Analysis
-
max time kernel
126s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 18:22
Static task
static1
Behavioral task
behavioral1
Sample
509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe
Resource
win10v2004-20220901-en
General
-
Target
509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe
-
Size
340KB
-
MD5
0f98b71ceccfe7b70b6bdfa8be22daae
-
SHA1
6ae2968777eabe28ed20e319ee194b9dc6ebb419
-
SHA256
509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857
-
SHA512
e3fc402bd034713db5da24bdeec5a397f047966259d0ffa80d6e4548fdf8356dd8b1008e571a091c7d007f3d5a1bd31531e3825a37a4dd40cb652d6251ab43f2
-
SSDEEP
3072:obpDCw1p3vmLvsZIaVwiwDcIbDHDCm/DER4eQabpDCw1p3vmLvsZIaVwiwDcIbDY:gDCwfG1bnxLERRDDCwfG1bnxLERR/
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" hosts.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hosts.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe -
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\IYMUGYHL = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\IYMUGYHL = "W_X_C.bat" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\IYMUGYHL = "W_X_C.bat" WScript.exe -
Executes dropped EXE 6 IoCs
pid Process 3360 avscan.exe 1416 avscan.exe 4224 hosts.exe 2696 hosts.exe 2096 avscan.exe 4300 hosts.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" hosts.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run avscan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" avscan.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run hosts.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\windows\W_X_C.vbs 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe File created \??\c:\windows\W_X_C.bat 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe File opened for modification C:\Windows\hosts.exe 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe File opened for modification C:\Windows\hosts.exe avscan.exe File opened for modification C:\Windows\hosts.exe hosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 9 IoCs
pid Process 444 REG.exe 808 REG.exe 4560 REG.exe 4256 REG.exe 1252 REG.exe 1180 REG.exe 1200 REG.exe 4624 REG.exe 852 REG.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3360 avscan.exe 4224 hosts.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4972 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe 3360 avscan.exe 1416 avscan.exe 4224 hosts.exe 2096 avscan.exe 2696 hosts.exe 4300 hosts.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4972 wrote to memory of 1180 4972 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe 82 PID 4972 wrote to memory of 1180 4972 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe 82 PID 4972 wrote to memory of 1180 4972 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe 82 PID 4972 wrote to memory of 3360 4972 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe 84 PID 4972 wrote to memory of 3360 4972 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe 84 PID 4972 wrote to memory of 3360 4972 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe 84 PID 3360 wrote to memory of 1416 3360 avscan.exe 85 PID 3360 wrote to memory of 1416 3360 avscan.exe 85 PID 3360 wrote to memory of 1416 3360 avscan.exe 85 PID 3360 wrote to memory of 4136 3360 avscan.exe 86 PID 3360 wrote to memory of 4136 3360 avscan.exe 86 PID 3360 wrote to memory of 4136 3360 avscan.exe 86 PID 4972 wrote to memory of 1968 4972 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe 87 PID 4972 wrote to memory of 1968 4972 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe 87 PID 4972 wrote to memory of 1968 4972 509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe 87 PID 4136 wrote to memory of 4224 4136 cmd.exe 90 PID 4136 wrote to memory of 4224 4136 cmd.exe 90 PID 4136 wrote to memory of 4224 4136 cmd.exe 90 PID 1968 wrote to memory of 2696 1968 cmd.exe 92 PID 1968 wrote to memory of 2696 1968 cmd.exe 92 PID 1968 wrote to memory of 2696 1968 cmd.exe 92 PID 4224 wrote to memory of 2096 4224 hosts.exe 93 PID 4224 wrote to memory of 2096 4224 hosts.exe 93 PID 4224 wrote to memory of 2096 4224 hosts.exe 93 PID 4224 wrote to memory of 3856 4224 hosts.exe 94 PID 4224 wrote to memory of 3856 4224 hosts.exe 94 PID 4224 wrote to memory of 3856 4224 hosts.exe 94 PID 3856 wrote to memory of 4300 3856 cmd.exe 96 PID 3856 wrote to memory of 4300 3856 cmd.exe 96 PID 3856 wrote to memory of 4300 3856 cmd.exe 96 PID 1968 wrote to memory of 3608 1968 cmd.exe 98 PID 1968 wrote to memory of 3608 1968 cmd.exe 98 PID 1968 wrote to memory of 3608 1968 cmd.exe 98 PID 4136 wrote to memory of 4056 4136 cmd.exe 97 PID 4136 wrote to memory of 4056 4136 cmd.exe 97 PID 4136 wrote to memory of 4056 4136 cmd.exe 97 PID 3856 wrote to memory of 628 3856 cmd.exe 99 PID 3856 wrote to memory of 628 3856 cmd.exe 99 PID 3856 wrote to memory of 628 3856 cmd.exe 99 PID 3360 wrote to memory of 444 3360 avscan.exe 108 PID 3360 wrote to memory of 444 3360 avscan.exe 108 PID 3360 wrote to memory of 444 3360 avscan.exe 108 PID 4224 wrote to memory of 808 4224 hosts.exe 111 PID 4224 wrote to memory of 808 4224 hosts.exe 111 PID 4224 wrote to memory of 808 4224 hosts.exe 111 PID 3360 wrote to memory of 1200 3360 avscan.exe 112 PID 3360 wrote to memory of 1200 3360 avscan.exe 112 PID 3360 wrote to memory of 1200 3360 avscan.exe 112 PID 4224 wrote to memory of 4560 4224 hosts.exe 114 PID 4224 wrote to memory of 4560 4224 hosts.exe 114 PID 4224 wrote to memory of 4560 4224 hosts.exe 114 PID 3360 wrote to memory of 4624 3360 avscan.exe 117 PID 3360 wrote to memory of 4624 3360 avscan.exe 117 PID 3360 wrote to memory of 4624 3360 avscan.exe 117 PID 4224 wrote to memory of 4256 4224 hosts.exe 118 PID 4224 wrote to memory of 4256 4224 hosts.exe 118 PID 4224 wrote to memory of 4256 4224 hosts.exe 118 PID 3360 wrote to memory of 852 3360 avscan.exe 120 PID 3360 wrote to memory of 852 3360 avscan.exe 120 PID 3360 wrote to memory of 852 3360 avscan.exe 120 PID 4224 wrote to memory of 1252 4224 hosts.exe 122 PID 4224 wrote to memory of 1252 4224 hosts.exe 122 PID 4224 wrote to memory of 1252 4224 hosts.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe"C:\Users\Admin\AppData\Local\Temp\509a4104ad505a674b03ee8b7dd734431334102f1c1dc79e53ce28549d7ef857.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f2⤵
- Modifies registry key
PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\windows\hosts.exeC:\windows\hosts.exe4⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat5⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\windows\hosts.exeC:\windows\hosts.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4300
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"6⤵
- Adds policy Run key to start application
PID:628
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:808
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:4560
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:4256
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:1252
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"4⤵
- Adds policy Run key to start application
PID:4056
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:444
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:1200
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:4624
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\windows\hosts.exeC:\windows\hosts.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2696
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"3⤵
- Adds policy Run key to start application
PID:3608
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3560
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD549f71bb46c0aee5e73944a3073566ee3
SHA154ae998a930e4a5fecd10731b572f7710d9f4c5b
SHA2568bf7c6b8ca357f8fa90dad4a3f04818c7ba71aa4d2b21d454d33ef025aa78463
SHA5127168ab6a2e4ae7c9baa1c88778c48ed1f7098eac1e457eba5a914954af833980d902e23af59784de398abe1cb6208e7c8a3581a49a785039e9c9b7930f0df9b0
-
Filesize
340KB
MD549f71bb46c0aee5e73944a3073566ee3
SHA154ae998a930e4a5fecd10731b572f7710d9f4c5b
SHA2568bf7c6b8ca357f8fa90dad4a3f04818c7ba71aa4d2b21d454d33ef025aa78463
SHA5127168ab6a2e4ae7c9baa1c88778c48ed1f7098eac1e457eba5a914954af833980d902e23af59784de398abe1cb6208e7c8a3581a49a785039e9c9b7930f0df9b0
-
Filesize
340KB
MD549f71bb46c0aee5e73944a3073566ee3
SHA154ae998a930e4a5fecd10731b572f7710d9f4c5b
SHA2568bf7c6b8ca357f8fa90dad4a3f04818c7ba71aa4d2b21d454d33ef025aa78463
SHA5127168ab6a2e4ae7c9baa1c88778c48ed1f7098eac1e457eba5a914954af833980d902e23af59784de398abe1cb6208e7c8a3581a49a785039e9c9b7930f0df9b0
-
Filesize
340KB
MD549f71bb46c0aee5e73944a3073566ee3
SHA154ae998a930e4a5fecd10731b572f7710d9f4c5b
SHA2568bf7c6b8ca357f8fa90dad4a3f04818c7ba71aa4d2b21d454d33ef025aa78463
SHA5127168ab6a2e4ae7c9baa1c88778c48ed1f7098eac1e457eba5a914954af833980d902e23af59784de398abe1cb6208e7c8a3581a49a785039e9c9b7930f0df9b0
-
Filesize
195B
MD50e0483d4802632100b6bfe8bc2e5d661
SHA1767e0deb7dcaa7676004e6053957c36cecfeeefa
SHA25681bbebb8d0e77ffffbc7b7d24afdcdce4089f4b04d1a12284eda861c25e03f9f
SHA5128279b0559ca30a0adc6c8614870c3e445866c20f0617a7153cab41982b451dfe9ea44478f37b884465235714623ef26a56f5ea3d1cb81767487c494d3703ab29
-
Filesize
340KB
MD5cd26fff05468657569ac06ceb2be3884
SHA1255dbc3a4cd57c573c621089192f7a6141e98889
SHA25622c52d0f04936d6b3a9cf06ca2877b564617ac3915d2cddb2ece75ce8c45e202
SHA512a2907c0750bc41fbf63c9eefe92e2ad62f81fb0b9cac95e10e6ebfca11083794712064993f4a9d95eca585bc029ed9f674f6711be881534917e598c42a32f528
-
Filesize
340KB
MD5cd26fff05468657569ac06ceb2be3884
SHA1255dbc3a4cd57c573c621089192f7a6141e98889
SHA25622c52d0f04936d6b3a9cf06ca2877b564617ac3915d2cddb2ece75ce8c45e202
SHA512a2907c0750bc41fbf63c9eefe92e2ad62f81fb0b9cac95e10e6ebfca11083794712064993f4a9d95eca585bc029ed9f674f6711be881534917e598c42a32f528
-
Filesize
340KB
MD5cd26fff05468657569ac06ceb2be3884
SHA1255dbc3a4cd57c573c621089192f7a6141e98889
SHA25622c52d0f04936d6b3a9cf06ca2877b564617ac3915d2cddb2ece75ce8c45e202
SHA512a2907c0750bc41fbf63c9eefe92e2ad62f81fb0b9cac95e10e6ebfca11083794712064993f4a9d95eca585bc029ed9f674f6711be881534917e598c42a32f528
-
Filesize
340KB
MD5cd26fff05468657569ac06ceb2be3884
SHA1255dbc3a4cd57c573c621089192f7a6141e98889
SHA25622c52d0f04936d6b3a9cf06ca2877b564617ac3915d2cddb2ece75ce8c45e202
SHA512a2907c0750bc41fbf63c9eefe92e2ad62f81fb0b9cac95e10e6ebfca11083794712064993f4a9d95eca585bc029ed9f674f6711be881534917e598c42a32f528
-
Filesize
340KB
MD5cd26fff05468657569ac06ceb2be3884
SHA1255dbc3a4cd57c573c621089192f7a6141e98889
SHA25622c52d0f04936d6b3a9cf06ca2877b564617ac3915d2cddb2ece75ce8c45e202
SHA512a2907c0750bc41fbf63c9eefe92e2ad62f81fb0b9cac95e10e6ebfca11083794712064993f4a9d95eca585bc029ed9f674f6711be881534917e598c42a32f528
-
Filesize
336B
MD54db9f8b6175722b62ececeeeba1ce307
SHA13b3ba8414706e72a6fa19e884a97b87609e11e47
SHA256d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78
SHA5121d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b