Analysis
-
max time kernel
292s -
max time network
280s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe
Resource
win10-20240404-en
General
-
Target
bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe
-
Size
1.3MB
-
MD5
046ebd7e0f619f33de609ea3f126b0d3
-
SHA1
37a0b634955eb29f9bc7d3d434838cd729bb7e17
-
SHA256
bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555
-
SHA512
39afa534b862f9faebb4aa1ff4144a7d53f62adfd389531f75bdf10865fe8d846e79b3138ec90f2e9d4eb92a72e7a856f0c7be857a892a54eb2f2503f3030d10
-
SSDEEP
24576:39O/bmU++vQu1TL9yJ5d2m8y7i1HlcoGpJ042jJpUeBk2h:3k/X+75dAyMGDP2dpUYXh
Malware Config
Extracted
amadey
4.41
1176f2
http://185.215.113.19
-
install_dir
417fd29867
-
install_file
ednfoki.exe
-
strings_key
183201dc3defc4394182b4bff63c4065
-
url_paths
/CoreOPT/index.php
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 2848 created 1212 2848 Shipment.pif 21 PID 2848 created 1212 2848 Shipment.pif 21 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2848 Shipment.pif 1268 GuardTrack.scr -
Loads dropped DLL 1 IoCs
pid Process 2188 cmd.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2520 tasklist.exe 2764 tasklist.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\LaboratoriesFriend bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe File opened for modification C:\Windows\ConditionSuperintendent bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe File opened for modification C:\Windows\AyePercent bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe File opened for modification C:\Windows\CuDefense bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe File opened for modification C:\Windows\ProjectionAcademy bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe File opened for modification C:\Windows\ChipSeems bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GuardTrack.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shipment.pif -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2616 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 1268 GuardTrack.scr 1268 GuardTrack.scr 1268 GuardTrack.scr 1268 GuardTrack.scr 1268 GuardTrack.scr 1268 GuardTrack.scr 1268 GuardTrack.scr 1268 GuardTrack.scr 1268 GuardTrack.scr 1268 GuardTrack.scr 1268 GuardTrack.scr 1268 GuardTrack.scr -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2520 tasklist.exe Token: SeDebugPrivilege 2764 tasklist.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 1268 GuardTrack.scr 1268 GuardTrack.scr 1268 GuardTrack.scr -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2848 Shipment.pif 2848 Shipment.pif 2848 Shipment.pif 1268 GuardTrack.scr 1268 GuardTrack.scr 1268 GuardTrack.scr -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2188 1856 bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe 30 PID 1856 wrote to memory of 2188 1856 bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe 30 PID 1856 wrote to memory of 2188 1856 bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe 30 PID 1856 wrote to memory of 2188 1856 bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe 30 PID 2188 wrote to memory of 2520 2188 cmd.exe 32 PID 2188 wrote to memory of 2520 2188 cmd.exe 32 PID 2188 wrote to memory of 2520 2188 cmd.exe 32 PID 2188 wrote to memory of 2520 2188 cmd.exe 32 PID 2188 wrote to memory of 2384 2188 cmd.exe 33 PID 2188 wrote to memory of 2384 2188 cmd.exe 33 PID 2188 wrote to memory of 2384 2188 cmd.exe 33 PID 2188 wrote to memory of 2384 2188 cmd.exe 33 PID 2188 wrote to memory of 2764 2188 cmd.exe 36 PID 2188 wrote to memory of 2764 2188 cmd.exe 36 PID 2188 wrote to memory of 2764 2188 cmd.exe 36 PID 2188 wrote to memory of 2764 2188 cmd.exe 36 PID 2188 wrote to memory of 2832 2188 cmd.exe 37 PID 2188 wrote to memory of 2832 2188 cmd.exe 37 PID 2188 wrote to memory of 2832 2188 cmd.exe 37 PID 2188 wrote to memory of 2832 2188 cmd.exe 37 PID 2188 wrote to memory of 2884 2188 cmd.exe 38 PID 2188 wrote to memory of 2884 2188 cmd.exe 38 PID 2188 wrote to memory of 2884 2188 cmd.exe 38 PID 2188 wrote to memory of 2884 2188 cmd.exe 38 PID 2188 wrote to memory of 2828 2188 cmd.exe 39 PID 2188 wrote to memory of 2828 2188 cmd.exe 39 PID 2188 wrote to memory of 2828 2188 cmd.exe 39 PID 2188 wrote to memory of 2828 2188 cmd.exe 39 PID 2188 wrote to memory of 2624 2188 cmd.exe 40 PID 2188 wrote to memory of 2624 2188 cmd.exe 40 PID 2188 wrote to memory of 2624 2188 cmd.exe 40 PID 2188 wrote to memory of 2624 2188 cmd.exe 40 PID 2188 wrote to memory of 2848 2188 cmd.exe 41 PID 2188 wrote to memory of 2848 2188 cmd.exe 41 PID 2188 wrote to memory of 2848 2188 cmd.exe 41 PID 2188 wrote to memory of 2848 2188 cmd.exe 41 PID 2188 wrote to memory of 2640 2188 cmd.exe 42 PID 2188 wrote to memory of 2640 2188 cmd.exe 42 PID 2188 wrote to memory of 2640 2188 cmd.exe 42 PID 2188 wrote to memory of 2640 2188 cmd.exe 42 PID 2848 wrote to memory of 1448 2848 Shipment.pif 43 PID 2848 wrote to memory of 1448 2848 Shipment.pif 43 PID 2848 wrote to memory of 1448 2848 Shipment.pif 43 PID 2848 wrote to memory of 1448 2848 Shipment.pif 43 PID 2848 wrote to memory of 2672 2848 Shipment.pif 45 PID 2848 wrote to memory of 2672 2848 Shipment.pif 45 PID 2848 wrote to memory of 2672 2848 Shipment.pif 45 PID 2848 wrote to memory of 2672 2848 Shipment.pif 45 PID 1448 wrote to memory of 2616 1448 cmd.exe 46 PID 1448 wrote to memory of 2616 1448 cmd.exe 46 PID 1448 wrote to memory of 2616 1448 cmd.exe 46 PID 1448 wrote to memory of 2616 1448 cmd.exe 46 PID 2664 wrote to memory of 2648 2664 taskeng.exe 50 PID 2664 wrote to memory of 2648 2664 taskeng.exe 50 PID 2664 wrote to memory of 2648 2664 taskeng.exe 50 PID 2648 wrote to memory of 1268 2648 wscript.EXE 51 PID 2648 wrote to memory of 1268 2648 wscript.EXE 51 PID 2648 wrote to memory of 1268 2648 wscript.EXE 51 PID 2648 wrote to memory of 1268 2648 wscript.EXE 51
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe"C:\Users\Admin\AppData\Local\Temp\bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Honda Honda.bat & Honda.bat & exit3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"4⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"4⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5919504⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BachelorRayPotentialBeats" Itsa4⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Competent + ..\Screw + ..\Whom + ..\Reveal + ..\Provides + ..\Still + ..\Entrepreneurs + ..\Greatest + ..\Corporate + ..\Wireless E4⤵
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\591950\Shipment.pifShipment.pif E4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2848
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2616
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & echo URL="C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E23C59D6-68CC-4B68-BEF4-B25F9ADDAE03} S-1-5-21-3502430532-24693940-2469786940-1000:PSBQWFYT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.js"2⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.scr"C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\Admin\AppData\Local\TrackGuard Technologies\z"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1268
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD57bceba97d574b9cbae73da590d52122c
SHA19d05a299c06e6b72a284a32c7b72715b589cceb5
SHA256ce3f497a4c54b086aedbaba7ff9e99e372fcc8d9f4c9ee41724e5bc2988a6cf5
SHA51219aeb5ec2d1eb3f87574284d21261322ec1b2f4ceb5cfd93dacfbf004bb4120f465f502efea63b0c719cdfbe14398f8256434a4c06c43c1934ea01ce03624efa
-
Filesize
773KB
MD56a22704ae494645ca19955de0cb879bc
SHA1acc40b89422c32563656441519df5d2199772398
SHA256f4e8beb419142c0b8152cd8028b95a877b938a1f400c610dee9e4139484385d6
SHA5123852d5e7d29be2b89008c9a970d4770a5d4599d6f75b4927fb56ca12fdc7ba5db0d2a6425786ec71a57a86342fcfc669e6cfb724683922feb5175dd369a5d687
-
Filesize
85KB
MD5d79ddda7e49b51bb69f59808170a5e63
SHA1b791857ae7b920d50f2fc97f0895f289c6a9e8bd
SHA256609b33673ba3698de21d56bce0a871d9d96269c7d86bc087419610452675a90e
SHA5124f977ba99b3f88d60380f81efc0b74bbe4ae29573e0e8caf0f5899e83f29be895391ff374a0e557b5be4eecd241829a442c92fa72f5dddcb440a45cc4356a157
-
Filesize
65KB
MD557b8ab1323416077ed8bb346dd2daa09
SHA143116dae9716caf4e7f43943a89e357204c842f8
SHA2561a8d43ecf42d62c9f4dfdad24c25136a028760a19cf4fd27336bfbb0962426b9
SHA5121899d8ce43c0e18ff3d7ea833680921a717d098fd2c4f8f5ded7007aa31f9946d6895f65364b17ba7da2f77afa5ef3782eefce562314776bc7fc8b5cb45b1f37
-
Filesize
92KB
MD51c78ead3742c95a2c4df31c8d71e0f1b
SHA1a075cca4d9d8fa5fe3ddbf1f2d6e120208cb5b17
SHA256b25e0f67c38257dbc0ab9a7d6af8870c878211abd4e51b8db52d9c3e2272652d
SHA51209a234d52b31b38a4071078abdc9a976aa58716a7ba9f1832b84966f039b621044eaaa641fdb2c919fe5334902e4dbaa8e3fd19a638583120f881cde218b9112
-
Filesize
98KB
MD5043e35e2330184d548101dfdb638be96
SHA1f73e6f2af1052b4810820c68f9693e90f6a07d6d
SHA2562d081c4a75403c808336cd690598e765d1277cea32e3cea2cb7bc0e62ad35c77
SHA512d764704f01b91644df122c4eff4dba404a46bc436c45f5406509e509213306a0cded57cbbeca20a6b474c656c294a91e2ea16025b267af34f4760fc02a8d69c5
-
Filesize
12KB
MD5cef464062b7e5b404539d0c443917907
SHA101802c968d8917fab13d71bfe4ed62e36e965745
SHA2565c1046ea8e740faaaf01e2818ebf5cea15d398594a26b8bb76e8b3da6dbd1bba
SHA512a5e335a7be3bc40b5dd30e40813bae8cd51761c2bfb8d4e2b6ad067cf8dd429aec85ad70534780de6d8fa8e996f310fb3d73334c83eb6ec92816c497c303e6b5
-
Filesize
868B
MD520ca365e882b4c4a95b110e62f8a4c08
SHA1662e9b589d89de106713f361d8b2536740554785
SHA2562739a9b72a38c08a6385701c6bafeb7fdd7fae8b33ace80732ec934ec8518c6c
SHA5129682a8935932673b2c1c5fda831c5b1e53219dbd74dbf96e483cdec68db6b31a69d714f6257c62a708bf0b6a2773f5f01efc86cb54fcc084341a862ed6e4d6fb
-
Filesize
80KB
MD572dcad57e5699dc20cb41f6ae4acd115
SHA1cb7e6842f24319262605ea2c1bf3a7eae60358af
SHA256945d570376b997851fd74131bcf117aad625341fcb7b756409e7cb711632cb0c
SHA5125f251f25514d5d138d20b308c2c162daf9520dde28f25379d09acaf1f2fc67bcf9a3bfa62a42d83c19febfd28809e82561aa2b19614735037930964d1aa18afd
-
Filesize
74KB
MD5d6a091e43db1334c92a9163fb999aa13
SHA1380674ed8d23c1ec2f9a5f5b0167970b296772a7
SHA2562299a0df735b5c6a171ddd6a1b009756c19ec3bb1383bef34bca8fa7f4a6cf09
SHA5124142fc9995b083bc2d3d9b5c2789ea564117ed0ede14a1aa510e9b32b8fdcd149350ce8069ec168141e720d4ffaa246bc7a4585fdff4466343ca3f4d206719f8
-
Filesize
871KB
MD5ea1cfad1b98da498addad255609d0e5f
SHA114fa7e96806624330a8899b215550122aeb94c91
SHA256da224ea0c81fd05189621037f4f0b856f47dd1fb0841d4142395f638da7eb802
SHA512ede7fa0fc6922366dd7319bdc0a00af36b39d506ee246a18d66641374a04727318abdc8832944995c4374487515b38017a081ffbfa17f566b1c83fac59e39442
-
Filesize
68KB
MD55fc7641883018edbf0ead49af5ec3cbc
SHA1b021e03764aa36d5b5176ab9dbd825001d9797c8
SHA256419e973c6e735bba8b60704a962e0b79d285e7a09cb317aefab1ed001a1bf344
SHA512698c1ee8137077116160e8958daabed29da1bfc2c9ce9795a5242fbd8a61fd2d425aa5722542d60f8df15c2af19a3ecb4a7d3628c9fdbf40f46a37769647eade
-
Filesize
82KB
MD55737221e4786a16db1d00b526a889913
SHA1b44ef92d0f12e91e236f96359fa3667c773703ab
SHA256743304691772b7f4b1254b7ec4defe408abd5380c260906ff5d51018cc51c7f4
SHA5120b3219ff89bd5f80aa83682c6193c8f540058262231f343ab11ebccb7849cf45b1b2850494150522479735304cd255e4bc25c1bd76a42f7482e43a3f60d000ef
-
Filesize
66KB
MD5cf18a7ed11645523addbd2fbb31b014d
SHA109caf4ed6b6822e838d3512ce5a75e4125192c5f
SHA25627dbf0e6f006ae0f7fa94cd33287e7f3ab85e1fa637636eff8e94eb649e45990
SHA512f1cfc3fbaccfcd199b99ac647a2a0f76a05a7db1b655fa2e9de44def1630bebbfdbbd814225664f2d7d7015ff73b87c02242bec5105460459694f03e836f0d56
-
Filesize
63KB
MD5df9a85af5771ea736a104b6e3eb86f0b
SHA1319cb80eed888d089ab5b6944adbcbe89c3195eb
SHA256cee5172f67cacbc90062c13713a08561b6984cb6c3c98663b7e541445b2fd492
SHA5128e7aedbe38bedf9a0c167f778eb7678b6ad73f56e1f1196eaf771c01b8d6cd2a99ff015190efcf3f7e340979e501172d2d606e3e3b9ae53873ab9244aaf10eb9
-
Filesize
185B
MD51c98c5f005c93ca181d2b84db9ec92f9
SHA19f3dd24a2caa2b0b5dfee1f4859e7ce098b253b5
SHA2565596e2d8061aec6bea4b8357a654334d91a0bf221a9b7a310573b11d965bb517
SHA512218eceb4ae191fbdeed57c76c6ff6055eff7c980ab0565703a3e73637dd519b39da685ef36a88e7915362404044c838f4d29790f4d3ab0be1e78fe3324b22aa7
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558