Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:38
Static task
static1
Behavioral task
behavioral1
Sample
d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe
Resource
win10v2004-20220812-en
General
-
Target
d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe
-
Size
834KB
-
MD5
b1c50a7fc4f9065eb4d146e99b3ba8c9
-
SHA1
e05cae1327a90d4758c55a82dace360a71ae878c
-
SHA256
d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199
-
SHA512
8f3a1647be8d5a962e555be12f9f03da897d8b67d404c4b15cde4565662d129384f8bb882cd384a7e2bced0e7b885520f040896216f7f10e95399da2f75c8178
-
SSDEEP
12288:p+yR54BjPCAmvE6R71Ti/AAyvQo4ypD6tfn+60XhD14H/ZEg3Mk5RHdYO6IWsl:p+dBirR7hP4oFx69+Dx54REXk5R9YUl
Malware Config
Extracted
darkcomet
Victims
mrchbk.noip.me:2123
DC_MUTEX-EZ6YFTY
-
gencode
4FUM8Qy2Ej7F
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
IpOverUsbSvrc.exeAcctres.exeIpOverUsbSvrc.exepid process 304 IpOverUsbSvrc.exe 240 Acctres.exe 1016 IpOverUsbSvrc.exe -
Loads dropped DLL 2 IoCs
Processes:
d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exeIpOverUsbSvrc.exepid process 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 304 IpOverUsbSvrc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
IpOverUsbSvrc.exeIpOverUsbSvrc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Multimedia Class Scheduler = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IpOverUsbSvrc.exe" IpOverUsbSvrc.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Multimedia Class Scheduler = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IpOverUsbSvrc.exe" IpOverUsbSvrc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exeAcctres.exedescription pid process target process PID 1416 set thread context of 1524 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe vbc.exe PID 240 set thread context of 788 240 Acctres.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exeIpOverUsbSvrc.exeAcctres.exepid process 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 304 IpOverUsbSvrc.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 304 IpOverUsbSvrc.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 304 IpOverUsbSvrc.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 304 IpOverUsbSvrc.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 304 IpOverUsbSvrc.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 304 IpOverUsbSvrc.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 240 Acctres.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 240 Acctres.exe 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe 240 Acctres.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
Processes:
d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exevbc.exeIpOverUsbSvrc.exeAcctres.exevbc.exeIpOverUsbSvrc.exedescription pid process Token: SeDebugPrivilege 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe Token: SeIncreaseQuotaPrivilege 1524 vbc.exe Token: SeSecurityPrivilege 1524 vbc.exe Token: SeTakeOwnershipPrivilege 1524 vbc.exe Token: SeLoadDriverPrivilege 1524 vbc.exe Token: SeSystemProfilePrivilege 1524 vbc.exe Token: SeSystemtimePrivilege 1524 vbc.exe Token: SeProfSingleProcessPrivilege 1524 vbc.exe Token: SeIncBasePriorityPrivilege 1524 vbc.exe Token: SeCreatePagefilePrivilege 1524 vbc.exe Token: SeBackupPrivilege 1524 vbc.exe Token: SeRestorePrivilege 1524 vbc.exe Token: SeShutdownPrivilege 1524 vbc.exe Token: SeDebugPrivilege 1524 vbc.exe Token: SeSystemEnvironmentPrivilege 1524 vbc.exe Token: SeChangeNotifyPrivilege 1524 vbc.exe Token: SeRemoteShutdownPrivilege 1524 vbc.exe Token: SeUndockPrivilege 1524 vbc.exe Token: SeManageVolumePrivilege 1524 vbc.exe Token: SeImpersonatePrivilege 1524 vbc.exe Token: SeCreateGlobalPrivilege 1524 vbc.exe Token: 33 1524 vbc.exe Token: 34 1524 vbc.exe Token: 35 1524 vbc.exe Token: SeDebugPrivilege 304 IpOverUsbSvrc.exe Token: SeDebugPrivilege 240 Acctres.exe Token: SeIncreaseQuotaPrivilege 788 vbc.exe Token: SeSecurityPrivilege 788 vbc.exe Token: SeTakeOwnershipPrivilege 788 vbc.exe Token: SeLoadDriverPrivilege 788 vbc.exe Token: SeSystemProfilePrivilege 788 vbc.exe Token: SeSystemtimePrivilege 788 vbc.exe Token: SeProfSingleProcessPrivilege 788 vbc.exe Token: SeIncBasePriorityPrivilege 788 vbc.exe Token: SeCreatePagefilePrivilege 788 vbc.exe Token: SeBackupPrivilege 788 vbc.exe Token: SeRestorePrivilege 788 vbc.exe Token: SeShutdownPrivilege 788 vbc.exe Token: SeDebugPrivilege 788 vbc.exe Token: SeSystemEnvironmentPrivilege 788 vbc.exe Token: SeChangeNotifyPrivilege 788 vbc.exe Token: SeRemoteShutdownPrivilege 788 vbc.exe Token: SeUndockPrivilege 788 vbc.exe Token: SeManageVolumePrivilege 788 vbc.exe Token: SeImpersonatePrivilege 788 vbc.exe Token: SeCreateGlobalPrivilege 788 vbc.exe Token: 33 788 vbc.exe Token: 34 788 vbc.exe Token: 35 788 vbc.exe Token: SeDebugPrivilege 1016 IpOverUsbSvrc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vbc.exepid process 1524 vbc.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exeIpOverUsbSvrc.exeAcctres.exedescription pid process target process PID 1416 wrote to memory of 1524 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe vbc.exe PID 1416 wrote to memory of 1524 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe vbc.exe PID 1416 wrote to memory of 1524 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe vbc.exe PID 1416 wrote to memory of 1524 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe vbc.exe PID 1416 wrote to memory of 1524 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe vbc.exe PID 1416 wrote to memory of 1524 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe vbc.exe PID 1416 wrote to memory of 1524 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe vbc.exe PID 1416 wrote to memory of 1524 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe vbc.exe PID 1416 wrote to memory of 1524 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe vbc.exe PID 1416 wrote to memory of 1524 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe vbc.exe PID 1416 wrote to memory of 1524 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe vbc.exe PID 1416 wrote to memory of 1524 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe vbc.exe PID 1416 wrote to memory of 1524 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe vbc.exe PID 1416 wrote to memory of 304 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe IpOverUsbSvrc.exe PID 1416 wrote to memory of 304 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe IpOverUsbSvrc.exe PID 1416 wrote to memory of 304 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe IpOverUsbSvrc.exe PID 1416 wrote to memory of 304 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe IpOverUsbSvrc.exe PID 304 wrote to memory of 240 304 IpOverUsbSvrc.exe Acctres.exe PID 304 wrote to memory of 240 304 IpOverUsbSvrc.exe Acctres.exe PID 304 wrote to memory of 240 304 IpOverUsbSvrc.exe Acctres.exe PID 304 wrote to memory of 240 304 IpOverUsbSvrc.exe Acctres.exe PID 1416 wrote to memory of 1016 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe IpOverUsbSvrc.exe PID 1416 wrote to memory of 1016 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe IpOverUsbSvrc.exe PID 1416 wrote to memory of 1016 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe IpOverUsbSvrc.exe PID 1416 wrote to memory of 1016 1416 d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe IpOverUsbSvrc.exe PID 240 wrote to memory of 788 240 Acctres.exe vbc.exe PID 240 wrote to memory of 788 240 Acctres.exe vbc.exe PID 240 wrote to memory of 788 240 Acctres.exe vbc.exe PID 240 wrote to memory of 788 240 Acctres.exe vbc.exe PID 240 wrote to memory of 788 240 Acctres.exe vbc.exe PID 240 wrote to memory of 788 240 Acctres.exe vbc.exe PID 240 wrote to memory of 788 240 Acctres.exe vbc.exe PID 240 wrote to memory of 788 240 Acctres.exe vbc.exe PID 240 wrote to memory of 788 240 Acctres.exe vbc.exe PID 240 wrote to memory of 788 240 Acctres.exe vbc.exe PID 240 wrote to memory of 788 240 Acctres.exe vbc.exe PID 240 wrote to memory of 788 240 Acctres.exe vbc.exe PID 240 wrote to memory of 788 240 Acctres.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe"C:\Users\Admin\AppData\Local\Temp\d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1524 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:788 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
834KB
MD5b1c50a7fc4f9065eb4d146e99b3ba8c9
SHA1e05cae1327a90d4758c55a82dace360a71ae878c
SHA256d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199
SHA5128f3a1647be8d5a962e555be12f9f03da897d8b67d404c4b15cde4565662d129384f8bb882cd384a7e2bced0e7b885520f040896216f7f10e95399da2f75c8178
-
Filesize
834KB
MD5b1c50a7fc4f9065eb4d146e99b3ba8c9
SHA1e05cae1327a90d4758c55a82dace360a71ae878c
SHA256d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199
SHA5128f3a1647be8d5a962e555be12f9f03da897d8b67d404c4b15cde4565662d129384f8bb882cd384a7e2bced0e7b885520f040896216f7f10e95399da2f75c8178
-
Filesize
17KB
MD5fd03ff313a655e0b59dce81044bc6341
SHA10fa0dc26876f636956c3de82685bdbbc8ad3ef86
SHA2561f1c8c1458eaee47a448513db52ddb536406146d48793c3c24f41eb72b13cec9
SHA51200fdf54987cb8abd0c68619e02991aeb50e5509ea56b0e5fa613ac29fddcc57c585cd0e5be055cb5c6563828b6a631666fe6e7004dada7607ddd903659264ddd
-
Filesize
17KB
MD5fd03ff313a655e0b59dce81044bc6341
SHA10fa0dc26876f636956c3de82685bdbbc8ad3ef86
SHA2561f1c8c1458eaee47a448513db52ddb536406146d48793c3c24f41eb72b13cec9
SHA51200fdf54987cb8abd0c68619e02991aeb50e5509ea56b0e5fa613ac29fddcc57c585cd0e5be055cb5c6563828b6a631666fe6e7004dada7607ddd903659264ddd
-
Filesize
17KB
MD5fd03ff313a655e0b59dce81044bc6341
SHA10fa0dc26876f636956c3de82685bdbbc8ad3ef86
SHA2561f1c8c1458eaee47a448513db52ddb536406146d48793c3c24f41eb72b13cec9
SHA51200fdf54987cb8abd0c68619e02991aeb50e5509ea56b0e5fa613ac29fddcc57c585cd0e5be055cb5c6563828b6a631666fe6e7004dada7607ddd903659264ddd
-
Filesize
834KB
MD5b1c50a7fc4f9065eb4d146e99b3ba8c9
SHA1e05cae1327a90d4758c55a82dace360a71ae878c
SHA256d6dd2afabd3a2da675d616501c668af3ae6ed9951ff5507f5b283399b8c94199
SHA5128f3a1647be8d5a962e555be12f9f03da897d8b67d404c4b15cde4565662d129384f8bb882cd384a7e2bced0e7b885520f040896216f7f10e95399da2f75c8178
-
Filesize
17KB
MD5fd03ff313a655e0b59dce81044bc6341
SHA10fa0dc26876f636956c3de82685bdbbc8ad3ef86
SHA2561f1c8c1458eaee47a448513db52ddb536406146d48793c3c24f41eb72b13cec9
SHA51200fdf54987cb8abd0c68619e02991aeb50e5509ea56b0e5fa613ac29fddcc57c585cd0e5be055cb5c6563828b6a631666fe6e7004dada7607ddd903659264ddd