Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe
Resource
win10v2004-20220812-en
General
-
Target
daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe
-
Size
304KB
-
MD5
f1e2d367c882743bebe8ded342cc96ef
-
SHA1
fc539c9ae3c551016972c076ac7e383eba19d39c
-
SHA256
daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562
-
SHA512
a4b79212d2cac5ba77d1ed9399f19cd34cca702d4397430cdb26589ebe11fdaf1e82cb033849ba12103d6a806f6283d1037d1e98db649d122c2dc4748e02a889
-
SSDEEP
3072:AfUCvhQ/LMe3gBk3Ol9x4CuSqhAp08FkGRnNrdf45AjqKnoeaw:aUm6QeQHlvKhAp081nNVjqKoe
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 288 atiradeonx86.bat 1960 atiradeonx86.bat -
resource yara_rule behavioral1/memory/596-76-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/596-78-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/596-79-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/596-82-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/596-83-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/596-86-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/596-112-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/596-128-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1960-131-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1960-133-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 596 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 596 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 596 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 596 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 596 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\atiradeonx86.bat = "C:\\Users\\Admin\\AppData\\Roaming\\atiradeonx86.bat" reg.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1204 set thread context of 596 1204 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 27 PID 288 set thread context of 1960 288 atiradeonx86.bat 32 PID 288 set thread context of 344 288 atiradeonx86.bat 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CAFE74F1-76C5-11ED-9D78-7225AF48583A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377247722" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat Token: SeDebugPrivilege 1960 atiradeonx86.bat -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 344 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1204 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 596 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 288 atiradeonx86.bat 1960 atiradeonx86.bat 344 iexplore.exe 344 iexplore.exe 992 IEXPLORE.EXE 992 IEXPLORE.EXE 992 IEXPLORE.EXE 992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1204 wrote to memory of 596 1204 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 27 PID 1204 wrote to memory of 596 1204 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 27 PID 1204 wrote to memory of 596 1204 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 27 PID 1204 wrote to memory of 596 1204 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 27 PID 1204 wrote to memory of 596 1204 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 27 PID 1204 wrote to memory of 596 1204 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 27 PID 1204 wrote to memory of 596 1204 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 27 PID 1204 wrote to memory of 596 1204 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 27 PID 596 wrote to memory of 1336 596 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 28 PID 596 wrote to memory of 1336 596 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 28 PID 596 wrote to memory of 1336 596 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 28 PID 596 wrote to memory of 1336 596 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 28 PID 1336 wrote to memory of 460 1336 cmd.exe 30 PID 1336 wrote to memory of 460 1336 cmd.exe 30 PID 1336 wrote to memory of 460 1336 cmd.exe 30 PID 1336 wrote to memory of 460 1336 cmd.exe 30 PID 596 wrote to memory of 288 596 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 31 PID 596 wrote to memory of 288 596 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 31 PID 596 wrote to memory of 288 596 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 31 PID 596 wrote to memory of 288 596 daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe 31 PID 288 wrote to memory of 1960 288 atiradeonx86.bat 32 PID 288 wrote to memory of 1960 288 atiradeonx86.bat 32 PID 288 wrote to memory of 1960 288 atiradeonx86.bat 32 PID 288 wrote to memory of 1960 288 atiradeonx86.bat 32 PID 288 wrote to memory of 1960 288 atiradeonx86.bat 32 PID 288 wrote to memory of 1960 288 atiradeonx86.bat 32 PID 288 wrote to memory of 1960 288 atiradeonx86.bat 32 PID 288 wrote to memory of 1960 288 atiradeonx86.bat 32 PID 288 wrote to memory of 344 288 atiradeonx86.bat 33 PID 288 wrote to memory of 344 288 atiradeonx86.bat 33 PID 288 wrote to memory of 344 288 atiradeonx86.bat 33 PID 288 wrote to memory of 344 288 atiradeonx86.bat 33 PID 288 wrote to memory of 344 288 atiradeonx86.bat 33 PID 288 wrote to memory of 344 288 atiradeonx86.bat 33 PID 288 wrote to memory of 344 288 atiradeonx86.bat 33 PID 344 wrote to memory of 992 344 iexplore.exe 35 PID 344 wrote to memory of 992 344 iexplore.exe 35 PID 344 wrote to memory of 992 344 iexplore.exe 35 PID 344 wrote to memory of 992 344 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe"C:\Users\Admin\AppData\Local\Temp\daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe"C:\Users\Admin\AppData\Local\Temp\daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\YGUTF.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "atiradeonx86.bat" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\atiradeonx86.bat" /f4⤵
- Adds Run key to start application
PID:460
-
-
-
C:\Users\Admin\AppData\Roaming\atiradeonx86.bat"C:\Users\Admin\AppData\Roaming\atiradeonx86.bat"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Users\Admin\AppData\Roaming\atiradeonx86.bat"C:\Users\Admin\AppData\Roaming\atiradeonx86.bat"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:344 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:992
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD57d2115acc388532cf3bee4380f172915
SHA131143e9730264b58c847e7c8c166fd8f8acf61cc
SHA256fd6b7074ca8c462738ac51f70a0f5fde9638806230e06b6a609da201c84f9da1
SHA512f135928e06b803fd8f96fa52366c8ab4dbe70803c9c6e2ac2bf93f61f0302e9eeaa1b1774916b106e6b2247e2088ed5ccbad029c3a48e52e39e9cd73413bff9a
-
Filesize
608B
MD5e814aa10ad9bbbb9bb67d4871ef70015
SHA121dd17c92c478fc7ffc0b3cee1ec62f35d545ebe
SHA256cf008ad2379030e701042151245a0b877dcfc031ba3ae0075a8dc22eee063fe3
SHA512ab7620278661606ef1f03b216647dd1d7e716b9ff41556c40e4c4ca42775ebf32c7e776d3f61a0f2418cb89025e13ee4ab72df514e93ae8714162bd418673dc4
-
Filesize
304KB
MD588b9dccec7f821d1e53e4d60f96755c2
SHA127cbab71d2f0efa4b6e234e842a7f3dbe393a593
SHA25675b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb
SHA5123634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823
-
Filesize
304KB
MD588b9dccec7f821d1e53e4d60f96755c2
SHA127cbab71d2f0efa4b6e234e842a7f3dbe393a593
SHA25675b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb
SHA5123634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823
-
Filesize
304KB
MD588b9dccec7f821d1e53e4d60f96755c2
SHA127cbab71d2f0efa4b6e234e842a7f3dbe393a593
SHA25675b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb
SHA5123634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823
-
Filesize
304KB
MD588b9dccec7f821d1e53e4d60f96755c2
SHA127cbab71d2f0efa4b6e234e842a7f3dbe393a593
SHA25675b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb
SHA5123634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823
-
Filesize
304KB
MD588b9dccec7f821d1e53e4d60f96755c2
SHA127cbab71d2f0efa4b6e234e842a7f3dbe393a593
SHA25675b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb
SHA5123634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823
-
Filesize
304KB
MD588b9dccec7f821d1e53e4d60f96755c2
SHA127cbab71d2f0efa4b6e234e842a7f3dbe393a593
SHA25675b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb
SHA5123634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823
-
Filesize
304KB
MD588b9dccec7f821d1e53e4d60f96755c2
SHA127cbab71d2f0efa4b6e234e842a7f3dbe393a593
SHA25675b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb
SHA5123634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823
-
Filesize
304KB
MD588b9dccec7f821d1e53e4d60f96755c2
SHA127cbab71d2f0efa4b6e234e842a7f3dbe393a593
SHA25675b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb
SHA5123634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823