Analysis
-
max time kernel
290s -
max time network
261s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2022, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
LockB.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
LockB.exe
Resource
win10v2004-20221111-en
General
-
Target
LockB.exe
-
Size
145KB
-
MD5
3b9f4d1ddae79966fcf5bdad68e26c80
-
SHA1
2ddb3fbcf3dfab2bd59b87b4f5fb0f83436f5ce8
-
SHA256
b9636027efadba46bdd4097a49a09aa764eb3864dd092a70f837c6b8e8b34a50
-
SHA512
222d8ea629404c1ba0ad11d25400941c160eabd051599ce39901d6502bc1598bbf8edfec625bc7745c30fbee7a52775b3fe836c9c84762b054b08d7e9e4affdc
-
SSDEEP
3072:oqJogYkcSNm9V7DnYTFBLN0LLVWBvwbu2T:oq2kc4m9tDnYhB5HIb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4192 D249.tmp -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\SaveAdd.crw => C:\Users\Admin\Pictures\SaveAdd.crw.hu8DtsAW5 LockB.exe File opened for modification C:\Users\Admin\Pictures\SaveAdd.crw.hu8DtsAW5 LockB.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation D249.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-2971393436-602173351-1645505021-1000\desktop.ini LockB.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\hu8DtsAW5.bmp" LockB.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\hu8DtsAW5.bmp" LockB.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4192 D249.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\Desktop LockB.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\Desktop\WallpaperStyle = "10" LockB.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hu8DtsAW5 LockB.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hu8DtsAW5\ = "hu8DtsAW5" LockB.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hu8DtsAW5\DefaultIcon LockB.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hu8DtsAW5 LockB.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hu8DtsAW5\DefaultIcon\ = "C:\\ProgramData\\hu8DtsAW5.ico" LockB.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe 1480 LockB.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp 4192 D249.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeDebugPrivilege 1480 LockB.exe Token: 36 1480 LockB.exe Token: SeImpersonatePrivilege 1480 LockB.exe Token: SeIncBasePriorityPrivilege 1480 LockB.exe Token: SeIncreaseQuotaPrivilege 1480 LockB.exe Token: 33 1480 LockB.exe Token: SeManageVolumePrivilege 1480 LockB.exe Token: SeProfSingleProcessPrivilege 1480 LockB.exe Token: SeRestorePrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeSystemProfilePrivilege 1480 LockB.exe Token: SeTakeOwnershipPrivilege 1480 LockB.exe Token: SeShutdownPrivilege 1480 LockB.exe Token: SeDebugPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1460 vssvc.exe Token: SeRestorePrivilege 1460 vssvc.exe Token: SeAuditPrivilege 1460 vssvc.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeSecurityPrivilege 1480 LockB.exe Token: SeBackupPrivilege 1480 LockB.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1480 wrote to memory of 4192 1480 LockB.exe 92 PID 1480 wrote to memory of 4192 1480 LockB.exe 92 PID 1480 wrote to memory of 4192 1480 LockB.exe 92 PID 1480 wrote to memory of 4192 1480 LockB.exe 92 PID 4192 wrote to memory of 1368 4192 D249.tmp 93 PID 4192 wrote to memory of 1368 4192 D249.tmp 93 PID 4192 wrote to memory of 1368 4192 D249.tmp 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\LockB.exe"C:\Users\Admin\AppData\Local\Temp\LockB.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\ProgramData\D249.tmp"C:\ProgramData\D249.tmp"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\D249.tmp >> NUL3⤵PID:1368
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1460
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
129B
MD5042e95d491b10376d6b2b46ea1aea9d9
SHA191b86e378a0ff01e141780c79198779c31f17d24
SHA25697efee78d3ee4c17acbd1adf88be9f67b03f1343a3f08c2fd94b7b82c73d0d73
SHA512f2b3900cba9894134311c7f358e2b39fe7da1849168dc4ac14745fecfd77dd24ec1f7d81dbdec31abc5e48a412ad0739a2bded772fd4f0f178b4a70f26363e7a
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf