Analysis
-
max time kernel
130s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
05d65b036e9203631dbbe39b8de16acf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05d65b036e9203631dbbe39b8de16acf.exe
Resource
win10v2004-20231222-en
General
-
Target
05d65b036e9203631dbbe39b8de16acf.exe
-
Size
47KB
-
MD5
05d65b036e9203631dbbe39b8de16acf
-
SHA1
241b11b6ad8685865807040731369158c51bd76d
-
SHA256
44f1100f3e7707d03d8603d02ef5d5aea44d76e93386db4b2a1b10e2f4a2db81
-
SHA512
c81f62c63096cfd9fd33df0fe2140154bc417ac9ef12605a12345685806b6eb915c0d1201d3ec16759d18d354d58a82ea9196cb601c1e0fe60d7e46a22ddb443
-
SSDEEP
768:x1cVhpQI2EQK0iPDh84nScF15GYbWjXO3XJ0VsUUhgdCVVpS/grZsS4rp8ZD18b7:fQpQ5EP0ijnRTXJ0VUh4CVVpC+nKG8b7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 05d65b036e9203631dbbe39b8de16acf.exe -
Deletes itself 1 IoCs
pid Process 4480 Au_.exe -
Executes dropped EXE 2 IoCs
pid Process 1616 uninst.exe 4480 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 4612 05d65b036e9203631dbbe39b8de16acf.exe 4612 05d65b036e9203631dbbe39b8de16acf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023138-32.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31078039" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 609bb1079836da01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31078039" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4082bd079836da01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410207885" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4274523552" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31078039" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015a2f750fe9ee1479ecf0c8cfb11934c0000000002000000000010660000000100002000000030cea3c1fef87023304c837a3bd8c70221f203b9352a0829cbf1f150af7a2a00000000000e800000000200002000000016cbe71fcb5e64b569ae20f14bed213c56cd8376153c111223e42d916a0edfe320000000375952912f3986ffcd3cbb1bfe1f59fea8e77f1463782bf475d921c2fb373fac40000000d282345c3d9c53be9a672daa16036ea5ba32042efe5a5851ddba1cd5ce99dd41aab9fabef3cf9f5d4be6cfcbc706b85778fb6f86358344948074b11885d228c2 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015a2f750fe9ee1479ecf0c8cfb11934c00000000020000000000106600000001000020000000465d21610f70a11b43c5b68bf65320935502a3de5d60e9921ee96e3917b15151000000000e8000000002000020000000566d3a11f5a3e3bd449e331c0999aa33c4f09f7a24d5def6069f666e87d730f020000000063cf7e12ae76c0a37fe6bbeffd2f263adf62569d0991dc0643fbfece1400eac40000000114d1b68e018cdd792f44c1226e58fa3b8496aa0879cb3b6db28d85ec1b15cfe55e2b157d7668ff63fcc36934435216d9b780e27b98b3fc192e53a829860588b IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4267179576" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{29F598E0-A28B-11EE-A0B6-7AB8B57C8E96} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4267179576" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4912 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4912 IEXPLORE.EXE 4912 IEXPLORE.EXE 4456 IEXPLORE.EXE 4456 IEXPLORE.EXE 4456 IEXPLORE.EXE 4456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4612 wrote to memory of 2672 4612 05d65b036e9203631dbbe39b8de16acf.exe 92 PID 4612 wrote to memory of 2672 4612 05d65b036e9203631dbbe39b8de16acf.exe 92 PID 4612 wrote to memory of 2672 4612 05d65b036e9203631dbbe39b8de16acf.exe 92 PID 4612 wrote to memory of 1616 4612 05d65b036e9203631dbbe39b8de16acf.exe 94 PID 4612 wrote to memory of 1616 4612 05d65b036e9203631dbbe39b8de16acf.exe 94 PID 4612 wrote to memory of 1616 4612 05d65b036e9203631dbbe39b8de16acf.exe 94 PID 2672 wrote to memory of 4912 2672 iexplore.exe 93 PID 2672 wrote to memory of 4912 2672 iexplore.exe 93 PID 1616 wrote to memory of 4480 1616 uninst.exe 95 PID 1616 wrote to memory of 4480 1616 uninst.exe 95 PID 1616 wrote to memory of 4480 1616 uninst.exe 95 PID 4912 wrote to memory of 4456 4912 IEXPLORE.EXE 96 PID 4912 wrote to memory of 4456 4912 IEXPLORE.EXE 96 PID 4912 wrote to memory of 4456 4912 IEXPLORE.EXE 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\05d65b036e9203631dbbe39b8de16acf.exe"C:\Users\Admin\AppData\Local\Temp\05d65b036e9203631dbbe39b8de16acf.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpa.load-code.meibu.com/down.asp?users=gh&°²×°Í³¼Æ2⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpa.load-code.meibu.com/down.asp?users=gh&°²×°Í³¼Æ3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4912 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\3⤵
- Deletes itself
- Executes dropped EXE
PID:4480
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
18KB
MD5994669c5737b25c26642c94180e92fa2
SHA1d8a1836914a446b0e06881ce1be8631554adafde
SHA256bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c
SHA512d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
88B
MD564d650c161ef50d95d818c80ad83115e
SHA1cd2b53a5c6d21d44410335c82411700772920c26
SHA256d1a655fc57dddb83ff06ce57905e291038eee3cc1689b369f4d7781ed4829b36
SHA512c8e4dea61b4d6989b107eae65708b252b70bcd40fb99f41230d49c54a6c63d5ec394358ca7ff4eb70c9a1cc4a5f10fba423bfa2c9b4346e2cd54b3ea206d4617
-
Filesize
32KB
MD511cc266b171797fee29484a788869fe5
SHA1cdf477b7e5806489770171facf5cfb1f398edc71
SHA256f58ea93b8ae34346580e011388efdc4e0175d5104455a4d963ff4359e53b81ec
SHA512cebcb323108eca0ff28ecae978b5eae1654d42a8ec30f824a18cb151200d32e2d9b7dbc6a1977e30f0994c669567865501a5312aa34f1a26f11a19d0eb995ac4
-
Filesize
2KB
MD546e91d516a06ff7487b277295430316c
SHA1cc2ee64b37295f8c024e9d47a19cff1317e8ff69
SHA256684f056111506b81b060dd0bf780895cfa46e0b80a1af59ca91ec72feb64dd98
SHA5120a671072aedc25bd8f10da5e24842a3b38c99b7827cb602f3be35782bb9225f3858b7e5642116a720bd4c7622ef5d9d56ee75e71de5bd0ae151e6459a9ba7ca3
-
Filesize
2KB
MD506235427feb50571fb45cff559c364a8
SHA1e2e43ff04116be44fdec6be397302b9f0de6a3bf
SHA2563385c7ea3d39686ac918a7d094c51c8b187a4deaa9d438429a674a0ebd6c98ce
SHA512c5341e3a4e6d9c54bb9964424bb1face0a5ef07ec1212a1aa501013cd2da7e3b3a07439107e60fc91a7e98c425412b8d0258391829c9be2bb7a8ad0d427987d0
-
Filesize
2KB
MD542f778d200cde7c63bd58347da50bb4f
SHA1986ac2f69317e61ccd603bc363b925dd43b71d3b
SHA25698f688708580060bfc4dc6f2143abc00aebc1af67a963c7ed158f55f268725f9
SHA5123b05be667d3581d1ef645b0b10875124b9d74141e098153a8fd2e0d27c098e9fdc53ab6a45a362dd8df3a1d3ef9cef469466b1b3aaf6c0c7d5f1666a15c82151
-
Filesize
2KB
MD5b6e6f4d6711b11ed19a08f6834e495ec
SHA1bb0fb012f6f5043281087b7c013d965e41805b1b
SHA25674702869b8f3c3a58f848753513c96af2738824b97e206523634a57a70ee6487
SHA51297b13b08922f4b8b7adc7103ec0ad8063cf746a22afd1a4adcaab6b8ef89b7b65757fa7bb61222463179ad9911f6e9000d8c98fbb7373faef276b6c09357cc1c
-
Filesize
2KB
MD54152778c36b84576401aa014a959d29d
SHA18845faab185412ebd1f6c175661e37e0372f1f9c
SHA25697616c5b3394ac2271859536eb6a9ed56668e49256ff620feed6f90a123a6a1e
SHA51269017b4b19b8a60a33f1bdddac3c18c25e59e8fc996e0c29f42b5e2b951c5355ab657015bf8a207e1f5fd1cc806b37ad42490f1a90cc26908570fa4a9dbc6d09
-
Filesize
2KB
MD5d594a3637aa331d829d58d3ce203ce65
SHA12c57bc51d08d372dc898fa82a04cf0163bd66f20
SHA25689026c8cd42059d1daccdc56d0e9a0b3e921b8103eb8123ff8a5916e1340db90
SHA5124489c794370695c4e29cf43619b56437b857238417e6c3ca1990e4b3ccb4c9aaa314243e4b2679b4cca7b4e62921033db5ea0e438ccbb25a35b728613501f1c1
-
Filesize
2KB
MD5e18df05f9fc40826a4f75081df7b70a5
SHA1607293e597ebafcf14c29947d4d3d8ce91764025
SHA256e52d6b5276d831baa6ccceb032869bdef46a25a4290e8dde7d210aa990ce5919
SHA51222fca044fcec5f391e4b175dd1c503c5ef7262fad13cd62c621583a3d030909251ebc247fed1d735037ece5c7641e9098efd94e0bbc4beb92f2c4a9fc091767d
-
Filesize
2KB
MD5d42aaea23c864ecd9036e2b1d495a535
SHA1729d24d231127bfb6b3c686246c8cc54e467b382
SHA25646560d64f3a4ea6dfdcefdd14a39194d414b9f57dc2b177b378765e2360b8104
SHA51269c98beacde62d31e0c249985f92d20b3dcfdff2e12403ee6fc9689213dee5aed370c00c7945ede52c75fb337a3953580393273fa4cc0ab3ce1bf5b96aaf7421
-
Filesize
2KB
MD5dd502f6a24dfa7c1f2f132b55dadcbc1
SHA1d661cbe7e2e81e7f5664bcf841660db87c18577b
SHA256f63ed16a4ee9198f0d4e1bfacde360d38d525ff6fae2d6e62f3a7a69a0e88f02
SHA512c792935dde75839a56ee00a4574250942bf506fd33f859124723de8caf7964b7aaefca9f257c175458f5cbfd490f2e85fd4cf9cae066a1db3875bec781580f06
-
Filesize
2KB
MD5c2372bbc97da4c47d5a2a4f654497475
SHA1f4455ffe0ee141acce22fb340d33bf9c160534e8
SHA256141cc554c9962e343fcee5f4b9576bfd089150062e83abce2223ecb79f3c0465
SHA512270719f7d7e010ae9489ba796b14204bc2b716e6558b9b63bd894138298e74201cce10258de195efd47c5414983e5ac191516b0692edf66c03056c5776457d79
-
Filesize
2KB
MD588085bc63576a2d2d0a6bdd42cb19993
SHA154966e9fabffb56a6f0c0ab218184243d78ec408
SHA256ad28b2f19fe3bac791c787a67a839c4d056b2d17056cc641a3f1d2858353b523
SHA51294896d5d2cc660527fadc8966afb1f66997887bcd5a8a2ad04471f58e8243ad6c7c03267199138537dcda13aede821e871c2b3339a4fbb87ad97043419db9627
-
Filesize
2KB
MD503119fc5c47e058477ee3b88c08a7e6b
SHA1028995e84e419c02b3943f6a34b5636d3413f292
SHA25620b2245d17dc96e724dd656b037d1405b805a942417e5fbb198b36afed4e0aa8
SHA5122b7c043a50a1845841b44b763d70c1b8a0478a72124179bd852e2511abe76ca3fe9217f68f64083a40eca48f01253bdfb928f9145ffc6d56890db9063a8295f1
-
Filesize
2KB
MD538d9b53f70e92806bd62640aa80d6b2c
SHA16b0845cd0a4a8b51081271b7e3e7572ad567c73b
SHA2565ad61a08e869b62a8bad7e1cf858281d33460e06c3914d4899f0cb810f747c58
SHA512ed2afde58c6170a0c5f02a6c1ff8374a7ae37464f65b48b33c68160d0984d880a7a71e930ed90df8eda015e7988dbaeadbb7e2b774d40c773a817577e15d990d
-
Filesize
2KB
MD51dc22fee1c473b257b9dd5d382f04fa0
SHA1a8c069f9e2d05e107351970d2349fa9ea6210e23
SHA2563b46814419093978752694e2c5bdff9d814ea1867800534a9ef6f2629ff027fb
SHA512b85673507d0c5dc613cadaebcf23b88ce9429a5e324f7c91b3da92243d48a8068ebb07cbe1d5118c79fc79b847cfa7534a260148ec8e5639cec5efac05c69500