Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
cfe78702781aad83f03ac8d4c475561f990e4b33a4688301f3c2d729a8f6fbe3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cfe78702781aad83f03ac8d4c475561f990e4b33a4688301f3c2d729a8f6fbe3.exe
Resource
win10v2004-20220812-en
General
-
Target
cfe78702781aad83f03ac8d4c475561f990e4b33a4688301f3c2d729a8f6fbe3.exe
-
Size
507KB
-
MD5
aa644e4ba71f99c7ab5d622a26f95d73
-
SHA1
857d5aed4e0db38460bb27a99dcd0ed602ae5d91
-
SHA256
cfe78702781aad83f03ac8d4c475561f990e4b33a4688301f3c2d729a8f6fbe3
-
SHA512
ab3a4d387a92c61731317394bdb8c14ce5160e6211ab892f30973ab28d8198102da8de37fa6283492b4adfa495bb108de032c540d546e195da67102d9e1800e5
-
SSDEEP
6144:PUrqA3AheuswyPnsfbRoTUvF8GBKcBfq2qJYCh5Flpo/u:PUWA3AheuswyU5vaGLf7qJb7po/u
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3288 svchost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cfe78702781aad83f03ac8d4c475561f990e4b33a4688301f3c2d729a8f6fbe3.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Reader Speed Launcher = "C:\\Users\\Admin\\Application Data\\Adobe\\reader_sl.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cfe78702781aad83f03ac8d4c475561f990e4b33a4688301f3c2d729a8f6fbe3.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4956 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1756 wrote to memory of 3288 1756 cfe78702781aad83f03ac8d4c475561f990e4b33a4688301f3c2d729a8f6fbe3.exe 81 PID 1756 wrote to memory of 3288 1756 cfe78702781aad83f03ac8d4c475561f990e4b33a4688301f3c2d729a8f6fbe3.exe 81 PID 1756 wrote to memory of 3288 1756 cfe78702781aad83f03ac8d4c475561f990e4b33a4688301f3c2d729a8f6fbe3.exe 81 PID 1756 wrote to memory of 4956 1756 cfe78702781aad83f03ac8d4c475561f990e4b33a4688301f3c2d729a8f6fbe3.exe 82 PID 1756 wrote to memory of 4956 1756 cfe78702781aad83f03ac8d4c475561f990e4b33a4688301f3c2d729a8f6fbe3.exe 82 PID 1756 wrote to memory of 4956 1756 cfe78702781aad83f03ac8d4c475561f990e4b33a4688301f3c2d729a8f6fbe3.exe 82 PID 3288 wrote to memory of 4876 3288 svchost.exe 83 PID 3288 wrote to memory of 4876 3288 svchost.exe 83 PID 3288 wrote to memory of 4876 3288 svchost.exe 83 PID 4956 wrote to memory of 384 4956 AcroRd32.exe 85 PID 4956 wrote to memory of 384 4956 AcroRd32.exe 85 PID 4956 wrote to memory of 384 4956 AcroRd32.exe 85 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 4088 384 RdrCEF.exe 88 PID 384 wrote to memory of 240 384 RdrCEF.exe 89 PID 384 wrote to memory of 240 384 RdrCEF.exe 89 PID 384 wrote to memory of 240 384 RdrCEF.exe 89 PID 384 wrote to memory of 240 384 RdrCEF.exe 89 PID 384 wrote to memory of 240 384 RdrCEF.exe 89 PID 384 wrote to memory of 240 384 RdrCEF.exe 89 PID 384 wrote to memory of 240 384 RdrCEF.exe 89 PID 384 wrote to memory of 240 384 RdrCEF.exe 89 PID 384 wrote to memory of 240 384 RdrCEF.exe 89 PID 384 wrote to memory of 240 384 RdrCEF.exe 89 PID 384 wrote to memory of 240 384 RdrCEF.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfe78702781aad83f03ac8d4c475561f990e4b33a4688301f3c2d729a8f6fbe3.exe"C:\Users\Admin\AppData\Local\Temp\cfe78702781aad83f03ac8d4c475561f990e4b33a4688301f3c2d729a8f6fbe3.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Adobe Reader Speed Launcher" /d "C:\Users\Admin\Application Data\Adobe\reader_sl.exe" /f3⤵
- Adds Run key to start application
PID:4876
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1206.pdf"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=07C85E494703D5260BD25F1AF0DC1F15 --mojo-platform-channel-handle=1792 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4088
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=40920091262C8B23913DDA13DE99484E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=40920091262C8B23913DDA13DE99484E --renderer-client-id=2 --mojo-platform-channel-handle=1808 --allow-no-sandbox-job /prefetch:14⤵PID:240
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BEE6E74EE32FA282B8F68D64AF444E5F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BEE6E74EE32FA282B8F68D64AF444E5F --renderer-client-id=4 --mojo-platform-channel-handle=2116 --allow-no-sandbox-job /prefetch:14⤵PID:3560
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=36F81E29A74600E713C714774D1BA360 --mojo-platform-channel-handle=2364 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4908
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=49AAE5EDB894E5886DFE232E01D1BC67 --mojo-platform-channel-handle=2632 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:436
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C9812F707C026B456EA21D674CF50EFB --mojo-platform-channel-handle=1792 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2712
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD54bacd0d1ccd599afee9bf387199da79a
SHA107937a11930bb7dca52caed529706ced320431e5
SHA2561673398cbf0597a914bccb491458d16c3941fc729f9b0f558f9a2a8a998f98e8
SHA51299f5e28a4acfbdd1f36ff21094df9a3ecbbf4b1de2ff536a449ca370135fa45da3cb9c2144f247e34f5037165e16b31976f7343364a54cb3126f8a9e02dec75b
-
Filesize
8KB
MD50edda97120f308402b2aa96ad4efa91c
SHA1a216d99058a13c94ba0e9d87ede846e6ed8b665d
SHA256ea70f7606d4565af4f06f0c3760cbde976976939cab63c4be8b51ca2c0888e15
SHA512ecff665d539f62aca094bdf5ee53e0f666d5b95e185f37cfec83934c8231208031de1fc951b190179f4b30aa2deb08a3c19a88f16cdb339e3c357c3a954ac2a6
-
Filesize
8KB
MD50edda97120f308402b2aa96ad4efa91c
SHA1a216d99058a13c94ba0e9d87ede846e6ed8b665d
SHA256ea70f7606d4565af4f06f0c3760cbde976976939cab63c4be8b51ca2c0888e15
SHA512ecff665d539f62aca094bdf5ee53e0f666d5b95e185f37cfec83934c8231208031de1fc951b190179f4b30aa2deb08a3c19a88f16cdb339e3c357c3a954ac2a6