Analysis
-
max time kernel
153s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 22:22
Static task
static1
Behavioral task
behavioral1
Sample
2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe
Resource
win10v2004-20221111-en
General
-
Target
2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe
-
Size
275KB
-
MD5
6d59d1accc909953d5cd432b00f2e76c
-
SHA1
eb20fecde052bcb04d125366c17ea70c30f32122
-
SHA256
2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d
-
SHA512
50c8ee12a132d9e7803024974e9a73ceb0ef9948f64d922a80d5c8c12b9356100ab72a0d4496d1d9a35c8d70eb28f612a907636608032c03571e8afc53b19add
-
SSDEEP
6144:q3nDTWuBwEyoqMuOLOMVjHjNEy2/4moMkElP3tAi3lCCRNMxNF+:cnPWNEyoqMuAOMVjDNE/43+AYz
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" client.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\994212\\client.exe\"" client.exe -
Executes dropped EXE 9 IoCs
pid Process 1344 client.exe 388 client.exe 4300 client.exe 792 client.exe 2296 client.exe 4708 client.exe 3748 client.exe 4240 client.exe 312 client.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Luminosity Client = "\"C:\\ProgramData\\994212\\client.exe\"" client.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\clientsvr.exe client.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe client.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2644 set thread context of 3140 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 86 PID 2644 set thread context of 1320 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 90 PID 1344 set thread context of 2296 1344 client.exe 96 PID 388 set thread context of 4708 388 client.exe 97 PID 2644 set thread context of 8 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 101 PID 388 set thread context of 3748 388 client.exe 103 PID 388 set thread context of 4240 388 client.exe 112 PID 388 set thread context of 312 388 client.exe 114 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 1344 client.exe 1344 client.exe 1344 client.exe 1344 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 3140 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 3140 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 1344 client.exe 1344 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 1320 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 1320 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 1344 client.exe 1344 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 2296 client.exe 388 client.exe 388 client.exe 2296 client.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3140 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe Token: SeDebugPrivilege 1344 client.exe Token: SeDebugPrivilege 388 client.exe Token: SeDebugPrivilege 2296 client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2296 client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2644 wrote to memory of 4236 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 85 PID 2644 wrote to memory of 4236 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 85 PID 2644 wrote to memory of 4236 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 85 PID 2644 wrote to memory of 3140 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 86 PID 2644 wrote to memory of 3140 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 86 PID 2644 wrote to memory of 3140 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 86 PID 2644 wrote to memory of 3140 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 86 PID 2644 wrote to memory of 3140 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 86 PID 2644 wrote to memory of 3140 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 86 PID 2644 wrote to memory of 3140 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 86 PID 2644 wrote to memory of 3140 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 86 PID 2644 wrote to memory of 1320 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 90 PID 2644 wrote to memory of 1320 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 90 PID 2644 wrote to memory of 1320 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 90 PID 2644 wrote to memory of 1320 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 90 PID 2644 wrote to memory of 1320 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 90 PID 2644 wrote to memory of 1320 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 90 PID 2644 wrote to memory of 1320 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 90 PID 2644 wrote to memory of 1320 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 90 PID 3140 wrote to memory of 1344 3140 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 92 PID 3140 wrote to memory of 1344 3140 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 92 PID 3140 wrote to memory of 1344 3140 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 92 PID 1320 wrote to memory of 388 1320 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 93 PID 1320 wrote to memory of 388 1320 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 93 PID 1320 wrote to memory of 388 1320 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 93 PID 1344 wrote to memory of 4300 1344 client.exe 94 PID 1344 wrote to memory of 4300 1344 client.exe 94 PID 1344 wrote to memory of 4300 1344 client.exe 94 PID 1344 wrote to memory of 792 1344 client.exe 95 PID 1344 wrote to memory of 792 1344 client.exe 95 PID 1344 wrote to memory of 792 1344 client.exe 95 PID 1344 wrote to memory of 2296 1344 client.exe 96 PID 1344 wrote to memory of 2296 1344 client.exe 96 PID 1344 wrote to memory of 2296 1344 client.exe 96 PID 1344 wrote to memory of 2296 1344 client.exe 96 PID 1344 wrote to memory of 2296 1344 client.exe 96 PID 1344 wrote to memory of 2296 1344 client.exe 96 PID 1344 wrote to memory of 2296 1344 client.exe 96 PID 1344 wrote to memory of 2296 1344 client.exe 96 PID 388 wrote to memory of 4708 388 client.exe 97 PID 388 wrote to memory of 4708 388 client.exe 97 PID 388 wrote to memory of 4708 388 client.exe 97 PID 388 wrote to memory of 4708 388 client.exe 97 PID 388 wrote to memory of 4708 388 client.exe 97 PID 388 wrote to memory of 4708 388 client.exe 97 PID 388 wrote to memory of 4708 388 client.exe 97 PID 388 wrote to memory of 4708 388 client.exe 97 PID 2296 wrote to memory of 3140 2296 client.exe 86 PID 2296 wrote to memory of 3140 2296 client.exe 86 PID 2296 wrote to memory of 3140 2296 client.exe 86 PID 2296 wrote to memory of 3140 2296 client.exe 86 PID 2296 wrote to memory of 3140 2296 client.exe 86 PID 2296 wrote to memory of 2644 2296 client.exe 84 PID 2296 wrote to memory of 2644 2296 client.exe 84 PID 2296 wrote to memory of 2644 2296 client.exe 84 PID 2296 wrote to memory of 2644 2296 client.exe 84 PID 2296 wrote to memory of 2644 2296 client.exe 84 PID 2296 wrote to memory of 1344 2296 client.exe 92 PID 2296 wrote to memory of 1344 2296 client.exe 92 PID 2296 wrote to memory of 1344 2296 client.exe 92 PID 2296 wrote to memory of 1344 2296 client.exe 92 PID 2296 wrote to memory of 1344 2296 client.exe 92 PID 2644 wrote to memory of 8 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 101 PID 2644 wrote to memory of 8 2644 2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe"C:\Users\Admin\AppData\Local\Temp\2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe"C:\Users\Admin\AppData\Local\Temp\2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe"2⤵PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe"C:\Users\Admin\AppData\Local\Temp\2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\ProgramData\994212\client.exe"C:\ProgramData\994212\client.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\ProgramData\994212\client.exe"C:\ProgramData\994212\client.exe"4⤵
- Executes dropped EXE
PID:4300
-
-
C:\ProgramData\994212\client.exe"C:\ProgramData\994212\client.exe"4⤵
- Executes dropped EXE
PID:792
-
-
C:\ProgramData\994212\client.exe"C:\ProgramData\994212\client.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296
-
-
C:\ProgramData\994212\client.exe"C:\ProgramData\994212\client.exe"4⤵PID:480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe"C:\Users\Admin\AppData\Local\Temp\2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\ProgramData\994212\client.exe"C:\ProgramData\994212\client.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:388 -
C:\ProgramData\994212\client.exe"C:\ProgramData\994212\client.exe"4⤵
- Executes dropped EXE
PID:4708
-
-
C:\ProgramData\994212\client.exe"C:\ProgramData\994212\client.exe"4⤵
- Executes dropped EXE
PID:3748
-
-
C:\ProgramData\994212\client.exe"C:\ProgramData\994212\client.exe"4⤵
- Executes dropped EXE
PID:4240
-
-
C:\ProgramData\994212\client.exe"C:\ProgramData\994212\client.exe"4⤵
- Executes dropped EXE
PID:312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe"C:\Users\Admin\AppData\Local\Temp\2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe"2⤵PID:8
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD56d59d1accc909953d5cd432b00f2e76c
SHA1eb20fecde052bcb04d125366c17ea70c30f32122
SHA2562541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d
SHA51250c8ee12a132d9e7803024974e9a73ceb0ef9948f64d922a80d5c8c12b9356100ab72a0d4496d1d9a35c8d70eb28f612a907636608032c03571e8afc53b19add
-
Filesize
275KB
MD56d59d1accc909953d5cd432b00f2e76c
SHA1eb20fecde052bcb04d125366c17ea70c30f32122
SHA2562541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d
SHA51250c8ee12a132d9e7803024974e9a73ceb0ef9948f64d922a80d5c8c12b9356100ab72a0d4496d1d9a35c8d70eb28f612a907636608032c03571e8afc53b19add
-
Filesize
275KB
MD56d59d1accc909953d5cd432b00f2e76c
SHA1eb20fecde052bcb04d125366c17ea70c30f32122
SHA2562541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d
SHA51250c8ee12a132d9e7803024974e9a73ceb0ef9948f64d922a80d5c8c12b9356100ab72a0d4496d1d9a35c8d70eb28f612a907636608032c03571e8afc53b19add
-
Filesize
275KB
MD56d59d1accc909953d5cd432b00f2e76c
SHA1eb20fecde052bcb04d125366c17ea70c30f32122
SHA2562541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d
SHA51250c8ee12a132d9e7803024974e9a73ceb0ef9948f64d922a80d5c8c12b9356100ab72a0d4496d1d9a35c8d70eb28f612a907636608032c03571e8afc53b19add
-
Filesize
275KB
MD56d59d1accc909953d5cd432b00f2e76c
SHA1eb20fecde052bcb04d125366c17ea70c30f32122
SHA2562541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d
SHA51250c8ee12a132d9e7803024974e9a73ceb0ef9948f64d922a80d5c8c12b9356100ab72a0d4496d1d9a35c8d70eb28f612a907636608032c03571e8afc53b19add
-
Filesize
275KB
MD56d59d1accc909953d5cd432b00f2e76c
SHA1eb20fecde052bcb04d125366c17ea70c30f32122
SHA2562541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d
SHA51250c8ee12a132d9e7803024974e9a73ceb0ef9948f64d922a80d5c8c12b9356100ab72a0d4496d1d9a35c8d70eb28f612a907636608032c03571e8afc53b19add
-
Filesize
275KB
MD56d59d1accc909953d5cd432b00f2e76c
SHA1eb20fecde052bcb04d125366c17ea70c30f32122
SHA2562541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d
SHA51250c8ee12a132d9e7803024974e9a73ceb0ef9948f64d922a80d5c8c12b9356100ab72a0d4496d1d9a35c8d70eb28f612a907636608032c03571e8afc53b19add
-
Filesize
275KB
MD56d59d1accc909953d5cd432b00f2e76c
SHA1eb20fecde052bcb04d125366c17ea70c30f32122
SHA2562541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d
SHA51250c8ee12a132d9e7803024974e9a73ceb0ef9948f64d922a80d5c8c12b9356100ab72a0d4496d1d9a35c8d70eb28f612a907636608032c03571e8afc53b19add
-
Filesize
275KB
MD56d59d1accc909953d5cd432b00f2e76c
SHA1eb20fecde052bcb04d125366c17ea70c30f32122
SHA2562541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d
SHA51250c8ee12a132d9e7803024974e9a73ceb0ef9948f64d922a80d5c8c12b9356100ab72a0d4496d1d9a35c8d70eb28f612a907636608032c03571e8afc53b19add
-
Filesize
275KB
MD56d59d1accc909953d5cd432b00f2e76c
SHA1eb20fecde052bcb04d125366c17ea70c30f32122
SHA2562541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d
SHA51250c8ee12a132d9e7803024974e9a73ceb0ef9948f64d922a80d5c8c12b9356100ab72a0d4496d1d9a35c8d70eb28f612a907636608032c03571e8afc53b19add
-
Filesize
275KB
MD56d59d1accc909953d5cd432b00f2e76c
SHA1eb20fecde052bcb04d125366c17ea70c30f32122
SHA2562541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d
SHA51250c8ee12a132d9e7803024974e9a73ceb0ef9948f64d922a80d5c8c12b9356100ab72a0d4496d1d9a35c8d70eb28f612a907636608032c03571e8afc53b19add
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe.log
Filesize500B
MD5673ef491588c73b520d013da6ae85912
SHA1dbe04459ce24d5716fdc02a66c231b4e87e44382
SHA256454e88ef63bf571defaf3d8d392f286cf3d58907e3b721a7ed2cd6ad0ce63b29
SHA512bb23d78e31cdd6edf91d1de9b229537f74244a35e8cbe0949ee7a54ca124962c34bf7638ae0d63947c9e2a067c246e65bb83bea74e69bbb859a21f6f587d1e39
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\2541c264f978c2a42ff31696ee4290a9c1a0e18c6734fda36736692bb514205d.exe.log
Filesize500B
MD5673ef491588c73b520d013da6ae85912
SHA1dbe04459ce24d5716fdc02a66c231b4e87e44382
SHA256454e88ef63bf571defaf3d8d392f286cf3d58907e3b721a7ed2cd6ad0ce63b29
SHA512bb23d78e31cdd6edf91d1de9b229537f74244a35e8cbe0949ee7a54ca124962c34bf7638ae0d63947c9e2a067c246e65bb83bea74e69bbb859a21f6f587d1e39
-
Filesize
500B
MD5673ef491588c73b520d013da6ae85912
SHA1dbe04459ce24d5716fdc02a66c231b4e87e44382
SHA256454e88ef63bf571defaf3d8d392f286cf3d58907e3b721a7ed2cd6ad0ce63b29
SHA512bb23d78e31cdd6edf91d1de9b229537f74244a35e8cbe0949ee7a54ca124962c34bf7638ae0d63947c9e2a067c246e65bb83bea74e69bbb859a21f6f587d1e39