Analysis
-
max time kernel
163s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe
Resource
win10v2004-20220812-en
General
-
Target
f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe
-
Size
198KB
-
MD5
0f0fb40c0a0d30b16cb7cd663577883b
-
SHA1
c2ed195117614f83cbc4bc76c9b4d81624e80f5c
-
SHA256
f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952
-
SHA512
1d7f63cafecd41fd9fab1a4749bfd603ee93abf149ef772478b17e9843f22d4a63bfb018152dc385a1f1806fcf6bca19336b9b0c4b8b48195c4222ebf7146032
-
SSDEEP
3072:obpDCw1p3vmLvsZIaVwiwDcIbDHDCm/DER4eQyzfRlREQk++M4t:gDCwfG1bnxLERRBbDREQZ+MG
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" hosts.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hosts.exe -
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\TMKNGOMU = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\TMKNGOMU = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\TMKNGOMU = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe -
Executes dropped EXE 6 IoCs
pid Process 1292 avscan.exe 4120 avscan.exe 2416 hosts.exe 4788 hosts.exe 2348 avscan.exe 1536 hosts.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" avscan.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run hosts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" hosts.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run avscan.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\windows\W_X_C.vbs f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe File created \??\c:\windows\W_X_C.bat f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe File opened for modification C:\Windows\hosts.exe f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe File opened for modification C:\Windows\hosts.exe avscan.exe File opened for modification C:\Windows\hosts.exe hosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 9 IoCs
pid Process 4348 REG.exe 1728 REG.exe 1448 REG.exe 5100 REG.exe 4192 REG.exe 1720 REG.exe 1188 REG.exe 1028 REG.exe 776 REG.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1292 avscan.exe 2416 hosts.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 5096 f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe 1292 avscan.exe 4120 avscan.exe 2416 hosts.exe 4788 hosts.exe 2348 avscan.exe 1536 hosts.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 5096 wrote to memory of 1720 5096 f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe 79 PID 5096 wrote to memory of 1720 5096 f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe 79 PID 5096 wrote to memory of 1720 5096 f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe 79 PID 5096 wrote to memory of 1292 5096 f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe 81 PID 5096 wrote to memory of 1292 5096 f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe 81 PID 5096 wrote to memory of 1292 5096 f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe 81 PID 1292 wrote to memory of 4120 1292 avscan.exe 82 PID 1292 wrote to memory of 4120 1292 avscan.exe 82 PID 1292 wrote to memory of 4120 1292 avscan.exe 82 PID 1292 wrote to memory of 1388 1292 avscan.exe 83 PID 1292 wrote to memory of 1388 1292 avscan.exe 83 PID 1292 wrote to memory of 1388 1292 avscan.exe 83 PID 5096 wrote to memory of 4544 5096 f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe 84 PID 5096 wrote to memory of 4544 5096 f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe 84 PID 5096 wrote to memory of 4544 5096 f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe 84 PID 4544 wrote to memory of 2416 4544 cmd.exe 87 PID 4544 wrote to memory of 2416 4544 cmd.exe 87 PID 4544 wrote to memory of 2416 4544 cmd.exe 87 PID 1388 wrote to memory of 4788 1388 cmd.exe 88 PID 1388 wrote to memory of 4788 1388 cmd.exe 88 PID 1388 wrote to memory of 4788 1388 cmd.exe 88 PID 2416 wrote to memory of 2348 2416 hosts.exe 89 PID 2416 wrote to memory of 2348 2416 hosts.exe 89 PID 2416 wrote to memory of 2348 2416 hosts.exe 89 PID 2416 wrote to memory of 5032 2416 hosts.exe 90 PID 2416 wrote to memory of 5032 2416 hosts.exe 90 PID 2416 wrote to memory of 5032 2416 hosts.exe 90 PID 5032 wrote to memory of 1536 5032 cmd.exe 93 PID 5032 wrote to memory of 1536 5032 cmd.exe 93 PID 5032 wrote to memory of 1536 5032 cmd.exe 93 PID 1388 wrote to memory of 204 1388 cmd.exe 94 PID 1388 wrote to memory of 204 1388 cmd.exe 94 PID 1388 wrote to memory of 204 1388 cmd.exe 94 PID 4544 wrote to memory of 224 4544 cmd.exe 95 PID 4544 wrote to memory of 224 4544 cmd.exe 95 PID 4544 wrote to memory of 224 4544 cmd.exe 95 PID 5032 wrote to memory of 2340 5032 cmd.exe 96 PID 5032 wrote to memory of 2340 5032 cmd.exe 96 PID 5032 wrote to memory of 2340 5032 cmd.exe 96 PID 1292 wrote to memory of 4348 1292 avscan.exe 99 PID 1292 wrote to memory of 4348 1292 avscan.exe 99 PID 1292 wrote to memory of 4348 1292 avscan.exe 99 PID 2416 wrote to memory of 1188 2416 hosts.exe 101 PID 2416 wrote to memory of 1188 2416 hosts.exe 101 PID 2416 wrote to memory of 1188 2416 hosts.exe 101 PID 1292 wrote to memory of 1728 1292 avscan.exe 103 PID 1292 wrote to memory of 1728 1292 avscan.exe 103 PID 1292 wrote to memory of 1728 1292 avscan.exe 103 PID 2416 wrote to memory of 1448 2416 hosts.exe 105 PID 2416 wrote to memory of 1448 2416 hosts.exe 105 PID 2416 wrote to memory of 1448 2416 hosts.exe 105 PID 1292 wrote to memory of 1028 1292 avscan.exe 107 PID 1292 wrote to memory of 1028 1292 avscan.exe 107 PID 1292 wrote to memory of 1028 1292 avscan.exe 107 PID 2416 wrote to memory of 5100 2416 hosts.exe 109 PID 2416 wrote to memory of 5100 2416 hosts.exe 109 PID 2416 wrote to memory of 5100 2416 hosts.exe 109 PID 1292 wrote to memory of 776 1292 avscan.exe 115 PID 1292 wrote to memory of 776 1292 avscan.exe 115 PID 1292 wrote to memory of 776 1292 avscan.exe 115 PID 2416 wrote to memory of 4192 2416 hosts.exe 117 PID 2416 wrote to memory of 4192 2416 hosts.exe 117 PID 2416 wrote to memory of 4192 2416 hosts.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe"C:\Users\Admin\AppData\Local\Temp\f34a47854683ba64fd0ded9f919f55dd367ddedf458afbc7abeeba4dfd073952.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f2⤵
- Modifies registry key
PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\windows\hosts.exeC:\windows\hosts.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4788
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"4⤵
- Adds policy Run key to start application
PID:204
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:4348
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:1728
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:1028
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\windows\hosts.exeC:\windows\hosts.exe3⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\windows\hosts.exeC:\windows\hosts.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1536
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"5⤵
- Adds policy Run key to start application
PID:2340
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f4⤵
- Modifies registry key
PID:1188
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f4⤵
- Modifies registry key
PID:1448
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f4⤵
- Modifies registry key
PID:5100
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f4⤵
- Modifies registry key
PID:4192
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"3⤵
- Adds policy Run key to start application
PID:224
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD52b189bc8260cd081b2e89ea608724066
SHA1eba83e70993e5da677da5af7e33971ef1c7a82c3
SHA25613b11a75cf9e127ebc03a915c21cce4e9d7197d4e0f65798fbc4d4b51514915a
SHA512e3f475acf593a0b80a3197d03cb8679a90f093a62a2e8076476a39b33ab0b0de6e43efb310e47259fd879d4461e861d0487adfef0e71455f8bedcf4f309b9aab
-
Filesize
198KB
MD52b189bc8260cd081b2e89ea608724066
SHA1eba83e70993e5da677da5af7e33971ef1c7a82c3
SHA25613b11a75cf9e127ebc03a915c21cce4e9d7197d4e0f65798fbc4d4b51514915a
SHA512e3f475acf593a0b80a3197d03cb8679a90f093a62a2e8076476a39b33ab0b0de6e43efb310e47259fd879d4461e861d0487adfef0e71455f8bedcf4f309b9aab
-
Filesize
198KB
MD52b189bc8260cd081b2e89ea608724066
SHA1eba83e70993e5da677da5af7e33971ef1c7a82c3
SHA25613b11a75cf9e127ebc03a915c21cce4e9d7197d4e0f65798fbc4d4b51514915a
SHA512e3f475acf593a0b80a3197d03cb8679a90f093a62a2e8076476a39b33ab0b0de6e43efb310e47259fd879d4461e861d0487adfef0e71455f8bedcf4f309b9aab
-
Filesize
198KB
MD52b189bc8260cd081b2e89ea608724066
SHA1eba83e70993e5da677da5af7e33971ef1c7a82c3
SHA25613b11a75cf9e127ebc03a915c21cce4e9d7197d4e0f65798fbc4d4b51514915a
SHA512e3f475acf593a0b80a3197d03cb8679a90f093a62a2e8076476a39b33ab0b0de6e43efb310e47259fd879d4461e861d0487adfef0e71455f8bedcf4f309b9aab
-
Filesize
195B
MD5c35f93e634b81f2cb003c72a1fb9d1f2
SHA19b6c533eebab7958e9e167ab93a412d5411c7a89
SHA2566afae199db9be5b7c4c5dac778ec8c45051666d11f93dd93c1700beb20e1136f
SHA5125cc512763da54bc66ffff42e02dc28ad9cda03e46a8b9181425c619815fb7c7afe3a71fc73742e151e26de7a21ade101e59d6853fe70b7d99ea93195325c010d
-
Filesize
198KB
MD5e67c6a6460720b3f2df0b5f6f33347cc
SHA1dd45768ae96e5ed08b364e6df758edfcb2271349
SHA2567cd87403e3791a3e19e8b4ad27cb87a5472dfe03db84ed3a586250c855f6c024
SHA5128a471f315b0beed84a048e214d6144959401ceb2a14d8b90e029e5a06a94b88c959bd22e5b1e323b54f17720be5d15efb986f705bb394ca0cd6c030c83322766
-
Filesize
198KB
MD5e67c6a6460720b3f2df0b5f6f33347cc
SHA1dd45768ae96e5ed08b364e6df758edfcb2271349
SHA2567cd87403e3791a3e19e8b4ad27cb87a5472dfe03db84ed3a586250c855f6c024
SHA5128a471f315b0beed84a048e214d6144959401ceb2a14d8b90e029e5a06a94b88c959bd22e5b1e323b54f17720be5d15efb986f705bb394ca0cd6c030c83322766
-
Filesize
198KB
MD5e67c6a6460720b3f2df0b5f6f33347cc
SHA1dd45768ae96e5ed08b364e6df758edfcb2271349
SHA2567cd87403e3791a3e19e8b4ad27cb87a5472dfe03db84ed3a586250c855f6c024
SHA5128a471f315b0beed84a048e214d6144959401ceb2a14d8b90e029e5a06a94b88c959bd22e5b1e323b54f17720be5d15efb986f705bb394ca0cd6c030c83322766
-
Filesize
198KB
MD5e67c6a6460720b3f2df0b5f6f33347cc
SHA1dd45768ae96e5ed08b364e6df758edfcb2271349
SHA2567cd87403e3791a3e19e8b4ad27cb87a5472dfe03db84ed3a586250c855f6c024
SHA5128a471f315b0beed84a048e214d6144959401ceb2a14d8b90e029e5a06a94b88c959bd22e5b1e323b54f17720be5d15efb986f705bb394ca0cd6c030c83322766
-
Filesize
198KB
MD5e67c6a6460720b3f2df0b5f6f33347cc
SHA1dd45768ae96e5ed08b364e6df758edfcb2271349
SHA2567cd87403e3791a3e19e8b4ad27cb87a5472dfe03db84ed3a586250c855f6c024
SHA5128a471f315b0beed84a048e214d6144959401ceb2a14d8b90e029e5a06a94b88c959bd22e5b1e323b54f17720be5d15efb986f705bb394ca0cd6c030c83322766
-
Filesize
336B
MD54db9f8b6175722b62ececeeeba1ce307
SHA13b3ba8414706e72a6fa19e884a97b87609e11e47
SHA256d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78
SHA5121d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b