Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
Act3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Act3.exe
Resource
win10v2004-20240802-en
General
-
Target
Act3.exe
-
Size
604KB
-
MD5
8b6bc16fd137c09a08b02bbe1bb7d670
-
SHA1
c69a0f6c6f809c01db92ca658fcf1b643391a2b7
-
SHA256
e67834d1e8b38ec5864cfa101b140aeaba8f1900a6e269e6a94c90fcbfe56678
-
SHA512
b53d2cc0fe5fa52262ace9f6e6ea3f5ce84935009822a3394bfe49c4d15dfeaa96bfe10ce77ffa93dbf81e5428122aa739a94bc709f203bc346597004fd75a24
-
SSDEEP
6144:yYghlI5/u8f1mr+4RJ99MpDa52RX5wRDhOOU0qsR:yYKlYmDXEpDHRXP01
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___EB13_.txt
cerber
http://p27dokhpz2n7nvgr.onion/46CF-93E0-1986-0446-9D4C
http://p27dokhpz2n7nvgr.12hygy.top/46CF-93E0-1986-0446-9D4C
http://p27dokhpz2n7nvgr.14ewqv.top/46CF-93E0-1986-0446-9D4C
http://p27dokhpz2n7nvgr.14vvrc.top/46CF-93E0-1986-0446-9D4C
http://p27dokhpz2n7nvgr.129p1t.top/46CF-93E0-1986-0446-9D4C
http://p27dokhpz2n7nvgr.1apgrn.top/46CF-93E0-1986-0446-9D4C
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___6VZ3_.hta
cerber
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (1101) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1520 netsh.exe 3924 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Act3.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ Act3.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook Act3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! Act3.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpC3A9.bmp" Act3.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\outlook Act3.exe File opened for modification \??\c:\program files (x86)\the bat! Act3.exe File opened for modification \??\c:\program files\ Act3.exe File opened for modification \??\c:\program files (x86)\bitcoin Act3.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint Act3.exe File opened for modification \??\c:\program files (x86)\microsoft\word Act3.exe File opened for modification \??\c:\program files (x86)\onenote Act3.exe File opened for modification \??\c:\program files (x86)\steam Act3.exe File opened for modification \??\c:\program files (x86)\ Act3.exe File opened for modification \??\c:\program files (x86)\microsoft sql server Act3.exe File opened for modification \??\c:\program files (x86)\microsoft\excel Act3.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote Act3.exe File opened for modification \??\c:\program files (x86)\office Act3.exe File opened for modification \??\c:\program files (x86)\thunderbird Act3.exe File opened for modification \??\c:\program files (x86)\word Act3.exe File opened for modification \??\c:\program files (x86)\excel Act3.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server Act3.exe File opened for modification \??\c:\program files (x86)\microsoft\office Act3.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook Act3.exe File opened for modification \??\c:\program files (x86)\powerpoint Act3.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word Act3.exe File opened for modification \??\c:\windows\ Act3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook Act3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint Act3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Act3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2744 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 5696 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings Act3.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4112 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2744 PING.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 5560 Act3.exe Token: SeCreatePagefilePrivilege 5560 Act3.exe Token: SeDebugPrivilege 5696 taskkill.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5560 wrote to memory of 3924 5560 Act3.exe 89 PID 5560 wrote to memory of 3924 5560 Act3.exe 89 PID 5560 wrote to memory of 3924 5560 Act3.exe 89 PID 5560 wrote to memory of 1520 5560 Act3.exe 91 PID 5560 wrote to memory of 1520 5560 Act3.exe 91 PID 5560 wrote to memory of 1520 5560 Act3.exe 91 PID 5560 wrote to memory of 1264 5560 Act3.exe 102 PID 5560 wrote to memory of 1264 5560 Act3.exe 102 PID 5560 wrote to memory of 1264 5560 Act3.exe 102 PID 5560 wrote to memory of 4112 5560 Act3.exe 103 PID 5560 wrote to memory of 4112 5560 Act3.exe 103 PID 5560 wrote to memory of 4112 5560 Act3.exe 103 PID 5560 wrote to memory of 4156 5560 Act3.exe 105 PID 5560 wrote to memory of 4156 5560 Act3.exe 105 PID 5560 wrote to memory of 4156 5560 Act3.exe 105 PID 4156 wrote to memory of 5696 4156 cmd.exe 107 PID 4156 wrote to memory of 5696 4156 cmd.exe 107 PID 4156 wrote to memory of 5696 4156 cmd.exe 107 PID 4156 wrote to memory of 2744 4156 cmd.exe 108 PID 4156 wrote to memory of 2744 4156 cmd.exe 108 PID 4156 wrote to memory of 2744 4156 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\Act3.exe"C:\Users\Admin\AppData\Local\Temp\Act3.exe"1⤵
- Checks computer location settings
- Drops startup file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5560 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3924
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1520
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___NWRR_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- System Location Discovery: System Language Discovery
PID:1264
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___QB2Y_.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "Act3.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5696
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2744
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4380,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=4128 /prefetch:81⤵PID:5676
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5db7a6283dd38b0986e9825cd9c69886e
SHA199abbd512f2726d77c0721048ffc7262d1864a3e
SHA2566e15dcac22fe91beca5687307e152b65c17e21af4176a35ef20512a88f7117d4
SHA5126c18e27ef136965206c98ecb2891f901b0eee471489a98691ba57a584094f3007bd10fb9980fc5060929cde818bce2d3dcc89fb0598faa5f0a027a0e8427c794
-
Filesize
1KB
MD521deedc89b2acce10aff492a79e4b833
SHA1f89f149d70a315902969bb70a2e6b0d9e8ca2ead
SHA25654ce5fbaa1961e3cc7360b8655bce7802699c623b2763356616636f710e0bc6e
SHA512e987e5f70665fbb4e331cfc82e53283a6ae6cf77d486fa94e88c772a3852dbf795b37367ba33936c5956527e0a512998bce75bc03eaa3184df5f75c38ca6ece3