Analysis
-
max time kernel
193s -
max time network
220s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 12:39
Static task
static1
Behavioral task
behavioral1
Sample
18c9ed566d74339ae9f1d3dcbf6bc66a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
18c9ed566d74339ae9f1d3dcbf6bc66a.exe
Resource
win10v2004-20231215-en
General
-
Target
18c9ed566d74339ae9f1d3dcbf6bc66a.exe
-
Size
661KB
-
MD5
18c9ed566d74339ae9f1d3dcbf6bc66a
-
SHA1
95c9be311185314b4c527155d962ba4f7a51aef5
-
SHA256
c525e551e65a72a4eec49f8f3413f8208c1354ad951323c46fc3bd523c42875e
-
SHA512
35e2e79b107b403e76609c0cb20c0cac5cfba809e853255de46489963365f344c84e8380b7f7ab7e7841b7b707782fabed3059eeecdb9ec7036616d26443fd11
-
SSDEEP
12288:h/eQy90AsyHaqspDg4tKHNBYY310c99BLLASjcmuGSbFNEkhOqloO3ZRIL2:DybgpoBtlh9BX9jTQuwOQIL2
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 1344 svchost.exe 4144 svchost.exe 1096 svchost.exe 3456 svchost.exe 4156 svchost.exe -
resource yara_rule behavioral2/files/0x0006000000023212-3.dat upx behavioral2/memory/1344-4-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/1344-56-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/1344-68-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4144-74-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/1096-75-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/3456-76-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4156-77-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4144-78-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4144-79-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/3456-81-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4144-83-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/3456-85-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4144-87-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/3456-89-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4156-90-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4144-91-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/3456-93-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4144-95-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4144-99-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/3456-102-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4144-104-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/3456-106-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4156-107-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4144-108-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/3456-114-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4156-119-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4144-120-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/3456-122-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/4156-123-0x0000000000400000-0x00000000004DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 18c9ed566d74339ae9f1d3dcbf6bc66a.exe -
AutoIT Executable 28 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1344-56-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/1344-68-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4144-74-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/1096-75-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/3456-76-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4156-77-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4144-78-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4144-79-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/3456-81-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4144-83-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/3456-85-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4144-87-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/3456-89-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4156-90-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4144-91-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/3456-93-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4144-95-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4144-99-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/3456-102-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4144-104-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/3456-106-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4156-107-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4144-108-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/3456-114-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4156-119-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4144-120-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/3456-122-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe behavioral2/memory/4156-123-0x0000000000400000-0x00000000004DE000-memory.dmp autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\dost.a3x svchost.exe File opened for modification C:\Windows\SysWOW64\dost.a3x svchost.exe File created C:\Windows\SysWOW64\ie.a3x svchost.exe File opened for modification C:\Windows\SysWOW64\ie.a3x svchost.exe File created C:\Windows\SysWOW64\chup.a3x svchost.exe File opened for modification C:\Windows\SysWOW64\chup.a3x svchost.exe File created C:\Windows\SysWOW64\down.a3x svchost.exe File opened for modification C:\Windows\SysWOW64\down.a3x svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\thongtin.txt svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20cf591d313cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "932895240" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d228e40a7820b94dbd5c7b6846f2f5ad00000000020000000000106600000001000020000000a8af2cb20371cb9eb517c073ecfb44b161b8b4985755f0c873f97649600ad6fa000000000e80000000020000200000006e1c3ca9db8112b61239ace648aa5e13594bcd16eb763c3efe9b3dcaead822cd20000000169164840b909468eecd8057161206d40865d2a05d325fe3b51161f094765b374000000051986d54052d332ba594808dface171f5e99c44fa495d3fd6ba9ff9b36ad2b5f691bda9250c445bb32b152ed28ff6a487a149b9ae83ba26a4d8caabe839300e1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31079473" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31079473" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "932895240" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3A0007CB-A824-11EE-B7F4-FAD2FAC7202F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 4400 IEXPLORE.EXE 4400 IEXPLORE.EXE 3024 iexplore.exe 3024 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 3024 iexplore.exe 3024 iexplore.exe 4616 IEXPLORE.EXE 4616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1580 wrote to memory of 1344 1580 18c9ed566d74339ae9f1d3dcbf6bc66a.exe 91 PID 1580 wrote to memory of 1344 1580 18c9ed566d74339ae9f1d3dcbf6bc66a.exe 91 PID 1580 wrote to memory of 1344 1580 18c9ed566d74339ae9f1d3dcbf6bc66a.exe 91 PID 1344 wrote to memory of 4144 1344 svchost.exe 92 PID 1344 wrote to memory of 4144 1344 svchost.exe 92 PID 1344 wrote to memory of 4144 1344 svchost.exe 92 PID 1344 wrote to memory of 1096 1344 svchost.exe 93 PID 1344 wrote to memory of 1096 1344 svchost.exe 93 PID 1344 wrote to memory of 1096 1344 svchost.exe 93 PID 1344 wrote to memory of 3456 1344 svchost.exe 94 PID 1344 wrote to memory of 3456 1344 svchost.exe 94 PID 1344 wrote to memory of 3456 1344 svchost.exe 94 PID 1096 wrote to memory of 2648 1096 svchost.exe 95 PID 1096 wrote to memory of 2648 1096 svchost.exe 95 PID 1096 wrote to memory of 2648 1096 svchost.exe 95 PID 1344 wrote to memory of 4156 1344 svchost.exe 97 PID 1344 wrote to memory of 4156 1344 svchost.exe 97 PID 1344 wrote to memory of 4156 1344 svchost.exe 97 PID 3024 wrote to memory of 4400 3024 iexplore.exe 100 PID 3024 wrote to memory of 4400 3024 iexplore.exe 100 PID 3024 wrote to memory of 4400 3024 iexplore.exe 100 PID 3024 wrote to memory of 2796 3024 iexplore.exe 101 PID 3024 wrote to memory of 2796 3024 iexplore.exe 101 PID 3024 wrote to memory of 2796 3024 iexplore.exe 101 PID 3024 wrote to memory of 4616 3024 iexplore.exe 103 PID 3024 wrote to memory of 4616 3024 iexplore.exe 103 PID 3024 wrote to memory of 4616 3024 iexplore.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\18c9ed566d74339ae9f1d3dcbf6bc66a.exe"C:\Users\Admin\AppData\Local\Temp\18c9ed566d74339ae9f1d3dcbf6bc66a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exe /AutoIt3ExecuteScript "C:\Windows\SysWOW64\chup.a3x"3⤵
- Executes dropped EXE
PID:4144
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exe /AutoIt3ExecuteScript "C:\Windows\SysWOW64\down.a3x"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s /a "C:\" > "C:\Users\Admin\AppData\Local\Temp\RecursivOutput.txt"4⤵PID:2648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exe /AutoIt3ExecuteScript "C:\Windows\SysWOW64\dost.a3x"3⤵
- Executes dropped EXE
PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exe /AutoIt3ExecuteScript "C:\Windows\SysWOW64\ie.a3x"3⤵
- Executes dropped EXE
PID:4156
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4456
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4400
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:82950 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:82954 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
575KB
MD537fdf31c6c0eb6555019ee93baaf33e3
SHA1fd7eba8a73f13d912d44e0517aac60eff5e7e9d1
SHA25654fc401285a3822b3e9483f40d24025c89a66b79cec3fb1c525826a089087b53
SHA51288165af7483854f4c2a0fc7444a0f6157a4db8b157943b7c3db2b74108e133674500e2d2df33e3ddbe77ea3a81d42876bc3a1e16f72141b228be4651a5af529a
-
Filesize
23KB
MD51849d480c0ac52b472aa9288ad2578a5
SHA1c925b03b73141465a9373f4f8648d4e37c58e21a
SHA256ca077591603ef04aa82e2f2e2c1006deac96a4e811e0dc83b4568c7fae9e221a
SHA512f8833f7b3f6f7d68f39f07883c780e7ed2f0aed5a7dfefa8a132069610c95b10bc839f8361f50d387c81095f8795e6c4da69afd7c3020198f45f30b0771a81ec
-
Filesize
4KB
MD57a0c0092cff3faf6329371e058fdcea1
SHA18157c8ef86a8c477fe0852f3d29ab382809b0884
SHA256872b7560d430147a63275e1beb6a437a36e2c07817847606b58f25c467025bad
SHA5123623f41372d9bda69a381d6e812a4ba8047742afff3ec737fd8c92348aa250d2cb2c7b68cd4c651a461b0f37dbca22e9d363e0f42c7687ed1405b033d4d128ea
-
Filesize
27KB
MD56ff435cebf0b76c70743be780e001533
SHA154b6368feaaa497b6302faf2f647f364368c56b1
SHA25681265851361bad5ed6d02aeed2ced6d3d444bc349c366563fa20823985bece08
SHA512d8dce5d122660a7bd3dcd2128b616cdeeab93b0d8dffa15e3fec5a6d0528f2d4bc1fd31ae967bc6a2113617db5e325ac8f26b67d3835fdefbfbedc97922a38ac
-
Filesize
35KB
MD5fb0ffda870fff07612244660b4080086
SHA1ab0934b89ba3d1f97dff3622d64d6b3231ddb98f
SHA2561629810aa1be8f11f80161a594f3adae6d3bb1abec61ebe9e8ce45880fab5840
SHA51272d04166fa9fc141e7f4eb9b33bed536315e45c154a32294eca0890c3ee418af084da7613414639082e5fddcfdc192b31ce87850dbc2596d0074a4c0378f3e0b