Analysis
-
max time kernel
154s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 08:37
Static task
static1
Behavioral task
behavioral1
Sample
22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe
Resource
win10v2004-20220414-en
General
-
Target
22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe
-
Size
6.2MB
-
MD5
a7986c8bc73f693f300760fba89f4fb1
-
SHA1
b16b1f976cdf63e8eabfc81d84ce40a1cb20cfd4
-
SHA256
22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f
-
SHA512
6094c187711a12ada8fd63dfecc7f86ab0d7e14b6727ee99d4bd85c4a600c8027ae5a3bf440d40d9a282b9fb24eaeac6c5d8ea49ba40328bfc045253f47d0ed1
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" 1systemsmss.exe -
Executes dropped EXE 7 IoCs
pid Process 1204 1systemsmss.exe 520 svnhost.exe 1624 svnhost.exe 864 svnhost.exe 392 svnhost.exe 1840 systemsmss.exe 1552 systemsmss.exe -
Loads dropped DLL 6 IoCs
pid Process 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1204 1systemsmss.exe 1808 cmd.exe 392 svnhost.exe 392 svnhost.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run 1systemsmss.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\systemsmss.exe = "C:\\Windows\\System64\\1systemsmss.exe" 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\System64\vp8decoder.dll 1systemsmss.exe File created C:\Windows\System64\vp8encoder.dll 1systemsmss.exe File opened for modification C:\Windows\System64\vp8encoder.dll 1systemsmss.exe File created C:\Windows\Zont911\Tupe.bat 1systemsmss.exe File created C:\Windows\System64\1systemsmss.exe 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe File opened for modification C:\Windows\System64\1systemsmss.exe 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe File created C:\Windows\Zont911\Home.zip 1systemsmss.exe File opened for modification C:\Windows\System64\svnhost.exe 1systemsmss.exe File created C:\Windows\System64\systemsmss.exe 1systemsmss.exe File opened for modification C:\Windows\System64\systemsmss.exe 1systemsmss.exe File created C:\Windows\Zont911\Regedit.reg 1systemsmss.exe File opened for modification C:\Windows\System64\vp8decoder.dll 1systemsmss.exe File created C:\Windows\System64\svnhost.exe 1systemsmss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 948 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe 1204 1systemsmss.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 520 svnhost.exe Token: SeDebugPrivilege 864 svnhost.exe Token: SeTakeOwnershipPrivilege 392 svnhost.exe Token: SeTcbPrivilege 392 svnhost.exe Token: SeTcbPrivilege 392 svnhost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 520 svnhost.exe 1624 svnhost.exe 864 svnhost.exe 392 svnhost.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1204 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 27 PID 1352 wrote to memory of 1204 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 27 PID 1352 wrote to memory of 1204 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 27 PID 1352 wrote to memory of 1204 1352 22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe 27 PID 1204 wrote to memory of 948 1204 1systemsmss.exe 28 PID 1204 wrote to memory of 948 1204 1systemsmss.exe 28 PID 1204 wrote to memory of 948 1204 1systemsmss.exe 28 PID 1204 wrote to memory of 948 1204 1systemsmss.exe 28 PID 1204 wrote to memory of 1808 1204 1systemsmss.exe 29 PID 1204 wrote to memory of 1808 1204 1systemsmss.exe 29 PID 1204 wrote to memory of 1808 1204 1systemsmss.exe 29 PID 1204 wrote to memory of 1808 1204 1systemsmss.exe 29 PID 1808 wrote to memory of 1096 1808 cmd.exe 31 PID 1808 wrote to memory of 1096 1808 cmd.exe 31 PID 1808 wrote to memory of 1096 1808 cmd.exe 31 PID 1808 wrote to memory of 1096 1808 cmd.exe 31 PID 1808 wrote to memory of 520 1808 cmd.exe 32 PID 1808 wrote to memory of 520 1808 cmd.exe 32 PID 1808 wrote to memory of 520 1808 cmd.exe 32 PID 1808 wrote to memory of 520 1808 cmd.exe 32 PID 1808 wrote to memory of 1624 1808 cmd.exe 33 PID 1808 wrote to memory of 1624 1808 cmd.exe 33 PID 1808 wrote to memory of 1624 1808 cmd.exe 33 PID 1808 wrote to memory of 1624 1808 cmd.exe 33 PID 1808 wrote to memory of 864 1808 cmd.exe 34 PID 1808 wrote to memory of 864 1808 cmd.exe 34 PID 1808 wrote to memory of 864 1808 cmd.exe 34 PID 1808 wrote to memory of 864 1808 cmd.exe 34 PID 392 wrote to memory of 1840 392 svnhost.exe 37 PID 392 wrote to memory of 1840 392 svnhost.exe 37 PID 392 wrote to memory of 1840 392 svnhost.exe 37 PID 392 wrote to memory of 1840 392 svnhost.exe 37 PID 392 wrote to memory of 1552 392 svnhost.exe 36 PID 392 wrote to memory of 1552 392 svnhost.exe 36 PID 392 wrote to memory of 1552 392 svnhost.exe 36 PID 392 wrote to memory of 1552 392 svnhost.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe"C:\Users\Admin\AppData\Local\Temp\22a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\System64\1systemsmss.exe"C:\Windows\System64\1systemsmss.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s "C:\Windows\Zont911\Regedit.reg"3⤵
- Runs .reg file with regedit
PID:948
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\Zont911\Tupe.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\chcp.comChcp 12514⤵PID:1096
-
-
C:\Windows\System64\svnhost.exe"C:\Windows\System64\svnhost.exe" /silentinstall4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:520
-
-
C:\Windows\System64\svnhost.exe"C:\Windows\System64\svnhost.exe" /firewall4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
C:\Windows\System64\svnhost.exe"C:\Windows\System64\svnhost.exe" /start4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:864
-
-
-
-
C:\Windows\System64\svnhost.exeC:\Windows\System64\svnhost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\System64\systemsmss.exeC:\Windows\System64\systemsmss.exe2⤵
- Executes dropped EXE
PID:1552
-
-
C:\Windows\System64\systemsmss.exeC:\Windows\System64\systemsmss.exe /tray2⤵
- Executes dropped EXE
PID:1840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.2MB
MD5a7986c8bc73f693f300760fba89f4fb1
SHA1b16b1f976cdf63e8eabfc81d84ce40a1cb20cfd4
SHA25622a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f
SHA5126094c187711a12ada8fd63dfecc7f86ab0d7e14b6727ee99d4bd85c4a600c8027ae5a3bf440d40d9a282b9fb24eaeac6c5d8ea49ba40328bfc045253f47d0ed1
-
Filesize
6.2MB
MD5a7986c8bc73f693f300760fba89f4fb1
SHA1b16b1f976cdf63e8eabfc81d84ce40a1cb20cfd4
SHA25622a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f
SHA5126094c187711a12ada8fd63dfecc7f86ab0d7e14b6727ee99d4bd85c4a600c8027ae5a3bf440d40d9a282b9fb24eaeac6c5d8ea49ba40328bfc045253f47d0ed1
-
Filesize
6.0MB
MD5e437e8730f2163cba2552a5a374a885a
SHA1514497f668ae7b80a698bd8cda6de2dcf104e450
SHA256dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6
SHA512e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445
-
Filesize
6.0MB
MD5e437e8730f2163cba2552a5a374a885a
SHA1514497f668ae7b80a698bd8cda6de2dcf104e450
SHA256dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6
SHA512e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445
-
Filesize
6.0MB
MD5e437e8730f2163cba2552a5a374a885a
SHA1514497f668ae7b80a698bd8cda6de2dcf104e450
SHA256dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6
SHA512e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445
-
Filesize
6.0MB
MD5e437e8730f2163cba2552a5a374a885a
SHA1514497f668ae7b80a698bd8cda6de2dcf104e450
SHA256dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6
SHA512e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445
-
Filesize
6.0MB
MD5e437e8730f2163cba2552a5a374a885a
SHA1514497f668ae7b80a698bd8cda6de2dcf104e450
SHA256dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6
SHA512e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445
-
Filesize
5.1MB
MD5bd458a26931f960f13958510e88a61a8
SHA1be9fff29f269d649688e941e97ac03e669571837
SHA256d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3
SHA512afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7
-
Filesize
5.1MB
MD5bd458a26931f960f13958510e88a61a8
SHA1be9fff29f269d649688e941e97ac03e669571837
SHA256d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3
SHA512afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7
-
Filesize
5.1MB
MD5bd458a26931f960f13958510e88a61a8
SHA1be9fff29f269d649688e941e97ac03e669571837
SHA256d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3
SHA512afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7
-
Filesize
378KB
MD5d43fa82fab5337ce20ad14650085c5d9
SHA1678aa092075ff65b6815ffc2d8fdc23af8425981
SHA256c022958429edd94bfe31f2eacfe24ff6b45d6f12747725c449a36116373de03b
SHA512103e61a9f58df03316676a074487e50ec518479c11068df3736df139b85c7671048c65bce0ef2c55b3c50c61fde54e9e6c7d1b795aea71263ae94c91d4874e0d
-
Filesize
1.6MB
MD5dab4646806dfca6d0e0b4d80fa9209d6
SHA18244dfe22ec2090eee89dad103e6b2002059d16a
SHA256cb6ef96d3a66ef08ec2c8640b751a52d6d4f4530cf01162a69966f0fd5153587
SHA512aa5eb93bf23a10de797d6fb52a55a95d36bc48927c76fedd81e0c48872745cb7f7d1b3f230eaae42fd4e79b6a59ca707e56bd6963b03644cbd5984f11e98d6e7
-
Filesize
11KB
MD54cc849c78d4e05407d239ac114e66460
SHA1e1c41bb549bb566ab1ce74dbae49a8e614141607
SHA2565ecc7bbd4ad29f34942eef21911dd1e19300daeaa0b12f3b5c1003120d31c7d5
SHA5120f04c2e3c197a4eaa1329618d931e015328273f0a9fd9c6f20db2c4623c6df20d58596d188723d762c6cc6cb21e7e07268b5915f26a76e38fa2773eaeacfe22f
-
Filesize
281B
MD5691f040de6d335962416b319dcd416dc
SHA1db49109c0917910f7fce8b6de690a1c7e2026226
SHA256605d0b9c2fd1972c4ee60d8eefd336be636884dcdf54a4e5f2829c46e80fdcea
SHA512f34ba36bdeaa43a1265ec69acfa0f199f2b4d5d90b4ea890327478f4f48ec7597d660b922dd1e149de3a1ff9b48c79e4c9c53e8a482b4cb5842bc0976f93bf89
-
Filesize
6.2MB
MD5a7986c8bc73f693f300760fba89f4fb1
SHA1b16b1f976cdf63e8eabfc81d84ce40a1cb20cfd4
SHA25622a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f
SHA5126094c187711a12ada8fd63dfecc7f86ab0d7e14b6727ee99d4bd85c4a600c8027ae5a3bf440d40d9a282b9fb24eaeac6c5d8ea49ba40328bfc045253f47d0ed1
-
Filesize
6.2MB
MD5a7986c8bc73f693f300760fba89f4fb1
SHA1b16b1f976cdf63e8eabfc81d84ce40a1cb20cfd4
SHA25622a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f
SHA5126094c187711a12ada8fd63dfecc7f86ab0d7e14b6727ee99d4bd85c4a600c8027ae5a3bf440d40d9a282b9fb24eaeac6c5d8ea49ba40328bfc045253f47d0ed1
-
Filesize
6.2MB
MD5a7986c8bc73f693f300760fba89f4fb1
SHA1b16b1f976cdf63e8eabfc81d84ce40a1cb20cfd4
SHA25622a3c781a5d915f4ab2797a4546a57882b112d397c7c52592a15cec6b561cd5f
SHA5126094c187711a12ada8fd63dfecc7f86ab0d7e14b6727ee99d4bd85c4a600c8027ae5a3bf440d40d9a282b9fb24eaeac6c5d8ea49ba40328bfc045253f47d0ed1
-
Filesize
6.0MB
MD5e437e8730f2163cba2552a5a374a885a
SHA1514497f668ae7b80a698bd8cda6de2dcf104e450
SHA256dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6
SHA512e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445
-
Filesize
5.1MB
MD5bd458a26931f960f13958510e88a61a8
SHA1be9fff29f269d649688e941e97ac03e669571837
SHA256d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3
SHA512afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7
-
Filesize
5.1MB
MD5bd458a26931f960f13958510e88a61a8
SHA1be9fff29f269d649688e941e97ac03e669571837
SHA256d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3
SHA512afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7