Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 13:09
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
f79e78cfc46c86aad54dd34f9477c820
-
SHA1
0763f18388e8784480721e2bfd6724e3b9f1de41
-
SHA256
9d041c6da1d28a944191b55926019e5cf2cedcd021b909966a5433cdb66dcc98
-
SHA512
a9d1cde850f2e2b97428d4340742c2898e522f3368f774b32410d9acbdebb7b37422fd845c034871ec2fa23ea87cf73880d2b43ffbe26294b8e66e3e238c67b3
-
SSDEEP
24576:FyyjOvett+dYnKL0oQ/bZyebrd35+gRe6UivtuGtZH8F+v3:gyyvGw0VIGdctLiY+8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1Ka36mb7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1Ka36mb7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1Ka36mb7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1Ka36mb7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1Ka36mb7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1Ka36mb7.exe -
Executes dropped EXE 5 IoCs
pid Process 2712 rj9xp66.exe 2668 lN1Tx90.exe 3048 Vu3Nf41.exe 2532 1Ka36mb7.exe 1232 2ZG7264.exe -
Loads dropped DLL 14 IoCs
pid Process 1728 file.exe 2712 rj9xp66.exe 2712 rj9xp66.exe 2668 lN1Tx90.exe 2668 lN1Tx90.exe 3048 Vu3Nf41.exe 3048 Vu3Nf41.exe 2532 1Ka36mb7.exe 3048 Vu3Nf41.exe 1232 2ZG7264.exe 2916 WerFault.exe 2916 WerFault.exe 2916 WerFault.exe 2916 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 1Ka36mb7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1Ka36mb7.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" rj9xp66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" lN1Tx90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Vu3Nf41.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1232 set thread context of 2508 1232 2ZG7264.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2916 1232 WerFault.exe 32 2964 2508 WerFault.exe 33 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2532 1Ka36mb7.exe 2532 1Ka36mb7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2532 1Ka36mb7.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2712 1728 file.exe 28 PID 1728 wrote to memory of 2712 1728 file.exe 28 PID 1728 wrote to memory of 2712 1728 file.exe 28 PID 1728 wrote to memory of 2712 1728 file.exe 28 PID 1728 wrote to memory of 2712 1728 file.exe 28 PID 1728 wrote to memory of 2712 1728 file.exe 28 PID 1728 wrote to memory of 2712 1728 file.exe 28 PID 2712 wrote to memory of 2668 2712 rj9xp66.exe 29 PID 2712 wrote to memory of 2668 2712 rj9xp66.exe 29 PID 2712 wrote to memory of 2668 2712 rj9xp66.exe 29 PID 2712 wrote to memory of 2668 2712 rj9xp66.exe 29 PID 2712 wrote to memory of 2668 2712 rj9xp66.exe 29 PID 2712 wrote to memory of 2668 2712 rj9xp66.exe 29 PID 2712 wrote to memory of 2668 2712 rj9xp66.exe 29 PID 2668 wrote to memory of 3048 2668 lN1Tx90.exe 30 PID 2668 wrote to memory of 3048 2668 lN1Tx90.exe 30 PID 2668 wrote to memory of 3048 2668 lN1Tx90.exe 30 PID 2668 wrote to memory of 3048 2668 lN1Tx90.exe 30 PID 2668 wrote to memory of 3048 2668 lN1Tx90.exe 30 PID 2668 wrote to memory of 3048 2668 lN1Tx90.exe 30 PID 2668 wrote to memory of 3048 2668 lN1Tx90.exe 30 PID 3048 wrote to memory of 2532 3048 Vu3Nf41.exe 31 PID 3048 wrote to memory of 2532 3048 Vu3Nf41.exe 31 PID 3048 wrote to memory of 2532 3048 Vu3Nf41.exe 31 PID 3048 wrote to memory of 2532 3048 Vu3Nf41.exe 31 PID 3048 wrote to memory of 2532 3048 Vu3Nf41.exe 31 PID 3048 wrote to memory of 2532 3048 Vu3Nf41.exe 31 PID 3048 wrote to memory of 2532 3048 Vu3Nf41.exe 31 PID 3048 wrote to memory of 1232 3048 Vu3Nf41.exe 32 PID 3048 wrote to memory of 1232 3048 Vu3Nf41.exe 32 PID 3048 wrote to memory of 1232 3048 Vu3Nf41.exe 32 PID 3048 wrote to memory of 1232 3048 Vu3Nf41.exe 32 PID 3048 wrote to memory of 1232 3048 Vu3Nf41.exe 32 PID 3048 wrote to memory of 1232 3048 Vu3Nf41.exe 32 PID 3048 wrote to memory of 1232 3048 Vu3Nf41.exe 32 PID 1232 wrote to memory of 2508 1232 2ZG7264.exe 33 PID 1232 wrote to memory of 2508 1232 2ZG7264.exe 33 PID 1232 wrote to memory of 2508 1232 2ZG7264.exe 33 PID 1232 wrote to memory of 2508 1232 2ZG7264.exe 33 PID 1232 wrote to memory of 2508 1232 2ZG7264.exe 33 PID 1232 wrote to memory of 2508 1232 2ZG7264.exe 33 PID 1232 wrote to memory of 2508 1232 2ZG7264.exe 33 PID 1232 wrote to memory of 2508 1232 2ZG7264.exe 33 PID 1232 wrote to memory of 2508 1232 2ZG7264.exe 33 PID 1232 wrote to memory of 2508 1232 2ZG7264.exe 33 PID 1232 wrote to memory of 2508 1232 2ZG7264.exe 33 PID 1232 wrote to memory of 2508 1232 2ZG7264.exe 33 PID 1232 wrote to memory of 2508 1232 2ZG7264.exe 33 PID 1232 wrote to memory of 2508 1232 2ZG7264.exe 33 PID 1232 wrote to memory of 2916 1232 2ZG7264.exe 34 PID 1232 wrote to memory of 2916 1232 2ZG7264.exe 34 PID 1232 wrote to memory of 2916 1232 2ZG7264.exe 34 PID 1232 wrote to memory of 2916 1232 2ZG7264.exe 34 PID 1232 wrote to memory of 2916 1232 2ZG7264.exe 34 PID 1232 wrote to memory of 2916 1232 2ZG7264.exe 34 PID 1232 wrote to memory of 2916 1232 2ZG7264.exe 34 PID 2508 wrote to memory of 2964 2508 AppLaunch.exe 35 PID 2508 wrote to memory of 2964 2508 AppLaunch.exe 35 PID 2508 wrote to memory of 2964 2508 AppLaunch.exe 35 PID 2508 wrote to memory of 2964 2508 AppLaunch.exe 35 PID 2508 wrote to memory of 2964 2508 AppLaunch.exe 35 PID 2508 wrote to memory of 2964 2508 AppLaunch.exe 35 PID 2508 wrote to memory of 2964 2508 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rj9xp66.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rj9xp66.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lN1Tx90.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lN1Tx90.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vu3Nf41.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vu3Nf41.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ka36mb7.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ka36mb7.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ZG7264.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ZG7264.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 2687⤵
- Program crash
PID:2964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:2916
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD59265f614217715072e3990cd22a066e1
SHA1d58a6fda8624bd5468482514f80bf2c5a867da4e
SHA25675d81a657b5a51af0f5cfe17845414b19c05e9bdbe98e7bb3eb495e89dfa7bef
SHA5128b84e5e1d049643a8e46a15afc90e2574e37cafd8522f719924fa5882810d2736db4fd04047e4c141a70d63407a5fe57a60ec485389f6138afae2def2bfec58a
-
Filesize
1.0MB
MD59265f614217715072e3990cd22a066e1
SHA1d58a6fda8624bd5468482514f80bf2c5a867da4e
SHA25675d81a657b5a51af0f5cfe17845414b19c05e9bdbe98e7bb3eb495e89dfa7bef
SHA5128b84e5e1d049643a8e46a15afc90e2574e37cafd8522f719924fa5882810d2736db4fd04047e4c141a70d63407a5fe57a60ec485389f6138afae2def2bfec58a
-
Filesize
745KB
MD50179af05393cf9e50ad0eaab8cff42cb
SHA1ad24cdc3454f1761bae0228a518650049dca2350
SHA256b3d6e4bd00ce98446eef650425d365a3b21939fe03556b4edf125227476d316f
SHA512ae1381026a4e2a923396b3146bd26d97c5a501a8c9167e9a030a6ace0824043101b93030a2ffb3e175d7c106304cb444aceb1759ae0122cec25ca925c0b22e7b
-
Filesize
745KB
MD50179af05393cf9e50ad0eaab8cff42cb
SHA1ad24cdc3454f1761bae0228a518650049dca2350
SHA256b3d6e4bd00ce98446eef650425d365a3b21939fe03556b4edf125227476d316f
SHA512ae1381026a4e2a923396b3146bd26d97c5a501a8c9167e9a030a6ace0824043101b93030a2ffb3e175d7c106304cb444aceb1759ae0122cec25ca925c0b22e7b
-
Filesize
493KB
MD57a3b31c96bcf0492d82b656170f5df0e
SHA1fe0e71592b1629ed63e3f4fb6612ce74e6fe0a6c
SHA25613b9e14eb865ce3b092da55a13e2c0e61de6f7a59c771942207c421f99c7a745
SHA5123e7ce50d9dd5ad8c3740cfab0cc8b6987152fc76a24cab764984c0dde6a66a97a2c8b44d36e51daa3777b4dd4f78d48611321f86b86abb2b4a492d60370d7cdf
-
Filesize
493KB
MD57a3b31c96bcf0492d82b656170f5df0e
SHA1fe0e71592b1629ed63e3f4fb6612ce74e6fe0a6c
SHA25613b9e14eb865ce3b092da55a13e2c0e61de6f7a59c771942207c421f99c7a745
SHA5123e7ce50d9dd5ad8c3740cfab0cc8b6987152fc76a24cab764984c0dde6a66a97a2c8b44d36e51daa3777b4dd4f78d48611321f86b86abb2b4a492d60370d7cdf
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
448KB
MD57a22296aed2a2d851cd3b813ebd831f3
SHA1ea38ca5b86e90e765be4e83fd82315a5ac2401ea
SHA256b00aec314c2758d09fe7e6244587e691bcd28b8b71bc56a88f2abd097ddbd7ce
SHA5129fe9e3e21afa43acdf813da001164dac2ac0b9f87234f2896642d57a6ebfa01e4791858a115766165f69fb25b782080d0d04e5b480d1285494b56ed1e26f5caa
-
Filesize
448KB
MD57a22296aed2a2d851cd3b813ebd831f3
SHA1ea38ca5b86e90e765be4e83fd82315a5ac2401ea
SHA256b00aec314c2758d09fe7e6244587e691bcd28b8b71bc56a88f2abd097ddbd7ce
SHA5129fe9e3e21afa43acdf813da001164dac2ac0b9f87234f2896642d57a6ebfa01e4791858a115766165f69fb25b782080d0d04e5b480d1285494b56ed1e26f5caa
-
Filesize
1.0MB
MD59265f614217715072e3990cd22a066e1
SHA1d58a6fda8624bd5468482514f80bf2c5a867da4e
SHA25675d81a657b5a51af0f5cfe17845414b19c05e9bdbe98e7bb3eb495e89dfa7bef
SHA5128b84e5e1d049643a8e46a15afc90e2574e37cafd8522f719924fa5882810d2736db4fd04047e4c141a70d63407a5fe57a60ec485389f6138afae2def2bfec58a
-
Filesize
1.0MB
MD59265f614217715072e3990cd22a066e1
SHA1d58a6fda8624bd5468482514f80bf2c5a867da4e
SHA25675d81a657b5a51af0f5cfe17845414b19c05e9bdbe98e7bb3eb495e89dfa7bef
SHA5128b84e5e1d049643a8e46a15afc90e2574e37cafd8522f719924fa5882810d2736db4fd04047e4c141a70d63407a5fe57a60ec485389f6138afae2def2bfec58a
-
Filesize
745KB
MD50179af05393cf9e50ad0eaab8cff42cb
SHA1ad24cdc3454f1761bae0228a518650049dca2350
SHA256b3d6e4bd00ce98446eef650425d365a3b21939fe03556b4edf125227476d316f
SHA512ae1381026a4e2a923396b3146bd26d97c5a501a8c9167e9a030a6ace0824043101b93030a2ffb3e175d7c106304cb444aceb1759ae0122cec25ca925c0b22e7b
-
Filesize
745KB
MD50179af05393cf9e50ad0eaab8cff42cb
SHA1ad24cdc3454f1761bae0228a518650049dca2350
SHA256b3d6e4bd00ce98446eef650425d365a3b21939fe03556b4edf125227476d316f
SHA512ae1381026a4e2a923396b3146bd26d97c5a501a8c9167e9a030a6ace0824043101b93030a2ffb3e175d7c106304cb444aceb1759ae0122cec25ca925c0b22e7b
-
Filesize
493KB
MD57a3b31c96bcf0492d82b656170f5df0e
SHA1fe0e71592b1629ed63e3f4fb6612ce74e6fe0a6c
SHA25613b9e14eb865ce3b092da55a13e2c0e61de6f7a59c771942207c421f99c7a745
SHA5123e7ce50d9dd5ad8c3740cfab0cc8b6987152fc76a24cab764984c0dde6a66a97a2c8b44d36e51daa3777b4dd4f78d48611321f86b86abb2b4a492d60370d7cdf
-
Filesize
493KB
MD57a3b31c96bcf0492d82b656170f5df0e
SHA1fe0e71592b1629ed63e3f4fb6612ce74e6fe0a6c
SHA25613b9e14eb865ce3b092da55a13e2c0e61de6f7a59c771942207c421f99c7a745
SHA5123e7ce50d9dd5ad8c3740cfab0cc8b6987152fc76a24cab764984c0dde6a66a97a2c8b44d36e51daa3777b4dd4f78d48611321f86b86abb2b4a492d60370d7cdf
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
448KB
MD57a22296aed2a2d851cd3b813ebd831f3
SHA1ea38ca5b86e90e765be4e83fd82315a5ac2401ea
SHA256b00aec314c2758d09fe7e6244587e691bcd28b8b71bc56a88f2abd097ddbd7ce
SHA5129fe9e3e21afa43acdf813da001164dac2ac0b9f87234f2896642d57a6ebfa01e4791858a115766165f69fb25b782080d0d04e5b480d1285494b56ed1e26f5caa
-
Filesize
448KB
MD57a22296aed2a2d851cd3b813ebd831f3
SHA1ea38ca5b86e90e765be4e83fd82315a5ac2401ea
SHA256b00aec314c2758d09fe7e6244587e691bcd28b8b71bc56a88f2abd097ddbd7ce
SHA5129fe9e3e21afa43acdf813da001164dac2ac0b9f87234f2896642d57a6ebfa01e4791858a115766165f69fb25b782080d0d04e5b480d1285494b56ed1e26f5caa
-
Filesize
448KB
MD57a22296aed2a2d851cd3b813ebd831f3
SHA1ea38ca5b86e90e765be4e83fd82315a5ac2401ea
SHA256b00aec314c2758d09fe7e6244587e691bcd28b8b71bc56a88f2abd097ddbd7ce
SHA5129fe9e3e21afa43acdf813da001164dac2ac0b9f87234f2896642d57a6ebfa01e4791858a115766165f69fb25b782080d0d04e5b480d1285494b56ed1e26f5caa
-
Filesize
448KB
MD57a22296aed2a2d851cd3b813ebd831f3
SHA1ea38ca5b86e90e765be4e83fd82315a5ac2401ea
SHA256b00aec314c2758d09fe7e6244587e691bcd28b8b71bc56a88f2abd097ddbd7ce
SHA5129fe9e3e21afa43acdf813da001164dac2ac0b9f87234f2896642d57a6ebfa01e4791858a115766165f69fb25b782080d0d04e5b480d1285494b56ed1e26f5caa
-
Filesize
448KB
MD57a22296aed2a2d851cd3b813ebd831f3
SHA1ea38ca5b86e90e765be4e83fd82315a5ac2401ea
SHA256b00aec314c2758d09fe7e6244587e691bcd28b8b71bc56a88f2abd097ddbd7ce
SHA5129fe9e3e21afa43acdf813da001164dac2ac0b9f87234f2896642d57a6ebfa01e4791858a115766165f69fb25b782080d0d04e5b480d1285494b56ed1e26f5caa
-
Filesize
448KB
MD57a22296aed2a2d851cd3b813ebd831f3
SHA1ea38ca5b86e90e765be4e83fd82315a5ac2401ea
SHA256b00aec314c2758d09fe7e6244587e691bcd28b8b71bc56a88f2abd097ddbd7ce
SHA5129fe9e3e21afa43acdf813da001164dac2ac0b9f87234f2896642d57a6ebfa01e4791858a115766165f69fb25b782080d0d04e5b480d1285494b56ed1e26f5caa