Analysis
-
max time kernel
167s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:31
Static task
static1
Behavioral task
behavioral1
Sample
abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe
Resource
win7-20220812-en
General
-
Target
abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe
-
Size
604KB
-
MD5
dc25d3ac1d767c4d12879c89602acfcb
-
SHA1
53464889ff3e1792094e3ceb065539fccc82e9fe
-
SHA256
abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f
-
SHA512
45f707f1b13e36ae008ae75efc4957f1f95cf7098c520b94d6fb854c573e1a72b488a1163d55a47129bf7922fabb8dbd982a04f4d20dfff79a1f178eb896e1b4
-
SSDEEP
12288:nw0S2XJbOAWPnp98pqBlBPh1U35s2dfnRBqU/x4ySG2GR:nnhX0AooO83fdfRwU54yV
Malware Config
Extracted
darkcomet
Victim
jrusse.no-ip.org:5050
DC_MUTEX-SANCFCW
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Xl6PgidaJaTh
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
rundll32
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe -
Executes dropped EXE 2 IoCs
Processes:
msdcsc.exemsdcsc.exepid process 1660 msdcsc.exe 1956 msdcsc.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 1112 attrib.exe 436 attrib.exe -
Loads dropped DLL 3 IoCs
Processes:
abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exemsdcsc.exepid process 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe 1660 msdcsc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rundll32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rundll32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exemsdcsc.exedescription pid process target process PID 1560 set thread context of 984 1560 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe PID 1660 set thread context of 1956 1660 msdcsc.exe msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msdcsc.exepid process 1956 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeSecurityPrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeTakeOwnershipPrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeLoadDriverPrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeSystemProfilePrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeSystemtimePrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeProfSingleProcessPrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeIncBasePriorityPrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeCreatePagefilePrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeBackupPrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeRestorePrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeShutdownPrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeDebugPrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeSystemEnvironmentPrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeChangeNotifyPrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeRemoteShutdownPrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeUndockPrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeManageVolumePrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeImpersonatePrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeCreateGlobalPrivilege 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: 33 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: 34 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: 35 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe Token: SeIncreaseQuotaPrivilege 1956 msdcsc.exe Token: SeSecurityPrivilege 1956 msdcsc.exe Token: SeTakeOwnershipPrivilege 1956 msdcsc.exe Token: SeLoadDriverPrivilege 1956 msdcsc.exe Token: SeSystemProfilePrivilege 1956 msdcsc.exe Token: SeSystemtimePrivilege 1956 msdcsc.exe Token: SeProfSingleProcessPrivilege 1956 msdcsc.exe Token: SeIncBasePriorityPrivilege 1956 msdcsc.exe Token: SeCreatePagefilePrivilege 1956 msdcsc.exe Token: SeBackupPrivilege 1956 msdcsc.exe Token: SeRestorePrivilege 1956 msdcsc.exe Token: SeShutdownPrivilege 1956 msdcsc.exe Token: SeDebugPrivilege 1956 msdcsc.exe Token: SeSystemEnvironmentPrivilege 1956 msdcsc.exe Token: SeChangeNotifyPrivilege 1956 msdcsc.exe Token: SeRemoteShutdownPrivilege 1956 msdcsc.exe Token: SeUndockPrivilege 1956 msdcsc.exe Token: SeManageVolumePrivilege 1956 msdcsc.exe Token: SeImpersonatePrivilege 1956 msdcsc.exe Token: SeCreateGlobalPrivilege 1956 msdcsc.exe Token: 33 1956 msdcsc.exe Token: 34 1956 msdcsc.exe Token: 35 1956 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 1956 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exeabd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.execmd.execmd.exemsdcsc.exemsdcsc.exedescription pid process target process PID 1560 wrote to memory of 984 1560 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe PID 1560 wrote to memory of 984 1560 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe PID 1560 wrote to memory of 984 1560 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe PID 1560 wrote to memory of 984 1560 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe PID 1560 wrote to memory of 984 1560 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe PID 1560 wrote to memory of 984 1560 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe PID 1560 wrote to memory of 984 1560 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe PID 1560 wrote to memory of 984 1560 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe PID 1560 wrote to memory of 984 1560 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe PID 1560 wrote to memory of 984 1560 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe PID 1560 wrote to memory of 984 1560 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe PID 1560 wrote to memory of 984 1560 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe PID 1560 wrote to memory of 984 1560 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe PID 984 wrote to memory of 1760 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe cmd.exe PID 984 wrote to memory of 1760 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe cmd.exe PID 984 wrote to memory of 1760 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe cmd.exe PID 984 wrote to memory of 1760 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe cmd.exe PID 984 wrote to memory of 1704 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe cmd.exe PID 984 wrote to memory of 1704 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe cmd.exe PID 984 wrote to memory of 1704 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe cmd.exe PID 984 wrote to memory of 1704 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe cmd.exe PID 1760 wrote to memory of 1112 1760 cmd.exe attrib.exe PID 1760 wrote to memory of 1112 1760 cmd.exe attrib.exe PID 1760 wrote to memory of 1112 1760 cmd.exe attrib.exe PID 1760 wrote to memory of 1112 1760 cmd.exe attrib.exe PID 1704 wrote to memory of 436 1704 cmd.exe attrib.exe PID 1704 wrote to memory of 436 1704 cmd.exe attrib.exe PID 1704 wrote to memory of 436 1704 cmd.exe attrib.exe PID 1704 wrote to memory of 436 1704 cmd.exe attrib.exe PID 984 wrote to memory of 1660 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe msdcsc.exe PID 984 wrote to memory of 1660 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe msdcsc.exe PID 984 wrote to memory of 1660 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe msdcsc.exe PID 984 wrote to memory of 1660 984 abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe msdcsc.exe PID 1660 wrote to memory of 1956 1660 msdcsc.exe msdcsc.exe PID 1660 wrote to memory of 1956 1660 msdcsc.exe msdcsc.exe PID 1660 wrote to memory of 1956 1660 msdcsc.exe msdcsc.exe PID 1660 wrote to memory of 1956 1660 msdcsc.exe msdcsc.exe PID 1660 wrote to memory of 1956 1660 msdcsc.exe msdcsc.exe PID 1660 wrote to memory of 1956 1660 msdcsc.exe msdcsc.exe PID 1660 wrote to memory of 1956 1660 msdcsc.exe msdcsc.exe PID 1660 wrote to memory of 1956 1660 msdcsc.exe msdcsc.exe PID 1660 wrote to memory of 1956 1660 msdcsc.exe msdcsc.exe PID 1660 wrote to memory of 1956 1660 msdcsc.exe msdcsc.exe PID 1660 wrote to memory of 1956 1660 msdcsc.exe msdcsc.exe PID 1660 wrote to memory of 1956 1660 msdcsc.exe msdcsc.exe PID 1660 wrote to memory of 1956 1660 msdcsc.exe msdcsc.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe PID 1956 wrote to memory of 1120 1956 msdcsc.exe notepad.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 1112 attrib.exe 436 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe"C:\Users\Admin\AppData\Local\Temp\abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe"C:\Users\Admin\AppData\Local\Temp\abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f.exe" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:436 -
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\notepad.exenotepad5⤵PID:1120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
604KB
MD5dc25d3ac1d767c4d12879c89602acfcb
SHA153464889ff3e1792094e3ceb065539fccc82e9fe
SHA256abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f
SHA51245f707f1b13e36ae008ae75efc4957f1f95cf7098c520b94d6fb854c573e1a72b488a1163d55a47129bf7922fabb8dbd982a04f4d20dfff79a1f178eb896e1b4
-
Filesize
604KB
MD5dc25d3ac1d767c4d12879c89602acfcb
SHA153464889ff3e1792094e3ceb065539fccc82e9fe
SHA256abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f
SHA51245f707f1b13e36ae008ae75efc4957f1f95cf7098c520b94d6fb854c573e1a72b488a1163d55a47129bf7922fabb8dbd982a04f4d20dfff79a1f178eb896e1b4
-
Filesize
604KB
MD5dc25d3ac1d767c4d12879c89602acfcb
SHA153464889ff3e1792094e3ceb065539fccc82e9fe
SHA256abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f
SHA51245f707f1b13e36ae008ae75efc4957f1f95cf7098c520b94d6fb854c573e1a72b488a1163d55a47129bf7922fabb8dbd982a04f4d20dfff79a1f178eb896e1b4
-
Filesize
604KB
MD5dc25d3ac1d767c4d12879c89602acfcb
SHA153464889ff3e1792094e3ceb065539fccc82e9fe
SHA256abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f
SHA51245f707f1b13e36ae008ae75efc4957f1f95cf7098c520b94d6fb854c573e1a72b488a1163d55a47129bf7922fabb8dbd982a04f4d20dfff79a1f178eb896e1b4
-
Filesize
604KB
MD5dc25d3ac1d767c4d12879c89602acfcb
SHA153464889ff3e1792094e3ceb065539fccc82e9fe
SHA256abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f
SHA51245f707f1b13e36ae008ae75efc4957f1f95cf7098c520b94d6fb854c573e1a72b488a1163d55a47129bf7922fabb8dbd982a04f4d20dfff79a1f178eb896e1b4
-
Filesize
604KB
MD5dc25d3ac1d767c4d12879c89602acfcb
SHA153464889ff3e1792094e3ceb065539fccc82e9fe
SHA256abd6e01a50393d49ccf055013c9347add2a83e2e735e52aefd9fce1c9f0c868f
SHA51245f707f1b13e36ae008ae75efc4957f1f95cf7098c520b94d6fb854c573e1a72b488a1163d55a47129bf7922fabb8dbd982a04f4d20dfff79a1f178eb896e1b4