Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe
Resource
win7-20220812-en
General
-
Target
173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe
-
Size
657KB
-
MD5
a858512eec8ab0a31e7ce36d59d7531d
-
SHA1
2b71be5583c95ed3d689b301a655d9c1f4d2a87b
-
SHA256
173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf
-
SHA512
c156958c3b0204ed186f734f668ee4f28f23b6dacfa09092f2cd10cfe8ded04179300b0b1dede3f68f3c2b7e95866abcaf7f938be1ed9f22aa28cd8dd4e3196f
-
SSDEEP
12288:pAVfb2seNOvvBBcXoFYrMc9nb5B0yIbKlJfKYO7:pAICBxc9ndB0dKJfU
Malware Config
Extracted
nanocore
1.2.1.1
epicryan449.duckdns.org:9033
b1f0650b-c862-4cf6-a847-7eebce7241a0
-
activate_away_mode
true
- backup_connection_host
- backup_dns_server
-
buffer_size
65535
-
build_time
2014-11-06T01:35:23.092012636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
9033
-
default_group
TMC H1Z1
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
b1f0650b-c862-4cf6-a847-7eebce7241a0
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
epicryan449.duckdns.org
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.1.1
-
wan_timeout
8000
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svhostsmicrosoft\\svhostssearch.exe" reg.exe -
Executes dropped EXE 4 IoCs
pid Process 3552 svhost.exe 3992 svhostssearch.exe 1480 svhost.exe 1740 svhostssearch.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3736 set thread context of 3552 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 84 PID 3992 set thread context of 1480 3992 svhostssearch.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 3 IoCs
pid Process 2164 timeout.exe 1956 timeout.exe 1908 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1684 tasklist.exe 2868 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 3552 svhost.exe 3552 svhost.exe 3552 svhost.exe 3552 svhost.exe 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 3552 svhost.exe 3552 svhost.exe 3552 svhost.exe 3552 svhost.exe 3552 svhost.exe 3552 svhost.exe 3992 svhostssearch.exe 3992 svhostssearch.exe 3992 svhostssearch.exe 3992 svhostssearch.exe 3992 svhostssearch.exe 3992 svhostssearch.exe 1740 svhostssearch.exe 1740 svhostssearch.exe 1740 svhostssearch.exe 1740 svhostssearch.exe 1740 svhostssearch.exe 1740 svhostssearch.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3552 svhost.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe Token: 33 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe Token: SeIncBasePriorityPrivilege 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe Token: SeDebugPrivilege 3552 svhost.exe Token: SeDebugPrivilege 1684 tasklist.exe Token: SeDebugPrivilege 3992 svhostssearch.exe Token: 33 3992 svhostssearch.exe Token: SeIncBasePriorityPrivilege 3992 svhostssearch.exe Token: SeDebugPrivilege 2868 tasklist.exe Token: SeDebugPrivilege 1740 svhostssearch.exe Token: 33 1740 svhostssearch.exe Token: SeIncBasePriorityPrivilege 1740 svhostssearch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 2348 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 82 PID 3736 wrote to memory of 2348 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 82 PID 3736 wrote to memory of 2348 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 82 PID 3736 wrote to memory of 3552 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 84 PID 3736 wrote to memory of 3552 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 84 PID 3736 wrote to memory of 3552 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 84 PID 3736 wrote to memory of 3552 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 84 PID 3736 wrote to memory of 3552 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 84 PID 3736 wrote to memory of 3552 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 84 PID 3736 wrote to memory of 3552 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 84 PID 3736 wrote to memory of 3552 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 84 PID 2348 wrote to memory of 3304 2348 cmd.exe 85 PID 2348 wrote to memory of 3304 2348 cmd.exe 85 PID 2348 wrote to memory of 3304 2348 cmd.exe 85 PID 3304 wrote to memory of 1368 3304 wscript.exe 86 PID 3304 wrote to memory of 1368 3304 wscript.exe 86 PID 3304 wrote to memory of 1368 3304 wscript.exe 86 PID 1368 wrote to memory of 3652 1368 cmd.exe 88 PID 1368 wrote to memory of 3652 1368 cmd.exe 88 PID 1368 wrote to memory of 3652 1368 cmd.exe 88 PID 3736 wrote to memory of 3496 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 89 PID 3736 wrote to memory of 3496 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 89 PID 3736 wrote to memory of 3496 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 89 PID 3736 wrote to memory of 2208 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 91 PID 3736 wrote to memory of 2208 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 91 PID 3736 wrote to memory of 2208 3736 173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe 91 PID 3496 wrote to memory of 2164 3496 cmd.exe 93 PID 3496 wrote to memory of 2164 3496 cmd.exe 93 PID 3496 wrote to memory of 2164 3496 cmd.exe 93 PID 3496 wrote to memory of 1684 3496 cmd.exe 102 PID 3496 wrote to memory of 1684 3496 cmd.exe 102 PID 3496 wrote to memory of 1684 3496 cmd.exe 102 PID 3496 wrote to memory of 752 3496 cmd.exe 103 PID 3496 wrote to memory of 752 3496 cmd.exe 103 PID 3496 wrote to memory of 752 3496 cmd.exe 103 PID 3496 wrote to memory of 3992 3496 cmd.exe 104 PID 3496 wrote to memory of 3992 3496 cmd.exe 104 PID 3496 wrote to memory of 3992 3496 cmd.exe 104 PID 3992 wrote to memory of 1480 3992 svhostssearch.exe 105 PID 3992 wrote to memory of 1480 3992 svhostssearch.exe 105 PID 3992 wrote to memory of 1480 3992 svhostssearch.exe 105 PID 3992 wrote to memory of 1480 3992 svhostssearch.exe 105 PID 3992 wrote to memory of 1480 3992 svhostssearch.exe 105 PID 3992 wrote to memory of 1480 3992 svhostssearch.exe 105 PID 3992 wrote to memory of 1480 3992 svhostssearch.exe 105 PID 3992 wrote to memory of 1480 3992 svhostssearch.exe 105 PID 3496 wrote to memory of 1956 3496 cmd.exe 106 PID 3496 wrote to memory of 1956 3496 cmd.exe 106 PID 3496 wrote to memory of 1956 3496 cmd.exe 106 PID 3496 wrote to memory of 2868 3496 cmd.exe 107 PID 3496 wrote to memory of 2868 3496 cmd.exe 107 PID 3496 wrote to memory of 2868 3496 cmd.exe 107 PID 3496 wrote to memory of 4108 3496 cmd.exe 108 PID 3496 wrote to memory of 4108 3496 cmd.exe 108 PID 3496 wrote to memory of 4108 3496 cmd.exe 108 PID 3496 wrote to memory of 1740 3496 cmd.exe 109 PID 3496 wrote to memory of 1740 3496 cmd.exe 109 PID 3496 wrote to memory of 1740 3496 cmd.exe 109 PID 1740 wrote to memory of 3220 1740 svhostssearch.exe 110 PID 1740 wrote to memory of 3220 1740 svhostssearch.exe 110 PID 1740 wrote to memory of 3220 1740 svhostssearch.exe 110 PID 3496 wrote to memory of 1908 3496 cmd.exe 111 PID 3496 wrote to memory of 1908 3496 cmd.exe 111 PID 3496 wrote to memory of 1908 3496 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe"C:\Users\Admin\AppData\Local\Temp\173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\svhostsmicrosoft\mata.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\svhostsmicrosoft\invs.vbs" "C:\Users\Admin\AppData\Local\Temp\svhostsmicrosoft\mata2.bat"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\svhostsmicrosoft\mata2.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\svhostsmicrosoft\svhostssearch.exe" /f5⤵
- Modifies WinLogon for persistence
PID:3652
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exeC:\Users\Admin\AppData\Local\Temp\svhost.exe2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\svhostsmicrosoft\svhost.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\timeout.exetimeout /t 603⤵
- Delays execution with timeout.exe
PID:2164
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq svhost .exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\SysWOW64\find.exefind /i "svhost .exe"3⤵PID:752
-
-
C:\Users\Admin\AppData\Local\Temp\svhostsmicrosoft\svhostssearch.exe"C:\Users\Admin\AppData\Local\Temp\svhostsmicrosoft\svhostssearch.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\svhost.exeC:\Users\Admin\AppData\Local\Temp\svhost.exe4⤵
- Executes dropped EXE
PID:1480
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 603⤵
- Delays execution with timeout.exe
PID:1956
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq svhost .exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\SysWOW64\find.exefind /i "svhost .exe"3⤵PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\svhostsmicrosoft\svhostssearch.exe"C:\Users\Admin\AppData\Local\Temp\svhostsmicrosoft\svhostssearch.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\svhost.exeC:\Users\Admin\AppData\Local\Temp\svhost.exe4⤵PID:3220
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 603⤵
- Delays execution with timeout.exe
PID:1908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\svhostsmicrosoft\melt.bat2⤵PID:2208
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD542157868488d3ef98c00e3fa12f064be
SHA1aad391be9ac3f6ce1ced49583690486a5f4186fb
SHA256b9520170e84597186ba5cc223b9c2773f70d0cda088950bae2182e3b2237995c
SHA5128f4a4bd63ceefc34158ea23f3a73dcc2848eeacdba8355d1251a96b4e0c18e2f3b0c4939be359f874f81fe4ee63283b8be43a70fe2dbaa2e64784333d10a2471
-
Filesize
52KB
MD5a64daca3cfbcd039df3ec29d3eddd001
SHA1eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3
SHA256403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36
SHA512b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479
-
Filesize
52KB
MD5a64daca3cfbcd039df3ec29d3eddd001
SHA1eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3
SHA256403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36
SHA512b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479
-
Filesize
52KB
MD5a64daca3cfbcd039df3ec29d3eddd001
SHA1eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3
SHA256403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36
SHA512b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479
-
Filesize
78B
MD5c578d9653b22800c3eb6b6a51219bbb8
SHA1a97aa251901bbe179a48dbc7a0c1872e163b1f2d
SHA25620a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2
SHA5123ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d
-
Filesize
82B
MD52c7d21e7ac49249e23d1a91a83c1a117
SHA1ca11bfaf886edd2c77eb4c440ef0a54d984ca07c
SHA25652d6a82bc1f08c80619e5ac68c8517466886e4045d228f1a2762db49976cd11f
SHA512d57ecffeb49fd17663c0c3168ca55187cda28e51cd1296bd26c40c5b01e9e172ee9b6c13332f69f435b320300af496f207c54243eb531f0191f09205bcb84764
-
Filesize
294B
MD5ba3d759c93b10c70c9ea03f2d30f2611
SHA156cebe93e9b86170278949de110cbb2859546a11
SHA256b4bdb5460bbc0099583aba3b380478774e8e5eb2974127e68218464ba1734cd7
SHA512289e931fac98010e88cd85592c68ea0241b5daedc9096d660169016ee8165173cf18f92e0b4a4c591cb64c761420cb3002cb0532ba5e5a7e6822f3ba522206c4
-
Filesize
120B
MD5f87fe72b74786539d6a70c63f85bf973
SHA1b150a8c33a65290fa0a5252409736898219d1171
SHA256c9070426f2e2cb970017ff252a7a3041cf2e157f1023e216ab617ad833f0471a
SHA512cfec863872b8c7e824a3ed5565b6522d310c63f7623f64a4ade389e5c21f9b237005bee8bef449e3871812b938253100e5f735749f10e461b4c92674b3e20749
-
Filesize
223B
MD5be7ec99689ca0530f7875ddce6455ab0
SHA102c6ce3ed72083ec72de5f1db73605a50879581b
SHA25671bd9af72ece6513e9869eb1376d9d3ccfd69f808ac50cb8f2a87bd41835a62d
SHA512b8576fc4f0a6e70076e0c01269b9bf250f9de57f8a29c3cdad34a57982e2a5c2621928b8046f2a68acdd36d7d849ba1e067892cc7a473b07a0c4b9b35965624a
-
Filesize
223B
MD5be7ec99689ca0530f7875ddce6455ab0
SHA102c6ce3ed72083ec72de5f1db73605a50879581b
SHA25671bd9af72ece6513e9869eb1376d9d3ccfd69f808ac50cb8f2a87bd41835a62d
SHA512b8576fc4f0a6e70076e0c01269b9bf250f9de57f8a29c3cdad34a57982e2a5c2621928b8046f2a68acdd36d7d849ba1e067892cc7a473b07a0c4b9b35965624a
-
Filesize
223B
MD5be7ec99689ca0530f7875ddce6455ab0
SHA102c6ce3ed72083ec72de5f1db73605a50879581b
SHA25671bd9af72ece6513e9869eb1376d9d3ccfd69f808ac50cb8f2a87bd41835a62d
SHA512b8576fc4f0a6e70076e0c01269b9bf250f9de57f8a29c3cdad34a57982e2a5c2621928b8046f2a68acdd36d7d849ba1e067892cc7a473b07a0c4b9b35965624a
-
Filesize
657KB
MD5a858512eec8ab0a31e7ce36d59d7531d
SHA12b71be5583c95ed3d689b301a655d9c1f4d2a87b
SHA256173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf
SHA512c156958c3b0204ed186f734f668ee4f28f23b6dacfa09092f2cd10cfe8ded04179300b0b1dede3f68f3c2b7e95866abcaf7f938be1ed9f22aa28cd8dd4e3196f
-
Filesize
657KB
MD5a858512eec8ab0a31e7ce36d59d7531d
SHA12b71be5583c95ed3d689b301a655d9c1f4d2a87b
SHA256173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf
SHA512c156958c3b0204ed186f734f668ee4f28f23b6dacfa09092f2cd10cfe8ded04179300b0b1dede3f68f3c2b7e95866abcaf7f938be1ed9f22aa28cd8dd4e3196f
-
Filesize
657KB
MD5a858512eec8ab0a31e7ce36d59d7531d
SHA12b71be5583c95ed3d689b301a655d9c1f4d2a87b
SHA256173c0f122944b95a048f528c1fb2c96e86c5e44bd7f3413099fe8f139d42aecf
SHA512c156958c3b0204ed186f734f668ee4f28f23b6dacfa09092f2cd10cfe8ded04179300b0b1dede3f68f3c2b7e95866abcaf7f938be1ed9f22aa28cd8dd4e3196f