Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2023 20:38
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231127-en
General
-
Target
file.exe
-
Size
269KB
-
MD5
5ecfaa69dc1970e72f70d0351c5c55eb
-
SHA1
60535c00fd037ec855c5fcdcbc69b3818feca0d7
-
SHA256
589e3156476632157530813ae5e67f8b210152f9399201330ecea6a0fc01599d
-
SHA512
9b97138e71cbe425d306cc50dbac70fceec654c40c730baff71a4647ec646221bee186d02c47bef3ad357881220de5584e3d729c5a2beb542b8730a82d7b5840
-
SSDEEP
3072:WcYGipGgeWycBrEtuGUeOlyMN1aSef7jXciD0mHeGoZ2d:h3lM3BrWuGQjNTef7rciowe
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
Signatures
-
Raccoon Stealer V2 payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2900-100-0x0000000000CB0000-0x0000000000CC6000-memory.dmp family_raccoon_v2 behavioral2/memory/2900-101-0x0000000000400000-0x0000000000B9D000-memory.dmp family_raccoon_v2 behavioral2/memory/2900-114-0x0000000000400000-0x0000000000B9D000-memory.dmp family_raccoon_v2 -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
FB39.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FB39.exe -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 318 3332 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
FB39.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FB39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FB39.exe -
Deletes itself 1 IoCs
Processes:
pid process 3308 -
Executes dropped EXE 5 IoCs
Processes:
FB39.exeFFDE.exe240.exe6E5.exeaiseaaapid process 4416 FB39.exe 3492 FFDE.exe 2900 240.exe 2432 6E5.exe 1552 aiseaaa -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 4164 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\FB39.exe themida C:\Users\Admin\AppData\Local\Temp\FB39.exe themida behavioral2/memory/4416-45-0x0000000000CD0000-0x0000000001652000-memory.dmp themida -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3455265224-196869244-2056873367-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3455265224-196869244-2056873367-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3455265224-196869244-2056873367-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
FB39.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FB39.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 23 IoCs
Processes:
FB39.exepowershell.exepid process 4416 FB39.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
FFDE.exepowershell.exedescription pid process target process PID 3492 set thread context of 2812 3492 FFDE.exe AppLaunch.exe PID 3332 set thread context of 5096 3332 powershell.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3080 2900 WerFault.exe 240.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
aiseaaafile.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI aiseaaa Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI aiseaaa Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI aiseaaa Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Modifies registry class 3 IoCs
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-3455265224-196869244-2056873367-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 5108 file.exe 5108 file.exe 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 3308 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3308 -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
file.exeaiseaaapid process 5108 file.exe 3308 3308 3308 3308 1552 aiseaaa -
Suspicious use of AdjustPrivilegeToken 26 IoCs
Processes:
AppLaunch.exe6E5.exeFB39.exepowershell.exeAppLaunch.exesvchost.exedescription pid process Token: SeDebugPrivilege 2812 AppLaunch.exe Token: SeDebugPrivilege 2432 6E5.exe Token: SeDebugPrivilege 4416 FB39.exe Token: SeShutdownPrivilege 3308 Token: SeCreatePagefilePrivilege 3308 Token: SeDebugPrivilege 3332 powershell.exe Token: SeShutdownPrivilege 3308 Token: SeCreatePagefilePrivilege 3308 Token: SeShutdownPrivilege 3308 Token: SeCreatePagefilePrivilege 3308 Token: SeShutdownPrivilege 3308 Token: SeCreatePagefilePrivilege 3308 Token: SeShutdownPrivilege 3308 Token: SeCreatePagefilePrivilege 3308 Token: SeShutdownPrivilege 3332 powershell.exe Token: SeCreatePagefilePrivilege 3332 powershell.exe Token: SeShutdownPrivilege 3308 Token: SeCreatePagefilePrivilege 3308 Token: SeShutdownPrivilege 3308 Token: SeCreatePagefilePrivilege 3308 Token: SeDebugPrivilege 5096 AppLaunch.exe Token: SeShutdownPrivilege 3308 Token: SeCreatePagefilePrivilege 3308 Token: SeManageVolumePrivilege 1312 svchost.exe Token: SeShutdownPrivilege 3308 Token: SeCreatePagefilePrivilege 3308 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3308 3308 -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
regsvr32.exeFFDE.exe6E5.exepowershell.exedescription pid process target process PID 3308 wrote to memory of 1120 3308 regsvr32.exe PID 3308 wrote to memory of 1120 3308 regsvr32.exe PID 1120 wrote to memory of 4164 1120 regsvr32.exe regsvr32.exe PID 1120 wrote to memory of 4164 1120 regsvr32.exe regsvr32.exe PID 1120 wrote to memory of 4164 1120 regsvr32.exe regsvr32.exe PID 3308 wrote to memory of 4416 3308 FB39.exe PID 3308 wrote to memory of 4416 3308 FB39.exe PID 3308 wrote to memory of 4416 3308 FB39.exe PID 3308 wrote to memory of 3492 3308 FFDE.exe PID 3308 wrote to memory of 3492 3308 FFDE.exe PID 3308 wrote to memory of 3492 3308 FFDE.exe PID 3492 wrote to memory of 2812 3492 FFDE.exe AppLaunch.exe PID 3492 wrote to memory of 2812 3492 FFDE.exe AppLaunch.exe PID 3492 wrote to memory of 2812 3492 FFDE.exe AppLaunch.exe PID 3492 wrote to memory of 2812 3492 FFDE.exe AppLaunch.exe PID 3492 wrote to memory of 2812 3492 FFDE.exe AppLaunch.exe PID 3492 wrote to memory of 2812 3492 FFDE.exe AppLaunch.exe PID 3492 wrote to memory of 2812 3492 FFDE.exe AppLaunch.exe PID 3492 wrote to memory of 2812 3492 FFDE.exe AppLaunch.exe PID 3308 wrote to memory of 2900 3308 240.exe PID 3308 wrote to memory of 2900 3308 240.exe PID 3308 wrote to memory of 2900 3308 240.exe PID 3308 wrote to memory of 2432 3308 6E5.exe PID 3308 wrote to memory of 2432 3308 6E5.exe PID 3308 wrote to memory of 2432 3308 6E5.exe PID 3308 wrote to memory of 4408 3308 explorer.exe PID 3308 wrote to memory of 4408 3308 explorer.exe PID 3308 wrote to memory of 4408 3308 explorer.exe PID 3308 wrote to memory of 4408 3308 explorer.exe PID 3308 wrote to memory of 676 3308 explorer.exe PID 3308 wrote to memory of 676 3308 explorer.exe PID 3308 wrote to memory of 676 3308 explorer.exe PID 2432 wrote to memory of 3332 2432 6E5.exe powershell.exe PID 2432 wrote to memory of 3332 2432 6E5.exe powershell.exe PID 2432 wrote to memory of 3332 2432 6E5.exe powershell.exe PID 3332 wrote to memory of 5096 3332 powershell.exe AppLaunch.exe PID 3332 wrote to memory of 5096 3332 powershell.exe AppLaunch.exe PID 3332 wrote to memory of 5096 3332 powershell.exe AppLaunch.exe PID 3332 wrote to memory of 5096 3332 powershell.exe AppLaunch.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3455265224-196869244-2056873367-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3455265224-196869244-2056873367-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5108
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\F6D3.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\F6D3.dll2⤵
- Loads dropped DLL
PID:4164
-
C:\Users\Admin\AppData\Local\Temp\FB39.exeC:\Users\Admin\AppData\Local\Temp\FB39.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
C:\Users\Admin\AppData\Local\Temp\FFDE.exeC:\Users\Admin\AppData\Local\Temp\FFDE.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
C:\Users\Admin\AppData\Local\Temp\240.exeC:\Users\Admin\AppData\Local\Temp\240.exe1⤵
- Executes dropped EXE
PID:2900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 72842⤵
- Program crash
PID:3080
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4408
-
C:\Users\Admin\AppData\Local\Temp\6E5.exeC:\Users\Admin\AppData\Local\Temp\6E5.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2900 -ip 29001⤵PID:4960
-
C:\Users\Admin\AppData\Roaming\aiseaaaC:\Users\Admin\AppData\Roaming\aiseaaa1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1552
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1820
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5cf92412c55902e6b554e840c5ae1968d
SHA19b80023e8b757c068279b1be70cbd258e0558f55
SHA256813e3234ed1591fbd7a09466e40d06f5a174fcea75ed61d0e926829778b42d21
SHA512cc76cceb82c25955d1bee726e7f17606ae54be5e1e27be19c34e71f9e4f82a41cd1d73f603fe152b4f7d0fa375b8963edcf090b3ec37648f323cebeb2333ee49
-
Filesize
2KB
MD51dfbfa155719f83b510b162d53402188
SHA15b77bb156fff78643da4c559ca920f760075906c
SHA256b6b12acf9eb1f290b6572cead9166cca3e2714e78058bef0b8b27c93e11f6831
SHA512be0c4d568988494bdc5b94b455215ec0b6f5c00327c481d25bc8aeef683ca150f011c76f8978b4869608387a0a8b3b803f471511897443e574a8e3bd5f9b38ad
-
Filesize
269KB
MD54becc2e22d15e4d71fd0013a8c289366
SHA16b4cefa170131f4d5ee1eb702efb3b8ef70b05aa
SHA256371f059454fe83d05e293285b9ab21c25c840f5441485e2888058278593a2482
SHA5121a6effba136c9a49abe2b60fd3694bcfc75f1653788326ba1c2b90d40fef306dfd55f45722d1bf2f290b634d7ed967908ee96a0bd5cf21daced6f337363a83db
-
Filesize
269KB
MD54becc2e22d15e4d71fd0013a8c289366
SHA16b4cefa170131f4d5ee1eb702efb3b8ef70b05aa
SHA256371f059454fe83d05e293285b9ab21c25c840f5441485e2888058278593a2482
SHA5121a6effba136c9a49abe2b60fd3694bcfc75f1653788326ba1c2b90d40fef306dfd55f45722d1bf2f290b634d7ed967908ee96a0bd5cf21daced6f337363a83db
-
Filesize
1.3MB
MD5ce4583eb7787955cede660647c059b30
SHA1bbc9b2721f647f05b284dd787ee4aec860ef8bdb
SHA25637fe4a6c9ee99a766e31811344e1e7ba7974578a347bc3e3e02967be961c556b
SHA5123879173fc72ffbd3ebf53b97bcf8c18bc5da3e3f7b6a69930a853a33db1ca7e7f9d185ccd054c8eab67b5e7e73a2582932faf654f9e508428dfc8250fc686a38
-
Filesize
1.3MB
MD5ce4583eb7787955cede660647c059b30
SHA1bbc9b2721f647f05b284dd787ee4aec860ef8bdb
SHA25637fe4a6c9ee99a766e31811344e1e7ba7974578a347bc3e3e02967be961c556b
SHA5123879173fc72ffbd3ebf53b97bcf8c18bc5da3e3f7b6a69930a853a33db1ca7e7f9d185ccd054c8eab67b5e7e73a2582932faf654f9e508428dfc8250fc686a38
-
Filesize
2.6MB
MD5c73569915305ac15c46f6b0565bc39b0
SHA1744e80ad9f09ee6a2e32fd1700f93ac45a270d53
SHA256e08c706b8e7c518be2606ff7f3274918330b03ed2cd0bf2120a6676fb85dec8b
SHA512a4c85815b872475858913c3dbad6a3820ceb93a317b0749c034948b80ddd4fb3c3a4b9da9740f578a662b8a9f7b8fe2841ef5ddf7152840182d6a0b76f6eca40
-
Filesize
2.6MB
MD5c73569915305ac15c46f6b0565bc39b0
SHA1744e80ad9f09ee6a2e32fd1700f93ac45a270d53
SHA256e08c706b8e7c518be2606ff7f3274918330b03ed2cd0bf2120a6676fb85dec8b
SHA512a4c85815b872475858913c3dbad6a3820ceb93a317b0749c034948b80ddd4fb3c3a4b9da9740f578a662b8a9f7b8fe2841ef5ddf7152840182d6a0b76f6eca40
-
Filesize
4.1MB
MD541960f214e4314caa2f5157b11b00a18
SHA1c405bffc785505bab364208c24e29eefe80f1e32
SHA25669f5aca8d40511fbf3523b1e8e2cee4ff64b65ab94a7e734e9810ef0f617a327
SHA5127cfcb85c84e493fc2362d96495da0b40f01d7884ba5cc0346714d487cb249379b2dec689f9958177aae49e71f6dafbfb9b7b9c046decb1b4356937052f8e9140
-
Filesize
4.1MB
MD541960f214e4314caa2f5157b11b00a18
SHA1c405bffc785505bab364208c24e29eefe80f1e32
SHA25669f5aca8d40511fbf3523b1e8e2cee4ff64b65ab94a7e734e9810ef0f617a327
SHA5127cfcb85c84e493fc2362d96495da0b40f01d7884ba5cc0346714d487cb249379b2dec689f9958177aae49e71f6dafbfb9b7b9c046decb1b4356937052f8e9140
-
Filesize
1.8MB
MD56d3e2ee8f723889b7c3cc7dd7f7b7326
SHA1c739c825908d47921033fbe65db217a7550de798
SHA256e5fef0ed227cef479a29f10d15f0740a4d47747893c69e0b1514e7069da844de
SHA5129530762217ab46bd08d2d8e0004c673a1583949ecfc63407baf7c1dd8c4dad2f8d598f7bcebc9706ba4d14d96169cec88930cc0efddbebcfbb1313ea449536d2
-
Filesize
1.8MB
MD56d3e2ee8f723889b7c3cc7dd7f7b7326
SHA1c739c825908d47921033fbe65db217a7550de798
SHA256e5fef0ed227cef479a29f10d15f0740a4d47747893c69e0b1514e7069da844de
SHA5129530762217ab46bd08d2d8e0004c673a1583949ecfc63407baf7c1dd8c4dad2f8d598f7bcebc9706ba4d14d96169cec88930cc0efddbebcfbb1313ea449536d2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
269KB
MD55ecfaa69dc1970e72f70d0351c5c55eb
SHA160535c00fd037ec855c5fcdcbc69b3818feca0d7
SHA256589e3156476632157530813ae5e67f8b210152f9399201330ecea6a0fc01599d
SHA5129b97138e71cbe425d306cc50dbac70fceec654c40c730baff71a4647ec646221bee186d02c47bef3ad357881220de5584e3d729c5a2beb542b8730a82d7b5840
-
Filesize
269KB
MD55ecfaa69dc1970e72f70d0351c5c55eb
SHA160535c00fd037ec855c5fcdcbc69b3818feca0d7
SHA256589e3156476632157530813ae5e67f8b210152f9399201330ecea6a0fc01599d
SHA5129b97138e71cbe425d306cc50dbac70fceec654c40c730baff71a4647ec646221bee186d02c47bef3ad357881220de5584e3d729c5a2beb542b8730a82d7b5840