Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
04/01/2023, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
09059579fa0be3ddbfdf362a25ec46f93ab5be37d1560877eb25e514e89ca0eb.exe
Resource
win10-20220812-en
General
-
Target
09059579fa0be3ddbfdf362a25ec46f93ab5be37d1560877eb25e514e89ca0eb.exe
-
Size
366KB
-
MD5
51a8e88e45fea7e817c1e081fdc5872c
-
SHA1
fb9294527eedb50291b871afb6c1a04fd0b60958
-
SHA256
09059579fa0be3ddbfdf362a25ec46f93ab5be37d1560877eb25e514e89ca0eb
-
SHA512
9fc0cc3d8f887044d68dec5f51255d10db6a7e9a6942219f726e38d9220b9d3b46190255e36f1cd2ebd2bf3f3c09cf2686fde80ea71e447f2debd574402b5c4d
-
SSDEEP
6144:/MLl0SlaQbknIBSRF++zfcuoxupmLugx1jT:/MeSAnymrTLoxupmL5
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/4696-153-0x0000000002D30000-0x0000000002D39000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 19 2264 rundll32.exe 24 2264 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2648 148.exe 4620 sjvvtuv -
Deletes itself 1 IoCs
pid Process 1896 Process not Found -
Loads dropped DLL 1 IoCs
pid Process 2264 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2264 set thread context of 4316 2264 rundll32.exe 68 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sjvvtuv Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sjvvtuv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 09059579fa0be3ddbfdf362a25ec46f93ab5be37d1560877eb25e514e89ca0eb.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 09059579fa0be3ddbfdf362a25ec46f93ab5be37d1560877eb25e514e89ca0eb.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 09059579fa0be3ddbfdf362a25ec46f93ab5be37d1560877eb25e514e89ca0eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sjvvtuv -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Process not Found Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Process not Found Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e0031000000000024566997100054656d7000003a0009000400efbe0c554b88245669972e00000000000000000000000000000000000000000000000000d28a7d00540065006d007000000014000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Process not Found -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1896 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4696 09059579fa0be3ddbfdf362a25ec46f93ab5be37d1560877eb25e514e89ca0eb.exe 4696 09059579fa0be3ddbfdf362a25ec46f93ab5be37d1560877eb25e514e89ca0eb.exe 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found 1896 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1896 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4696 09059579fa0be3ddbfdf362a25ec46f93ab5be37d1560877eb25e514e89ca0eb.exe 4620 sjvvtuv -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 1896 Process not Found Token: SeCreatePagefilePrivilege 1896 Process not Found Token: SeShutdownPrivilege 1896 Process not Found Token: SeCreatePagefilePrivilege 1896 Process not Found Token: SeShutdownPrivilege 1896 Process not Found Token: SeCreatePagefilePrivilege 1896 Process not Found Token: SeShutdownPrivilege 1896 Process not Found Token: SeCreatePagefilePrivilege 1896 Process not Found Token: SeShutdownPrivilege 1896 Process not Found Token: SeCreatePagefilePrivilege 1896 Process not Found Token: SeShutdownPrivilege 1896 Process not Found Token: SeCreatePagefilePrivilege 1896 Process not Found Token: SeShutdownPrivilege 1896 Process not Found Token: SeCreatePagefilePrivilege 1896 Process not Found Token: SeShutdownPrivilege 1896 Process not Found Token: SeCreatePagefilePrivilege 1896 Process not Found Token: SeShutdownPrivilege 1896 Process not Found Token: SeCreatePagefilePrivilege 1896 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4316 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1896 Process not Found 1896 Process not Found -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2648 1896 Process not Found 66 PID 1896 wrote to memory of 2648 1896 Process not Found 66 PID 1896 wrote to memory of 2648 1896 Process not Found 66 PID 2648 wrote to memory of 2264 2648 148.exe 67 PID 2648 wrote to memory of 2264 2648 148.exe 67 PID 2648 wrote to memory of 2264 2648 148.exe 67 PID 2264 wrote to memory of 4316 2264 rundll32.exe 68 PID 2264 wrote to memory of 4316 2264 rundll32.exe 68 PID 2264 wrote to memory of 4316 2264 rundll32.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\09059579fa0be3ddbfdf362a25ec46f93ab5be37d1560877eb25e514e89ca0eb.exe"C:\Users\Admin\AppData\Local\Temp\09059579fa0be3ddbfdf362a25ec46f93ab5be37d1560877eb25e514e89ca0eb.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4696
-
C:\Users\Admin\AppData\Local\Temp\148.exeC:\Users\Admin\AppData\Local\Temp\148.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Oatedoqeryee.tmp",Yqiowyrat2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308993⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4316
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3168
-
C:\Users\Admin\AppData\Roaming\sjvvtuvC:\Users\Admin\AppData\Roaming\sjvvtuv1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5f9c31af1d6854c8650efda0c700cca67
SHA16843499c108bab4450fa9f75a0bc407447832a9d
SHA256e4ccd8bb164af7558d5a1dc6621aaa328228a68c2e2f5f4d43ec02d4491b5d58
SHA51206dd7dd90aaeacd84c5f8133ec2e3bab7263736db47e0eaaa1042d06c31b9a3223131f10d94b0f31c528c5e44aede9beec499f9281ac1142727bad4f11b6838e
-
Filesize
1.1MB
MD5f9c31af1d6854c8650efda0c700cca67
SHA16843499c108bab4450fa9f75a0bc407447832a9d
SHA256e4ccd8bb164af7558d5a1dc6621aaa328228a68c2e2f5f4d43ec02d4491b5d58
SHA51206dd7dd90aaeacd84c5f8133ec2e3bab7263736db47e0eaaa1042d06c31b9a3223131f10d94b0f31c528c5e44aede9beec499f9281ac1142727bad4f11b6838e
-
Filesize
718KB
MD586df455f98f9b6b06535d64a9cfd7006
SHA16d79d6464ce3eeb70de564652f9b99b09c5d3a22
SHA256200911b8faaea3104d1b51231d534e615fe755dc84024c1029aeafe1f842206b
SHA512249dac192d6c8023d4673a52d36cc4beecb899ab394f26e6812b3304075f427baba8b4b6a0cf4f6d4f50710eea8a0338d268b82a97a32632e18597c8eae1c426
-
Filesize
366KB
MD551a8e88e45fea7e817c1e081fdc5872c
SHA1fb9294527eedb50291b871afb6c1a04fd0b60958
SHA25609059579fa0be3ddbfdf362a25ec46f93ab5be37d1560877eb25e514e89ca0eb
SHA5129fc0cc3d8f887044d68dec5f51255d10db6a7e9a6942219f726e38d9220b9d3b46190255e36f1cd2ebd2bf3f3c09cf2686fde80ea71e447f2debd574402b5c4d
-
Filesize
366KB
MD551a8e88e45fea7e817c1e081fdc5872c
SHA1fb9294527eedb50291b871afb6c1a04fd0b60958
SHA25609059579fa0be3ddbfdf362a25ec46f93ab5be37d1560877eb25e514e89ca0eb
SHA5129fc0cc3d8f887044d68dec5f51255d10db6a7e9a6942219f726e38d9220b9d3b46190255e36f1cd2ebd2bf3f3c09cf2686fde80ea71e447f2debd574402b5c4d
-
Filesize
718KB
MD586df455f98f9b6b06535d64a9cfd7006
SHA16d79d6464ce3eeb70de564652f9b99b09c5d3a22
SHA256200911b8faaea3104d1b51231d534e615fe755dc84024c1029aeafe1f842206b
SHA512249dac192d6c8023d4673a52d36cc4beecb899ab394f26e6812b3304075f427baba8b4b6a0cf4f6d4f50710eea8a0338d268b82a97a32632e18597c8eae1c426