Analysis
-
max time kernel
150s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
af43871c8ff3b9603a311a1ce6a041819181432fc38c2e7cf021b1a0384f335e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
af43871c8ff3b9603a311a1ce6a041819181432fc38c2e7cf021b1a0384f335e.exe
Resource
win10v2004-20220812-en
General
-
Target
af43871c8ff3b9603a311a1ce6a041819181432fc38c2e7cf021b1a0384f335e.exe
-
Size
244KB
-
MD5
b4ba909b771d0654294c2a7c113e6571
-
SHA1
89bbbe6ae1915dffb6c2b336fd74821f1639453a
-
SHA256
af43871c8ff3b9603a311a1ce6a041819181432fc38c2e7cf021b1a0384f335e
-
SHA512
971384c02e4e39fee4102acc13a2211967b5c4733156690421215cf53352e8d8ec14f6be0d5c4e611fe91646d16729c1cd29b8bfc6f946cb6d3c9c1a1580ab46
-
SSDEEP
768:1lvMarNJJWBQwbjMPkG1VuW/wqvRXMXp677yCzdXZRT2Nq1MaQnepMri14PGBEj7:1Rl5J0lGVs4emEFbsP0
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xaoguf.exe -
Executes dropped EXE 1 IoCs
pid Process 2044 xaoguf.exe -
Loads dropped DLL 2 IoCs
pid Process 1724 af43871c8ff3b9603a311a1ce6a041819181432fc38c2e7cf021b1a0384f335e.exe 1724 af43871c8ff3b9603a311a1ce6a041819181432fc38c2e7cf021b1a0384f335e.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /Z" xaoguf.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /C" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /G" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /b" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /A" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /l" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /Y" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /s" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /h" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /N" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /u" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /p" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /k" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /T" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /L" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /m" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /F" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /O" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /U" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /g" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /M" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /a" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /t" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /W" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /Q" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /w" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /V" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /S" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /I" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /B" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /e" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /j" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /f" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /X" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /r" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /P" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /o" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /D" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /J" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /R" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /x" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /v" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /H" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /E" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /c" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /y" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /z" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /n" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /i" xaoguf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoguf = "C:\\Users\\Admin\\xaoguf.exe /d" xaoguf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe 2044 xaoguf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1724 af43871c8ff3b9603a311a1ce6a041819181432fc38c2e7cf021b1a0384f335e.exe 2044 xaoguf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2044 1724 af43871c8ff3b9603a311a1ce6a041819181432fc38c2e7cf021b1a0384f335e.exe 27 PID 1724 wrote to memory of 2044 1724 af43871c8ff3b9603a311a1ce6a041819181432fc38c2e7cf021b1a0384f335e.exe 27 PID 1724 wrote to memory of 2044 1724 af43871c8ff3b9603a311a1ce6a041819181432fc38c2e7cf021b1a0384f335e.exe 27 PID 1724 wrote to memory of 2044 1724 af43871c8ff3b9603a311a1ce6a041819181432fc38c2e7cf021b1a0384f335e.exe 27 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26 PID 2044 wrote to memory of 1724 2044 xaoguf.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\af43871c8ff3b9603a311a1ce6a041819181432fc38c2e7cf021b1a0384f335e.exe"C:\Users\Admin\AppData\Local\Temp\af43871c8ff3b9603a311a1ce6a041819181432fc38c2e7cf021b1a0384f335e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\xaoguf.exe"C:\Users\Admin\xaoguf.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD56b7b3e3096680aa379af5a9fa8d40f6c
SHA147c6f6d48e271ad40bb85d6d94551ddef86d79ce
SHA256b6677eb8aa407db953d5a6f5da8adc3145a7c7d0f327c2715da1f4f8ae7fce4e
SHA5120382be1f962751ad9bbb03ab0c267bcc7d183a83999525734fbce392fccb0dd0c98b04faff65bb53f699e2777d13851e3aef51cad3b546258a31a2e25eaf5e79
-
Filesize
244KB
MD56b7b3e3096680aa379af5a9fa8d40f6c
SHA147c6f6d48e271ad40bb85d6d94551ddef86d79ce
SHA256b6677eb8aa407db953d5a6f5da8adc3145a7c7d0f327c2715da1f4f8ae7fce4e
SHA5120382be1f962751ad9bbb03ab0c267bcc7d183a83999525734fbce392fccb0dd0c98b04faff65bb53f699e2777d13851e3aef51cad3b546258a31a2e25eaf5e79
-
Filesize
244KB
MD56b7b3e3096680aa379af5a9fa8d40f6c
SHA147c6f6d48e271ad40bb85d6d94551ddef86d79ce
SHA256b6677eb8aa407db953d5a6f5da8adc3145a7c7d0f327c2715da1f4f8ae7fce4e
SHA5120382be1f962751ad9bbb03ab0c267bcc7d183a83999525734fbce392fccb0dd0c98b04faff65bb53f699e2777d13851e3aef51cad3b546258a31a2e25eaf5e79
-
Filesize
244KB
MD56b7b3e3096680aa379af5a9fa8d40f6c
SHA147c6f6d48e271ad40bb85d6d94551ddef86d79ce
SHA256b6677eb8aa407db953d5a6f5da8adc3145a7c7d0f327c2715da1f4f8ae7fce4e
SHA5120382be1f962751ad9bbb03ab0c267bcc7d183a83999525734fbce392fccb0dd0c98b04faff65bb53f699e2777d13851e3aef51cad3b546258a31a2e25eaf5e79