Analysis
-
max time kernel
151s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
b568a0e7df6db8baddcb29ee5b84d288673e25d62ecf88fbb951bbc3aa04f19a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b568a0e7df6db8baddcb29ee5b84d288673e25d62ecf88fbb951bbc3aa04f19a.exe
Resource
win10v2004-20221111-en
General
-
Target
b568a0e7df6db8baddcb29ee5b84d288673e25d62ecf88fbb951bbc3aa04f19a.exe
-
Size
152KB
-
MD5
26690fad026f142ad4e745e96072b083
-
SHA1
d83362c96201eb51559eb5270fadcd40473dd58c
-
SHA256
b568a0e7df6db8baddcb29ee5b84d288673e25d62ecf88fbb951bbc3aa04f19a
-
SHA512
d205aedb4d1b01b5f6065eaea7acd929d1c0e7491905d89c5c62c2dea23a6f3896f51d1aa51f425f4e58da59838b1760cc4d399f0a5c4bbba80310b41ba231a6
-
SSDEEP
1536:BhCmF+VoV6qZO5WV9PZ1K+smtK4/ZWnKjjWce:BhCmF+VoV6qZO5W7afKjv
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kuyuh.exe -
Executes dropped EXE 1 IoCs
pid Process 2004 kuyuh.exe -
Loads dropped DLL 2 IoCs
pid Process 784 b568a0e7df6db8baddcb29ee5b84d288673e25d62ecf88fbb951bbc3aa04f19a.exe 784 b568a0e7df6db8baddcb29ee5b84d288673e25d62ecf88fbb951bbc3aa04f19a.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /q" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /D" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /A" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /j" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /P" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /h" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /u" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /d" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /g" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /R" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /W" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /w" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /H" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /p" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /N" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /V" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /T" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /M" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /x" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /Z" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /Y" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /F" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /z" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /S" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /a" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /i" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /O" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /r" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /f" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /J" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /C" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /G" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /K" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /e" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /k" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /X" kuyuh.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /m" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /B" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /E" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /I" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /n" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /b" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /s" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /v" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /c" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /t" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /l" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /U" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /L" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /y" kuyuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuyuh = "C:\\Users\\Admin\\kuyuh.exe /Q" kuyuh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe 2004 kuyuh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 784 b568a0e7df6db8baddcb29ee5b84d288673e25d62ecf88fbb951bbc3aa04f19a.exe 2004 kuyuh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 784 wrote to memory of 2004 784 b568a0e7df6db8baddcb29ee5b84d288673e25d62ecf88fbb951bbc3aa04f19a.exe 26 PID 784 wrote to memory of 2004 784 b568a0e7df6db8baddcb29ee5b84d288673e25d62ecf88fbb951bbc3aa04f19a.exe 26 PID 784 wrote to memory of 2004 784 b568a0e7df6db8baddcb29ee5b84d288673e25d62ecf88fbb951bbc3aa04f19a.exe 26 PID 784 wrote to memory of 2004 784 b568a0e7df6db8baddcb29ee5b84d288673e25d62ecf88fbb951bbc3aa04f19a.exe 26 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25 PID 2004 wrote to memory of 784 2004 kuyuh.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\b568a0e7df6db8baddcb29ee5b84d288673e25d62ecf88fbb951bbc3aa04f19a.exe"C:\Users\Admin\AppData\Local\Temp\b568a0e7df6db8baddcb29ee5b84d288673e25d62ecf88fbb951bbc3aa04f19a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\kuyuh.exe"C:\Users\Admin\kuyuh.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD531f1a7894205177bfb70b55ffbca7ae7
SHA10ef57f389822004f8343633f36350bc4ee111750
SHA256888415fe38debb8cb143452bb80f801a10a03e6926bafc68ff5887a792e7a8ae
SHA51253d9b00c3fff10937239ad9a8149539540b6e8b7d972b25674dddf18d11a28c63acd3fa51aa99fe1d7b247b93f254fe610eb6087b6471f8b461bb51c5a25415d
-
Filesize
152KB
MD531f1a7894205177bfb70b55ffbca7ae7
SHA10ef57f389822004f8343633f36350bc4ee111750
SHA256888415fe38debb8cb143452bb80f801a10a03e6926bafc68ff5887a792e7a8ae
SHA51253d9b00c3fff10937239ad9a8149539540b6e8b7d972b25674dddf18d11a28c63acd3fa51aa99fe1d7b247b93f254fe610eb6087b6471f8b461bb51c5a25415d
-
Filesize
152KB
MD531f1a7894205177bfb70b55ffbca7ae7
SHA10ef57f389822004f8343633f36350bc4ee111750
SHA256888415fe38debb8cb143452bb80f801a10a03e6926bafc68ff5887a792e7a8ae
SHA51253d9b00c3fff10937239ad9a8149539540b6e8b7d972b25674dddf18d11a28c63acd3fa51aa99fe1d7b247b93f254fe610eb6087b6471f8b461bb51c5a25415d
-
Filesize
152KB
MD531f1a7894205177bfb70b55ffbca7ae7
SHA10ef57f389822004f8343633f36350bc4ee111750
SHA256888415fe38debb8cb143452bb80f801a10a03e6926bafc68ff5887a792e7a8ae
SHA51253d9b00c3fff10937239ad9a8149539540b6e8b7d972b25674dddf18d11a28c63acd3fa51aa99fe1d7b247b93f254fe610eb6087b6471f8b461bb51c5a25415d