7accee6
SHA2567f11cbdb58400bf35f456735d62ab7e84361142a22076d595fec0a27a0c09920
SHA512f11865b3d0e76277a3c86b5be7ffd34d43ef68a7a1855b4af6dc7e986980d8973c49dea7676b83b359e6ccea15a35628467dc675b793b6d8bc9dc75645ff7400
-
Filesize
196KB
MD559acec969ffeafba1bd0a8de3f933833
SHA1ba2d6f092cfb9a0c53c4a2c85e87d23cf7accee6
SHA2567f11cbdb58400bf35f456735d62ab7e84361142a22076d595fec0a27a0c09920
SHA512f11865b3d0e76277a3c86b5be7ffd34d43ef68a7a1855b4af6dc7e986980d8973c49dea7676b83b359e6ccea15a35628467dc675b793b6d8bc9dc75645ff7400
-
Filesize
37.7MB
MD506dec030f09edb0a35645277215fff4e
SHA19c62763311cb8b33af23ea6210cde24d79d5c4e2
SHA2563a74626c27d5aa43bba0b3825074930d983da942aeef6574389ed0e214d37239
SHA512a92f0aa36fe6d3f5b7bc657ce9ad0cc27a717de8bbd07cdc6b99dc62de6b49ff666fde139ad58f9218580847c2e3a1dc7453cbf72d7fed2a6b15cf65e5373cc9
-
Filesize
37.7MB
MD506dec030f09edb0a35645277215fff4e
SHA19c62763311cb8b33af23ea6210cde24d79d5c4e2
SHA2563a74626c27d5aa43bba0b3825074930d983da942aeef6574389ed0e214d37239
SHA512a92f0aa36fe6d3f5b7bc657ce9ad0cc27a717de8bbd07cdc6b99dc62de6b49ff666fde139ad58f9218580847c2e3a1dc7453cbf72d7fed2a6b15cf65e5373cc9
-
Filesize
33.8MB
MD59a5a6bec397d50064962c7b08f295aa9
SHA14ec4d6857edadec3d810f8496690ea81f080c0c3
SHA2563ac5593edf44a93dda10a5bea109c0a09a57aa83065c7bb6a3451c10ce154dfe
SHA512a1407e4115c9dac754d559f94cd2ed66203827690437bdf2b551f24b21908ff6064127eed24e08e053a3fbbd9d5cb60794100778ab67a1cfe97e059f206f94bb
-
Filesize
1008KB
MD5f0ce1fc1ef4cdae853428faf62c7e0bb
SHA1cc68f5f4922095219de0ed10c39e225ddd1bd99c
SHA2561381c53093d2bc83d20e466a0e07f7d6963347862283d64582aa9960c187ad75
SHA512d8301bc03acd774d8216cbf95e6fa59d220c5d7a6182deafcc8d9af78fa53fb89964128b81f2b6247ec48a44c538cd604159415b69754368e3dcf62b98776837