Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 08:25
Static task
static1
Behavioral task
behavioral1
Sample
151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe
Resource
win10v2004-20220414-en
General
-
Target
151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe
-
Size
6.2MB
-
MD5
474fd12f9e7e6321528226b0c5c7a555
-
SHA1
328b8face61784a1e39718c8426b8a3195cda41d
-
SHA256
151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083
-
SHA512
5b87863ab34dd62cb246df734e36c0261420fc352ebad7c7dd83419cf3d8c2e9d0bd19b071c42262f9c821c8fb05aa28b127b73136e12fc534450c1d5fd55a50
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Windows\\System64\\1rfusclient.exe, explorer.exe" 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" 1rfusclient.exe -
Executes dropped EXE 7 IoCs
pid Process 1248 1rfusclient.exe 1768 svnhost.exe 1884 svnhost.exe 1660 svnhost.exe 364 svnhost.exe 1772 systemsmss.exe 2012 systemsmss.exe -
Loads dropped DLL 6 IoCs
pid Process 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 1248 1rfusclient.exe 1000 cmd.exe 364 svnhost.exe 364 svnhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run 1rfusclient.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\System64\1rfusclient.exe 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe File created C:\Windows\Zont911\Home.zip 1rfusclient.exe File created C:\Windows\System64\vp8encoder.dll 1rfusclient.exe File opened for modification C:\Windows\System64\vp8encoder.dll 1rfusclient.exe File opened for modification C:\Windows\System64\systemsmss.exe 1rfusclient.exe File created C:\Windows\System64\systemsmss.exe 1rfusclient.exe File created C:\Windows\Zont911\Tupe.bat 1rfusclient.exe File opened for modification C:\Windows\System64\1rfusclient.exe 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe File created C:\Windows\Zont911\Regedit.reg 1rfusclient.exe File created C:\Windows\System64\vp8decoder.dll 1rfusclient.exe File opened for modification C:\Windows\System64\vp8decoder.dll 1rfusclient.exe File created C:\Windows\System64\svnhost.exe 1rfusclient.exe File opened for modification C:\Windows\System64\svnhost.exe 1rfusclient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 1112 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe 1248 1rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1768 svnhost.exe Token: SeDebugPrivilege 1660 svnhost.exe Token: SeTakeOwnershipPrivilege 364 svnhost.exe Token: SeTcbPrivilege 364 svnhost.exe Token: SeTcbPrivilege 364 svnhost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1768 svnhost.exe 1884 svnhost.exe 1660 svnhost.exe 364 svnhost.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1248 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 27 PID 2024 wrote to memory of 1248 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 27 PID 2024 wrote to memory of 1248 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 27 PID 2024 wrote to memory of 1248 2024 151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe 27 PID 1248 wrote to memory of 1112 1248 1rfusclient.exe 28 PID 1248 wrote to memory of 1112 1248 1rfusclient.exe 28 PID 1248 wrote to memory of 1112 1248 1rfusclient.exe 28 PID 1248 wrote to memory of 1112 1248 1rfusclient.exe 28 PID 1248 wrote to memory of 1000 1248 1rfusclient.exe 29 PID 1248 wrote to memory of 1000 1248 1rfusclient.exe 29 PID 1248 wrote to memory of 1000 1248 1rfusclient.exe 29 PID 1248 wrote to memory of 1000 1248 1rfusclient.exe 29 PID 1000 wrote to memory of 580 1000 cmd.exe 31 PID 1000 wrote to memory of 580 1000 cmd.exe 31 PID 1000 wrote to memory of 580 1000 cmd.exe 31 PID 1000 wrote to memory of 580 1000 cmd.exe 31 PID 1000 wrote to memory of 1768 1000 cmd.exe 32 PID 1000 wrote to memory of 1768 1000 cmd.exe 32 PID 1000 wrote to memory of 1768 1000 cmd.exe 32 PID 1000 wrote to memory of 1768 1000 cmd.exe 32 PID 1000 wrote to memory of 1884 1000 cmd.exe 33 PID 1000 wrote to memory of 1884 1000 cmd.exe 33 PID 1000 wrote to memory of 1884 1000 cmd.exe 33 PID 1000 wrote to memory of 1884 1000 cmd.exe 33 PID 1000 wrote to memory of 1660 1000 cmd.exe 34 PID 1000 wrote to memory of 1660 1000 cmd.exe 34 PID 1000 wrote to memory of 1660 1000 cmd.exe 34 PID 1000 wrote to memory of 1660 1000 cmd.exe 34 PID 364 wrote to memory of 2012 364 svnhost.exe 37 PID 364 wrote to memory of 2012 364 svnhost.exe 37 PID 364 wrote to memory of 2012 364 svnhost.exe 37 PID 364 wrote to memory of 2012 364 svnhost.exe 37 PID 364 wrote to memory of 1772 364 svnhost.exe 36 PID 364 wrote to memory of 1772 364 svnhost.exe 36 PID 364 wrote to memory of 1772 364 svnhost.exe 36 PID 364 wrote to memory of 1772 364 svnhost.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe"C:\Users\Admin\AppData\Local\Temp\151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\System64\1rfusclient.exe"C:\Windows\System64\1rfusclient.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s "C:\Windows\Zont911\Regedit.reg"3⤵
- Runs .reg file with regedit
PID:1112
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\Zont911\Tupe.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\chcp.comChcp 12514⤵PID:580
-
-
C:\Windows\System64\svnhost.exe"C:\Windows\System64\svnhost.exe" /silentinstall4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1768
-
-
C:\Windows\System64\svnhost.exe"C:\Windows\System64\svnhost.exe" /firewall4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1884
-
-
C:\Windows\System64\svnhost.exe"C:\Windows\System64\svnhost.exe" /start4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1660
-
-
-
-
C:\Windows\System64\svnhost.exeC:\Windows\System64\svnhost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\System64\systemsmss.exeC:\Windows\System64\systemsmss.exe /tray2⤵
- Executes dropped EXE
PID:1772
-
-
C:\Windows\System64\systemsmss.exeC:\Windows\System64\systemsmss.exe2⤵
- Executes dropped EXE
PID:2012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.2MB
MD5474fd12f9e7e6321528226b0c5c7a555
SHA1328b8face61784a1e39718c8426b8a3195cda41d
SHA256151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083
SHA5125b87863ab34dd62cb246df734e36c0261420fc352ebad7c7dd83419cf3d8c2e9d0bd19b071c42262f9c821c8fb05aa28b127b73136e12fc534450c1d5fd55a50
-
Filesize
6.2MB
MD5474fd12f9e7e6321528226b0c5c7a555
SHA1328b8face61784a1e39718c8426b8a3195cda41d
SHA256151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083
SHA5125b87863ab34dd62cb246df734e36c0261420fc352ebad7c7dd83419cf3d8c2e9d0bd19b071c42262f9c821c8fb05aa28b127b73136e12fc534450c1d5fd55a50
-
Filesize
6.0MB
MD5e437e8730f2163cba2552a5a374a885a
SHA1514497f668ae7b80a698bd8cda6de2dcf104e450
SHA256dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6
SHA512e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445
-
Filesize
6.0MB
MD5e437e8730f2163cba2552a5a374a885a
SHA1514497f668ae7b80a698bd8cda6de2dcf104e450
SHA256dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6
SHA512e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445
-
Filesize
6.0MB
MD5e437e8730f2163cba2552a5a374a885a
SHA1514497f668ae7b80a698bd8cda6de2dcf104e450
SHA256dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6
SHA512e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445
-
Filesize
6.0MB
MD5e437e8730f2163cba2552a5a374a885a
SHA1514497f668ae7b80a698bd8cda6de2dcf104e450
SHA256dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6
SHA512e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445
-
Filesize
6.0MB
MD5e437e8730f2163cba2552a5a374a885a
SHA1514497f668ae7b80a698bd8cda6de2dcf104e450
SHA256dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6
SHA512e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445
-
Filesize
5.1MB
MD5bd458a26931f960f13958510e88a61a8
SHA1be9fff29f269d649688e941e97ac03e669571837
SHA256d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3
SHA512afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7
-
Filesize
5.1MB
MD5bd458a26931f960f13958510e88a61a8
SHA1be9fff29f269d649688e941e97ac03e669571837
SHA256d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3
SHA512afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7
-
Filesize
5.1MB
MD5bd458a26931f960f13958510e88a61a8
SHA1be9fff29f269d649688e941e97ac03e669571837
SHA256d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3
SHA512afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7
-
Filesize
378KB
MD5d43fa82fab5337ce20ad14650085c5d9
SHA1678aa092075ff65b6815ffc2d8fdc23af8425981
SHA256c022958429edd94bfe31f2eacfe24ff6b45d6f12747725c449a36116373de03b
SHA512103e61a9f58df03316676a074487e50ec518479c11068df3736df139b85c7671048c65bce0ef2c55b3c50c61fde54e9e6c7d1b795aea71263ae94c91d4874e0d
-
Filesize
1.6MB
MD5dab4646806dfca6d0e0b4d80fa9209d6
SHA18244dfe22ec2090eee89dad103e6b2002059d16a
SHA256cb6ef96d3a66ef08ec2c8640b751a52d6d4f4530cf01162a69966f0fd5153587
SHA512aa5eb93bf23a10de797d6fb52a55a95d36bc48927c76fedd81e0c48872745cb7f7d1b3f230eaae42fd4e79b6a59ca707e56bd6963b03644cbd5984f11e98d6e7
-
Filesize
11KB
MD547421bf41df43736b2f3fb3451dc1c62
SHA14d03f8a9b35bb602da9ec81da2b4c02438acd823
SHA256ca79c960df420d52950686dc1843c729cd0195c2729e7b6771254d63a22108e8
SHA5128caf39e4a790ee77056708bb76c5d7c91ae9dc4b6a75b332b9ba0b79a8ec87a9973e2774dee5c7dacb6ce2d5369034b7bfd9ed5a14f8a3bd182177e55f1a4197
-
Filesize
281B
MD5020d7ae318d01b6d0d92aa48ef198e82
SHA1709c08b071bd6cf789ed6667b4f7c957338e81aa
SHA2566fbce5a6530fe597afa45f71efba019f881765e26eeaa964d653c266e609593e
SHA512b1ac136d59539f72773d9d3aa190e2d87e9ed8d909e6e8c3c5a6e8feb737543855e72a592429ef4372edb3cdd1fc67537b8e058da56b8d7517d8a57e753fcef0
-
Filesize
6.2MB
MD5474fd12f9e7e6321528226b0c5c7a555
SHA1328b8face61784a1e39718c8426b8a3195cda41d
SHA256151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083
SHA5125b87863ab34dd62cb246df734e36c0261420fc352ebad7c7dd83419cf3d8c2e9d0bd19b071c42262f9c821c8fb05aa28b127b73136e12fc534450c1d5fd55a50
-
Filesize
6.2MB
MD5474fd12f9e7e6321528226b0c5c7a555
SHA1328b8face61784a1e39718c8426b8a3195cda41d
SHA256151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083
SHA5125b87863ab34dd62cb246df734e36c0261420fc352ebad7c7dd83419cf3d8c2e9d0bd19b071c42262f9c821c8fb05aa28b127b73136e12fc534450c1d5fd55a50
-
Filesize
6.2MB
MD5474fd12f9e7e6321528226b0c5c7a555
SHA1328b8face61784a1e39718c8426b8a3195cda41d
SHA256151da688aa59bda8a48941559f15d6b61e11d4d62f7af1537ac5bc149fb4a083
SHA5125b87863ab34dd62cb246df734e36c0261420fc352ebad7c7dd83419cf3d8c2e9d0bd19b071c42262f9c821c8fb05aa28b127b73136e12fc534450c1d5fd55a50
-
Filesize
6.0MB
MD5e437e8730f2163cba2552a5a374a885a
SHA1514497f668ae7b80a698bd8cda6de2dcf104e450
SHA256dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6
SHA512e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445
-
Filesize
5.1MB
MD5bd458a26931f960f13958510e88a61a8
SHA1be9fff29f269d649688e941e97ac03e669571837
SHA256d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3
SHA512afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7
-
Filesize
5.1MB
MD5bd458a26931f960f13958510e88a61a8
SHA1be9fff29f269d649688e941e97ac03e669571837
SHA256d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3
SHA512afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7