Analysis
-
max time kernel
188s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-05-2022 19:20
Static task
static1
Behavioral task
behavioral1
Sample
Output.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Output.js
Resource
win10v2004-20220414-en
General
-
Target
Output.js
-
Size
3.0MB
-
MD5
80765412e06741deb5560dd14a0356cf
-
SHA1
2a2a113f4d95a7f12d9e975fc4a91e3ee1797da0
-
SHA256
7299b2ba8e372197e9fdf8e4cb2515723a7def421d39e275367603e1cae9e823
-
SHA512
f41dfb4d1ad1803b574b8c521c3ca3ea2517132d5fb98b8057599d3d9e9ed188f8591ff1802f89eab108bf14395355c97367394f94c0616554f8b29e5d73f656
Malware Config
Extracted
nanocore
1.2.2.0
95.140.125.76:4580
bd5a019d-3359-4837-8cfa-e0eb7e162b4f
-
activate_away_mode
true
-
backup_connection_host
95.140.125.76
- backup_dns_server
-
buffer_size
65535
-
build_time
2018-08-30T12:26:08.775653636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4580
-
default_group
TOBE_G
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
bd5a019d-3359-4837-8cfa-e0eb7e162b4f
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
95.140.125.76
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 9 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\AUDIODG.EXE family_agenttesla \Users\Admin\AppData\Local\Temp\AUDIODG.EXE family_agenttesla C:\Users\Admin\AppData\Local\Temp\AUDIODG.EXE family_agenttesla C:\Users\Admin\AppData\Local\Temp\AUDIODG.EXE family_agenttesla behavioral1/memory/112-98-0x0000000000400000-0x0000000000624000-memory.dmp family_agenttesla C:\Users\Admin\AppData\Local\Temp\AUDIODG.EXE family_agenttesla \Users\Admin\AppData\Local\Temp\AUDIODG.EXE family_agenttesla \Users\Admin\AppData\Local\Temp\AUDIODG.EXE family_agenttesla behavioral1/memory/112-139-0x0000000000400000-0x0000000000624000-memory.dmp family_agenttesla -
Executes dropped EXE 7 IoCs
Processes:
OegfrTm.exefilename.exefilename.exeAUDIODG.EXETOBY_G.EXETOBY_G.EXEAUDIODG.EXEpid process 1120 OegfrTm.exe 580 filename.exe 112 filename.exe 836 AUDIODG.EXE 696 TOBY_G.EXE 1328 TOBY_G.EXE 1944 AUDIODG.EXE -
Processes:
resource yara_rule behavioral1/memory/112-82-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral1/memory/112-96-0x0000000077160000-0x00000000772E0000-memory.dmp upx behavioral1/memory/112-98-0x0000000000400000-0x0000000000624000-memory.dmp upx behavioral1/memory/112-139-0x0000000000400000-0x0000000000624000-memory.dmp upx -
Loads dropped DLL 11 IoCs
Processes:
OegfrTm.exefilename.exefilename.exepid process 1120 OegfrTm.exe 1120 OegfrTm.exe 580 filename.exe 112 filename.exe 112 filename.exe 112 filename.exe 112 filename.exe 112 filename.exe 112 filename.exe 112 filename.exe 112 filename.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
WScript.exeTOBY_G.EXEAUDIODG.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Registry Key Name = "C:\\Users\\Admin\\AppData\\Local\\Temp\\subfolder\\filename.vbs -rr" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WPA Subsystem = "C:\\Program Files (x86)\\WPA Subsystem\\wpass.exe" TOBY_G.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\\\.exe" AUDIODG.EXE -
Processes:
TOBY_G.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TOBY_G.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
filename.exedescription pid process target process PID 580 set thread context of 112 580 filename.exe filename.exe -
Drops file in Program Files directory 2 IoCs
Processes:
TOBY_G.EXEdescription ioc process File created C:\Program Files (x86)\WPA Subsystem\wpass.exe TOBY_G.EXE File opened for modification C:\Program Files (x86)\WPA Subsystem\wpass.exe TOBY_G.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
TOBY_G.EXEAUDIODG.EXEpid process 696 TOBY_G.EXE 696 TOBY_G.EXE 696 TOBY_G.EXE 836 AUDIODG.EXE 836 AUDIODG.EXE -
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
filename.exeTOBY_G.EXEAUDIODG.EXEdescription pid process Token: SeIncreaseQuotaPrivilege 112 filename.exe Token: SeSecurityPrivilege 112 filename.exe Token: SeTakeOwnershipPrivilege 112 filename.exe Token: SeLoadDriverPrivilege 112 filename.exe Token: SeSystemProfilePrivilege 112 filename.exe Token: SeSystemtimePrivilege 112 filename.exe Token: SeProfSingleProcessPrivilege 112 filename.exe Token: SeIncBasePriorityPrivilege 112 filename.exe Token: SeCreatePagefilePrivilege 112 filename.exe Token: SeBackupPrivilege 112 filename.exe Token: SeRestorePrivilege 112 filename.exe Token: SeShutdownPrivilege 112 filename.exe Token: SeDebugPrivilege 112 filename.exe Token: SeSystemEnvironmentPrivilege 112 filename.exe Token: SeChangeNotifyPrivilege 112 filename.exe Token: SeRemoteShutdownPrivilege 112 filename.exe Token: SeUndockPrivilege 112 filename.exe Token: SeManageVolumePrivilege 112 filename.exe Token: SeImpersonatePrivilege 112 filename.exe Token: SeCreateGlobalPrivilege 112 filename.exe Token: 33 112 filename.exe Token: 34 112 filename.exe Token: 35 112 filename.exe Token: SeDebugPrivilege 696 TOBY_G.EXE Token: SeDebugPrivilege 836 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
OegfrTm.exefilename.exefilename.exepid process 1120 OegfrTm.exe 580 filename.exe 112 filename.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
filename.exepid process 112 filename.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
wscript.exeOegfrTm.exefilename.exefilename.exedescription pid process target process PID 972 wrote to memory of 1120 972 wscript.exe OegfrTm.exe PID 972 wrote to memory of 1120 972 wscript.exe OegfrTm.exe PID 972 wrote to memory of 1120 972 wscript.exe OegfrTm.exe PID 972 wrote to memory of 1120 972 wscript.exe OegfrTm.exe PID 1120 wrote to memory of 1648 1120 OegfrTm.exe WScript.exe PID 1120 wrote to memory of 1648 1120 OegfrTm.exe WScript.exe PID 1120 wrote to memory of 1648 1120 OegfrTm.exe WScript.exe PID 1120 wrote to memory of 1648 1120 OegfrTm.exe WScript.exe PID 1120 wrote to memory of 580 1120 OegfrTm.exe filename.exe PID 1120 wrote to memory of 580 1120 OegfrTm.exe filename.exe PID 1120 wrote to memory of 580 1120 OegfrTm.exe filename.exe PID 1120 wrote to memory of 580 1120 OegfrTm.exe filename.exe PID 580 wrote to memory of 112 580 filename.exe filename.exe PID 580 wrote to memory of 112 580 filename.exe filename.exe PID 580 wrote to memory of 112 580 filename.exe filename.exe PID 580 wrote to memory of 112 580 filename.exe filename.exe PID 112 wrote to memory of 836 112 filename.exe AUDIODG.EXE PID 112 wrote to memory of 836 112 filename.exe AUDIODG.EXE PID 112 wrote to memory of 836 112 filename.exe AUDIODG.EXE PID 112 wrote to memory of 836 112 filename.exe AUDIODG.EXE PID 112 wrote to memory of 696 112 filename.exe TOBY_G.EXE PID 112 wrote to memory of 696 112 filename.exe TOBY_G.EXE PID 112 wrote to memory of 696 112 filename.exe TOBY_G.EXE PID 112 wrote to memory of 696 112 filename.exe TOBY_G.EXE PID 112 wrote to memory of 1944 112 filename.exe AUDIODG.EXE PID 112 wrote to memory of 1944 112 filename.exe AUDIODG.EXE PID 112 wrote to memory of 1944 112 filename.exe AUDIODG.EXE PID 112 wrote to memory of 1944 112 filename.exe AUDIODG.EXE PID 112 wrote to memory of 1328 112 filename.exe TOBY_G.EXE PID 112 wrote to memory of 1328 112 filename.exe TOBY_G.EXE PID 112 wrote to memory of 1328 112 filename.exe TOBY_G.EXE PID 112 wrote to memory of 1328 112 filename.exe TOBY_G.EXE
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Output.js1⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\OegfrTm.exe"C:\Users\Admin\AppData\Local\Temp\OegfrTm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\subfolder\filename.vbs"3⤵
- Adds Run key to start application
PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\subfolder\filename.exe"C:\Users\Admin\AppData\Local\Temp\subfolder\filename.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Local\Temp\subfolder\filename.exeC:\Users\Admin\AppData\Local\Temp\subfolder\filename.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\AUDIODG.EXE"C:\Users\Admin\AppData\Local\Temp\AUDIODG.EXE"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\TOBY_G.EXE"C:\Users\Admin\AppData\Local\Temp\TOBY_G.EXE"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\AUDIODG.EXE"C:\Users\Admin\AppData\Local\Temp\AUDIODG.EXE"5⤵
- Executes dropped EXE
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\TOBY_G.EXE"C:\Users\Admin\AppData\Local\Temp\TOBY_G.EXE"5⤵
- Executes dropped EXE
PID:1328
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
354KB
MD5ffd86a4b0ce89322379f61c8b5b9608e
SHA1a68c4a0ecf6f3fc8f1b1c5761179b0bff4dcef07
SHA25681ae3119052a8e6e8283fa1a264beecd89e13a5f0486367f28b9a3e8fb99a6e1
SHA512f88d241b125f774cb5bdcf9a11469c2d8edfdf8648242b766f40229c8ef08aba899875bbd4b9d71671acecd5b717ae836a824e8268e5df5746fd45e5811759f9
-
Filesize
354KB
MD5ffd86a4b0ce89322379f61c8b5b9608e
SHA1a68c4a0ecf6f3fc8f1b1c5761179b0bff4dcef07
SHA25681ae3119052a8e6e8283fa1a264beecd89e13a5f0486367f28b9a3e8fb99a6e1
SHA512f88d241b125f774cb5bdcf9a11469c2d8edfdf8648242b766f40229c8ef08aba899875bbd4b9d71671acecd5b717ae836a824e8268e5df5746fd45e5811759f9
-
Filesize
354KB
MD5ffd86a4b0ce89322379f61c8b5b9608e
SHA1a68c4a0ecf6f3fc8f1b1c5761179b0bff4dcef07
SHA25681ae3119052a8e6e8283fa1a264beecd89e13a5f0486367f28b9a3e8fb99a6e1
SHA512f88d241b125f774cb5bdcf9a11469c2d8edfdf8648242b766f40229c8ef08aba899875bbd4b9d71671acecd5b717ae836a824e8268e5df5746fd45e5811759f9
-
Filesize
2.1MB
MD507a1e5acc43fe7ba03ef6b50d01e5c59
SHA1787b7e16dbf1ff2bcb1681114b5ac0049c5ce6a0
SHA256a79bdc9c32cccce861afa48e8d14c1f982f7add58e75f3ad28c7ef6ef05e9b23
SHA51287ad49a4e01264185fc3317c40813e10702d21d80025b011ff845d893cdb4530c971ee3ce0a01522cd88e00ff88e28ba7251d3eaa8ac37794291a3fbb4674640
-
Filesize
2.1MB
MD507a1e5acc43fe7ba03ef6b50d01e5c59
SHA1787b7e16dbf1ff2bcb1681114b5ac0049c5ce6a0
SHA256a79bdc9c32cccce861afa48e8d14c1f982f7add58e75f3ad28c7ef6ef05e9b23
SHA51287ad49a4e01264185fc3317c40813e10702d21d80025b011ff845d893cdb4530c971ee3ce0a01522cd88e00ff88e28ba7251d3eaa8ac37794291a3fbb4674640
-
Filesize
202KB
MD5ef2247cc05cb1645911c9e00686c45c0
SHA1fd34d3cdd355d7022ed381db0d77da67f972bbef
SHA25652deef2b5d455aa8001e7bc91fd8ff54024e2a707cbed1944507af2fe5dd4a86
SHA5128a39908ab5c650acdc4e40062e18673c773bea2a3ce18e2b95821e4c7034187fc5ac72c659683f4048eb0a947f1190de950a213980f899947a0deadb3c3fb595
-
Filesize
202KB
MD5ef2247cc05cb1645911c9e00686c45c0
SHA1fd34d3cdd355d7022ed381db0d77da67f972bbef
SHA25652deef2b5d455aa8001e7bc91fd8ff54024e2a707cbed1944507af2fe5dd4a86
SHA5128a39908ab5c650acdc4e40062e18673c773bea2a3ce18e2b95821e4c7034187fc5ac72c659683f4048eb0a947f1190de950a213980f899947a0deadb3c3fb595
-
Filesize
202KB
MD5ef2247cc05cb1645911c9e00686c45c0
SHA1fd34d3cdd355d7022ed381db0d77da67f972bbef
SHA25652deef2b5d455aa8001e7bc91fd8ff54024e2a707cbed1944507af2fe5dd4a86
SHA5128a39908ab5c650acdc4e40062e18673c773bea2a3ce18e2b95821e4c7034187fc5ac72c659683f4048eb0a947f1190de950a213980f899947a0deadb3c3fb595
-
Filesize
2.1MB
MD507a1e5acc43fe7ba03ef6b50d01e5c59
SHA1787b7e16dbf1ff2bcb1681114b5ac0049c5ce6a0
SHA256a79bdc9c32cccce861afa48e8d14c1f982f7add58e75f3ad28c7ef6ef05e9b23
SHA51287ad49a4e01264185fc3317c40813e10702d21d80025b011ff845d893cdb4530c971ee3ce0a01522cd88e00ff88e28ba7251d3eaa8ac37794291a3fbb4674640
-
Filesize
2.1MB
MD507a1e5acc43fe7ba03ef6b50d01e5c59
SHA1787b7e16dbf1ff2bcb1681114b5ac0049c5ce6a0
SHA256a79bdc9c32cccce861afa48e8d14c1f982f7add58e75f3ad28c7ef6ef05e9b23
SHA51287ad49a4e01264185fc3317c40813e10702d21d80025b011ff845d893cdb4530c971ee3ce0a01522cd88e00ff88e28ba7251d3eaa8ac37794291a3fbb4674640
-
Filesize
2.1MB
MD507a1e5acc43fe7ba03ef6b50d01e5c59
SHA1787b7e16dbf1ff2bcb1681114b5ac0049c5ce6a0
SHA256a79bdc9c32cccce861afa48e8d14c1f982f7add58e75f3ad28c7ef6ef05e9b23
SHA51287ad49a4e01264185fc3317c40813e10702d21d80025b011ff845d893cdb4530c971ee3ce0a01522cd88e00ff88e28ba7251d3eaa8ac37794291a3fbb4674640
-
Filesize
1024B
MD5a05951d8828004220b3a37cc8205c6a8
SHA1e6e915715d6a479a98b0cce4de4697f584bb9eac
SHA25607c678e10f73cce72742a62effebb56c58993b2276a95850b139743804f7fb87
SHA5120a5d46ae16a67b5322bf65e3ab861864a164783e6f9eb04603d8a5846e2462cab7190e1f6d9b95fc403f6288b05485e04805d02f03910dd15d0c081f1dd8e7c7
-
Filesize
354KB
MD5ffd86a4b0ce89322379f61c8b5b9608e
SHA1a68c4a0ecf6f3fc8f1b1c5761179b0bff4dcef07
SHA25681ae3119052a8e6e8283fa1a264beecd89e13a5f0486367f28b9a3e8fb99a6e1
SHA512f88d241b125f774cb5bdcf9a11469c2d8edfdf8648242b766f40229c8ef08aba899875bbd4b9d71671acecd5b717ae836a824e8268e5df5746fd45e5811759f9
-
Filesize
354KB
MD5ffd86a4b0ce89322379f61c8b5b9608e
SHA1a68c4a0ecf6f3fc8f1b1c5761179b0bff4dcef07
SHA25681ae3119052a8e6e8283fa1a264beecd89e13a5f0486367f28b9a3e8fb99a6e1
SHA512f88d241b125f774cb5bdcf9a11469c2d8edfdf8648242b766f40229c8ef08aba899875bbd4b9d71671acecd5b717ae836a824e8268e5df5746fd45e5811759f9
-
Filesize
354KB
MD5ffd86a4b0ce89322379f61c8b5b9608e
SHA1a68c4a0ecf6f3fc8f1b1c5761179b0bff4dcef07
SHA25681ae3119052a8e6e8283fa1a264beecd89e13a5f0486367f28b9a3e8fb99a6e1
SHA512f88d241b125f774cb5bdcf9a11469c2d8edfdf8648242b766f40229c8ef08aba899875bbd4b9d71671acecd5b717ae836a824e8268e5df5746fd45e5811759f9
-
Filesize
354KB
MD5ffd86a4b0ce89322379f61c8b5b9608e
SHA1a68c4a0ecf6f3fc8f1b1c5761179b0bff4dcef07
SHA25681ae3119052a8e6e8283fa1a264beecd89e13a5f0486367f28b9a3e8fb99a6e1
SHA512f88d241b125f774cb5bdcf9a11469c2d8edfdf8648242b766f40229c8ef08aba899875bbd4b9d71671acecd5b717ae836a824e8268e5df5746fd45e5811759f9
-
Filesize
202KB
MD5ef2247cc05cb1645911c9e00686c45c0
SHA1fd34d3cdd355d7022ed381db0d77da67f972bbef
SHA25652deef2b5d455aa8001e7bc91fd8ff54024e2a707cbed1944507af2fe5dd4a86
SHA5128a39908ab5c650acdc4e40062e18673c773bea2a3ce18e2b95821e4c7034187fc5ac72c659683f4048eb0a947f1190de950a213980f899947a0deadb3c3fb595
-
Filesize
202KB
MD5ef2247cc05cb1645911c9e00686c45c0
SHA1fd34d3cdd355d7022ed381db0d77da67f972bbef
SHA25652deef2b5d455aa8001e7bc91fd8ff54024e2a707cbed1944507af2fe5dd4a86
SHA5128a39908ab5c650acdc4e40062e18673c773bea2a3ce18e2b95821e4c7034187fc5ac72c659683f4048eb0a947f1190de950a213980f899947a0deadb3c3fb595
-
Filesize
202KB
MD5ef2247cc05cb1645911c9e00686c45c0
SHA1fd34d3cdd355d7022ed381db0d77da67f972bbef
SHA25652deef2b5d455aa8001e7bc91fd8ff54024e2a707cbed1944507af2fe5dd4a86
SHA5128a39908ab5c650acdc4e40062e18673c773bea2a3ce18e2b95821e4c7034187fc5ac72c659683f4048eb0a947f1190de950a213980f899947a0deadb3c3fb595
-
Filesize
202KB
MD5ef2247cc05cb1645911c9e00686c45c0
SHA1fd34d3cdd355d7022ed381db0d77da67f972bbef
SHA25652deef2b5d455aa8001e7bc91fd8ff54024e2a707cbed1944507af2fe5dd4a86
SHA5128a39908ab5c650acdc4e40062e18673c773bea2a3ce18e2b95821e4c7034187fc5ac72c659683f4048eb0a947f1190de950a213980f899947a0deadb3c3fb595
-
Filesize
2.1MB
MD507a1e5acc43fe7ba03ef6b50d01e5c59
SHA1787b7e16dbf1ff2bcb1681114b5ac0049c5ce6a0
SHA256a79bdc9c32cccce861afa48e8d14c1f982f7add58e75f3ad28c7ef6ef05e9b23
SHA51287ad49a4e01264185fc3317c40813e10702d21d80025b011ff845d893cdb4530c971ee3ce0a01522cd88e00ff88e28ba7251d3eaa8ac37794291a3fbb4674640
-
Filesize
2.1MB
MD507a1e5acc43fe7ba03ef6b50d01e5c59
SHA1787b7e16dbf1ff2bcb1681114b5ac0049c5ce6a0
SHA256a79bdc9c32cccce861afa48e8d14c1f982f7add58e75f3ad28c7ef6ef05e9b23
SHA51287ad49a4e01264185fc3317c40813e10702d21d80025b011ff845d893cdb4530c971ee3ce0a01522cd88e00ff88e28ba7251d3eaa8ac37794291a3fbb4674640
-
Filesize
2.1MB
MD507a1e5acc43fe7ba03ef6b50d01e5c59
SHA1787b7e16dbf1ff2bcb1681114b5ac0049c5ce6a0
SHA256a79bdc9c32cccce861afa48e8d14c1f982f7add58e75f3ad28c7ef6ef05e9b23
SHA51287ad49a4e01264185fc3317c40813e10702d21d80025b011ff845d893cdb4530c971ee3ce0a01522cd88e00ff88e28ba7251d3eaa8ac37794291a3fbb4674640