Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16-10-2023 08:09
Static task
static1
Behavioral task
behavioral1
Sample
057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe
Resource
win10v2004-20230915-en
General
-
Target
057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe
-
Size
29KB
-
MD5
0a4ec07af6ee0de7e8639ccfc1e0a98b
-
SHA1
c3f8a375dc91e1436f5da51fc529535ff616103c
-
SHA256
057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477
-
SHA512
dcb37d95aae4c7541058ef68ac0c3931b67a3fe61bbe569a6ff0ab87754760b5720c3df6d2dad6c5e627eaa50e268c066a20bbdb11123d3965c17cc650f45ae0
-
SSDEEP
384:NbbNMWe1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:pZne16GVRu1yK9fMnJG2V9dHS8
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\Q: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\K: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\X: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\V: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\U: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\O: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\M: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\L: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\H: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\Y: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\P: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\N: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\J: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\I: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\Z: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\T: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\R: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\G: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\E: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened (read-only) \??\W: 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files\Windows Defender\fr-FR\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Welcome Tool\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\it-IT\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.fr\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1042\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files\Java\jre7\lib\deploy\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files\Java\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\ODeploy.exe 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLSTART\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Internet Explorer\en-US\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2300 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 28 PID 2808 wrote to memory of 2300 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 28 PID 2808 wrote to memory of 2300 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 28 PID 2808 wrote to memory of 2300 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 28 PID 2300 wrote to memory of 2648 2300 net.exe 30 PID 2300 wrote to memory of 2648 2300 net.exe 30 PID 2300 wrote to memory of 2648 2300 net.exe 30 PID 2300 wrote to memory of 2648 2300 net.exe 30 PID 2808 wrote to memory of 1268 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 17 PID 2808 wrote to memory of 1268 2808 057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe"C:\Users\Admin\AppData\Local\Temp\057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2648
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD581b366cea7b26125940709a0f5e7d254
SHA16e03a61b1a9486e275754a58f5927ee2168d12aa
SHA256790683ff65c5feabb356270eb6df40bf11d1f9d077383695d2beefefc925a0ad
SHA512a48c74c21e439233ab92bf16c6a1207bb76aeaa0d1e89a939e2539f44902fde3d39a1b3589982566b5f2713a250493e10e0a2ccc74ead91f6a86e6106f8b472f
-
Filesize
876KB
MD5bbfdb6e0303de4073ee178eed44bfb68
SHA13b6385bf5e82dc00da52f37c2bb323cd21aa47ec
SHA256f7014623f69ead554173c57cbf39abcc2e8cc9ced72ed8bda96dd8895e72acd9
SHA512e68705b045ea33c7fd078d615a9d70fca06db5bdd4809cfc5130e6ed088daf185d6f7f4353ddc1fca10cd68da39b6cba3714acd9de9515240447487344e00833
-
Filesize
474KB
MD511ec6a48c2716a484036c562cb7c3e25
SHA1960285a49f0460fa9d4c52858d227a258b9eabab
SHA256a1d41d048c92ff4215df3312a6a1a256813248ae5406d9a0ad270716f0f59913
SHA512b43dac91f70b329d4dd6bb97684a6176cc23d2bd8dcbc7fbddbb0e412d39e4289c65d80d7082d30f626a15238162330290d518a8c1a7b523e1f1863bcfd5f32a
-
Filesize
10B
MD5a2f55d4dd0965430ceab2e112f7ee0a8
SHA1d5e114f97985141a73b1e325728e5fd21e432f60
SHA256f905d8a1cc369898067bdb4538843b91eb17d0d84032e2b5766ef438e25f807f
SHA5128bce44ff59da58c0f9a3fdec7edb997a6781cd8f6aa4bc8ef0945c0a4dcde1db93092b88d2e114cd29d58931265b2aa1055dab677716cf75f1482faaa4c9bcdc