Overview
overview
10Static
static
5Raid_Recovery.exe
windows7-x64
7Raid_Recovery.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Alligator.exe
windows7-x64
5Alligator.exe
windows10-2004-x64
5MIG_29.dll
windows7-x64
3MIG_29.dll
windows10-2004-x64
3PascalStreams.dll
windows7-x64
3PascalStreams.dll
windows10-2004-x64
3StarBurn.dll
windows7-x64
3StarBurn.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3bs_load.dll
windows7-x64
3bs_load.dll
windows10-2004-x64
3bs_wm.dll
windows7-x64
3bs_wm.dll
windows10-2004-x64
3i386/CbFsMntNtf3.dll
windows7-x64
10i386/CbFsMntNtf3.dll
windows10-2004-x64
10i386/CbFsNetRdr3.dll
windows7-x64
3i386/CbFsNetRdr3.dll
windows10-2004-x64
3i386/cbfs3.sys
windows7-x64
1i386/cbfs3.sys
windows10-2004-x64
1ia64/CbFsMntNtf3.dll
windows7-x64
1ia64/CbFsMntNtf3.dll
windows10-2004-x64
1ia64/CbFsNetRdr3.dll
windows7-x64
1ia64/CbFsNetRdr3.dll
windows10-2004-x64
1wow64sup.exe
windows7-x64
1wow64sup.exe
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 12:23
Behavioral task
behavioral1
Sample
Raid_Recovery.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Raid_Recovery.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Alligator.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Alligator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
MIG_29.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
MIG_29.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
PascalStreams.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
PascalStreams.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
StarBurn.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
StarBurn.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
bs_load.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
bs_load.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
bs_wm.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
bs_wm.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
i386/CbFsMntNtf3.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
i386/CbFsMntNtf3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
i386/CbFsNetRdr3.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
i386/CbFsNetRdr3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
i386/cbfs3.sys
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
i386/cbfs3.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
ia64/CbFsMntNtf3.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
ia64/CbFsMntNtf3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
ia64/CbFsNetRdr3.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
ia64/CbFsNetRdr3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
wow64sup.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
wow64sup.exe
Resource
win10v2004-20241007-en
General
-
Target
Raid_Recovery.exe
-
Size
7.6MB
-
MD5
2535e906ec2e36ef9fb2c94ce851ca8d
-
SHA1
31518d602483f06560010effaa12e99f6610d726
-
SHA256
ae0ba7ecf43d1ee0a4cb8784d3730d56b773b95e7518bd9842d8defed69e83e8
-
SHA512
cf86f3a70a377eee31e8fbab4b2b71cd96e71f81ea04c7475f92ad8d9022b283f7e21eb61c17f52b6c28b4cdafee8f1c914cc3a43063aab6cbcf64f1c55a3dc1
-
SSDEEP
196608:9nrp/d1H8ERh5xMYkegR8M4r2lFQKekvuGrilmtAonBdrLLEAq:rPzd+5v+M6mtuG/dx/2
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate raid_recovery.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion raid_recovery.exe -
Executes dropped EXE 1 IoCs
pid Process 2848 raid_recovery.exe -
Loads dropped DLL 8 IoCs
pid Process 1972 Raid_Recovery.exe 1988 regsvr32.exe 1988 regsvr32.exe 2436 regsvr32.exe 2848 raid_recovery.exe 2848 raid_recovery.exe 2848 raid_recovery.exe 2848 raid_recovery.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\r: raid_recovery.exe File opened (read-only) \??\w: raid_recovery.exe File opened (read-only) \??\Z: raid_recovery.exe File opened (read-only) \??\H: raid_recovery.exe File opened (read-only) \??\k: raid_recovery.exe File opened (read-only) \??\o: raid_recovery.exe File opened (read-only) \??\p: raid_recovery.exe File opened (read-only) \??\h: raid_recovery.exe File opened (read-only) \??\j: raid_recovery.exe File opened (read-only) \??\Q: raid_recovery.exe File opened (read-only) \??\s: raid_recovery.exe File opened (read-only) \??\b: raid_recovery.exe File opened (read-only) \??\e: raid_recovery.exe File opened (read-only) \??\E: raid_recovery.exe File opened (read-only) \??\F: raid_recovery.exe File opened (read-only) \??\u: raid_recovery.exe File opened (read-only) \??\v: raid_recovery.exe File opened (read-only) \??\g: raid_recovery.exe File opened (read-only) \??\n: raid_recovery.exe File opened (read-only) \??\R: raid_recovery.exe File opened (read-only) \??\W: raid_recovery.exe File opened (read-only) \??\S: raid_recovery.exe File opened (read-only) \??\y: raid_recovery.exe File opened (read-only) \??\z: raid_recovery.exe File opened (read-only) \??\D: raid_recovery.exe File opened (read-only) \??\K: raid_recovery.exe File opened (read-only) \??\L: raid_recovery.exe File opened (read-only) \??\m: raid_recovery.exe File opened (read-only) \??\G: raid_recovery.exe File opened (read-only) \??\i: raid_recovery.exe File opened (read-only) \??\J: raid_recovery.exe File opened (read-only) \??\Y: raid_recovery.exe File opened (read-only) \??\P: raid_recovery.exe File opened (read-only) \??\T: raid_recovery.exe File opened (read-only) \??\U: raid_recovery.exe File opened (read-only) \??\x: raid_recovery.exe File opened (read-only) \??\A: raid_recovery.exe File opened (read-only) \??\B: raid_recovery.exe File opened (read-only) \??\I: raid_recovery.exe File opened (read-only) \??\O: raid_recovery.exe File opened (read-only) \??\M: raid_recovery.exe File opened (read-only) \??\V: raid_recovery.exe File opened (read-only) \??\X: raid_recovery.exe File opened (read-only) \??\t: raid_recovery.exe File opened (read-only) \??\a: raid_recovery.exe File opened (read-only) \??\l: raid_recovery.exe File opened (read-only) \??\N: raid_recovery.exe File opened (read-only) \??\q: raid_recovery.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 raid_recovery.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\DiskInternals\RaidRecovery\Alligator.k52 Raid_Recovery.exe File created C:\Program Files (x86)\DiskInternals\RaidRecovery\License.txt Raid_Recovery.exe File created C:\Program Files (x86)\DiskInternals\RaidRecovery\bs_wm.di Raid_Recovery.exe File created C:\Program Files (x86)\DiskInternals\RaidRecovery\raid_recovery.exe Raid_Recovery.exe File created C:\Program Files (x86)\DiskInternals\RaidRecovery\IO.VXD Raid_Recovery.exe File created C:\Program Files (x86)\DiskInternals\RaidRecovery\click.wav Raid_Recovery.exe File created C:\Program Files (x86)\DiskInternals\RaidRecovery\MIG_29.dll Raid_Recovery.exe File created C:\Program Files (x86)\DiskInternals\RaidRecovery\fsm.ini Raid_Recovery.exe File created C:\Program Files (x86)\DiskInternals\RaidRecovery\Uninstall.exe Raid_Recovery.exe File created C:\Program Files (x86)\DiskInternals\RaidRecovery\bs_load.di Raid_Recovery.exe File created C:\Program Files (x86)\DiskInternals\RaidRecovery\cbfs.cab Raid_Recovery.exe File created C:\Program Files (x86)\DiskInternals\RaidRecovery\PascalStreams.dll Raid_Recovery.exe File created C:\Program Files (x86)\DiskInternals\RaidRecovery\StarBurn.dll Raid_Recovery.exe File opened for modification C:\Program Files (x86)\DiskInternals\RaidRecovery\fsm.ini raid_recovery.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Raid_Recovery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raid_recovery.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{3E0FA044-926C-42D9-BA12-EF16E980913B}\CLSID = "{3E0FA044-926C-42D9-BA12-EF16E980913B}" regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{3E0FA044-926C-42D9-BA12-EF16E980913B}\FilterData = 020000000000200001000000000000003070693308000000000000000100000000000000000000003074793300000000380000000000000083eb36e44f52ce119f530020af0ba770 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E0FA044-926C-42D9-BA12-EF16E980913B}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{3E0FA044-926C-42D9-BA12-EF16E980913B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{3E0FA044-926C-42D9-BA12-EF16E980913B}\FriendlyName = "AsyncEx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E0FA044-926C-42D9-BA12-EF16E980913B}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E0FA044-926C-42D9-BA12-EF16E980913B}\InprocServer32\ = "C:\\Program Files (x86)\\DiskInternals\\RaidRecovery\\bs_load.di" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E0FA044-926C-42D9-BA12-EF16E980913B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E0FA044-926C-42D9-BA12-EF16E980913B}\ = "AsyncEx" regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe Token: SeBackupPrivilege 2848 raid_recovery.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 raid_recovery.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2848 raid_recovery.exe 2848 raid_recovery.exe 2848 raid_recovery.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1988 1972 Raid_Recovery.exe 99 PID 1972 wrote to memory of 1988 1972 Raid_Recovery.exe 99 PID 1972 wrote to memory of 1988 1972 Raid_Recovery.exe 99 PID 1972 wrote to memory of 2436 1972 Raid_Recovery.exe 100 PID 1972 wrote to memory of 2436 1972 Raid_Recovery.exe 100 PID 1972 wrote to memory of 2436 1972 Raid_Recovery.exe 100 PID 1972 wrote to memory of 2848 1972 Raid_Recovery.exe 102 PID 1972 wrote to memory of 2848 1972 Raid_Recovery.exe 102 PID 1972 wrote to memory of 2848 1972 Raid_Recovery.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\Raid_Recovery.exe"C:\Users\Admin\AppData\Local\Temp\Raid_Recovery.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\DiskInternals\RaidRecovery\bs_load.di"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1988
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\DiskInternals\RaidRecovery\bs_wm.di"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Program Files (x86)\DiskInternals\RaidRecovery\raid_recovery.exe"C:\Program Files (x86)\DiskInternals\RaidRecovery\raid_recovery.exe"2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD515aacef96e0673400bddae0c3a97462c
SHA151fdb75bd4a27386b960a19308620868c48cff1d
SHA256a767d213f1fa41bddfaad8540f987fbf39516802ace609916f336cb808afd40a
SHA512e07b43379ccc42d8d86342db8437d78bfecca4c9e1033d9691557c27480c98bbed081486db34c74e1f1ce2ecf26376aa92ebd5e0b4e32fcdcabc6a49a26963af
-
Filesize
634KB
MD556c8cd1368ffcf4b1bdfc2e0b5030d70
SHA16186f2983412d0ee5456915550db2012738f9521
SHA25607d3b623c763bd1039b35897933159a264bf127b707d335ddf340ee01d09bda4
SHA5124e082103d09dbcc29fd2e8c0bd844a4856122e0e1d00a22c151703c06381057d1d6a83e2a1266a3bcd60a1a5d686d4081ae7f2d442b820ba921bfdb10b3699dc
-
Filesize
466KB
MD515abbe3c15e018da7ef56841af33cb74
SHA17a91dca0f03b175929ded67625d79a5430c3ceff
SHA256c0980bfddf43bbd6df2441f2dfa46f98f04b7b4d0f4f079b60abaaa21a1ab3e0
SHA512c84e95cca9f8b901fe904937b70c23f7b86dc1037905d8bf0c6f8602a41abf4305bc1eb925447c1b74123d974b2f752eccfdd184ddf6cef6d7eb7194832d2ce1
-
Filesize
64KB
MD51321edc324c693184631b27870745b75
SHA1aadda09fe92940aaac81c7733c3b636ea9592f34
SHA256c00718b18ed6d0ee5021ff1a35f164676385c5b23f40ae332af6ea7805af3a9a
SHA5125ce976ef98ee882f5dc2ae5366e5e08461ffa292b26bc1a24cf2bff52543f4ebd1eeaa3bf07616520d689d7b1afbdde6c3483ce9dfba59eb0ebaca3f170a9a4b
-
Filesize
563B
MD5a1864a915f325991d70fba392d0de155
SHA1cec19619d4f562cc14cadfe3a4c04675c4db9198
SHA25668392cd7c819c2ad799e05a1d1298bb4a6c1f535fbfdcb1ded346805ad5ac99a
SHA5126ab5a907937d42372a02fe5b49dd9fbef4d2a828f164f84b279eec3a47b13d812588dd410a0ae040478272f0eff5ae00838d7ec96f203f8a4df31a0bc4ffe13d
-
Filesize
3.9MB
MD58738ac2b86e0e4feacd61ef379fd8c3c
SHA13ad50fc46b8cdb54945d0d53980a3b2c05981860
SHA2560128c1a51b30a5d7f47bbed834abdb84f89c81cd4f19101c4dfcfa13d3d9c9c2
SHA512bf8ec6fcc2a8cf9f27fb74307464b3e08475cf2329d03287c2f6a81f42cc5f563184ed2e2b97517700bbecf43d7aaef6bce506f8a82a2b34795247fddcbcb4a2
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
699B
MD569869235f6b105ad9b0d18ae014c24eb
SHA144f6338adcda03e0bb68c1bf61c59b63f3dba565
SHA256de8aa18c9e89db1296aed23847417ba1fdad5cba2eccf19738129f881fd2472a
SHA5121cc1a948bba33e47baffd89362b7b321a0c0bf8bc8b655f0213f519ce94fb40b74ee7f5ea2a0ee68974857b7d8d0608f0bbdd88d87e15987c8a590aabe29ebca
-
Filesize
712B
MD569cc7ad9c1e01d652f3d2a978627de87
SHA161af2412dae24606c2de90629ee5e4ea945c135e
SHA25666b542659d2bb0a2e4395b67adeb36e4982da4bdfa1a3c86647bc7549b94886d
SHA5129941dac81a9bf4115649e675d0c8013d3291d91961793bf3e58b55d75f9869df86f9ac42e937bf1e95cfb1e1a2e09d380f5ca1d7ab882d405b43ba5867ed05fa
-
Filesize
722B
MD512459eb468729862b7409fc9040e15f2
SHA10002a5e68a69864c433633f770620d54f4b8f698
SHA256179e9207c7f3f11dfa69283d5c87deccacd631eb0026bd2a3ab488e4ef8b1eaa
SHA51281b23c09a0b67c0238c22c668cb338e7be2f0da1685ec52c2cf4f97a8e3a928901f11300008e9b6ef315bca7ea78550fe3bfcca1370298b2fa529e479ced5cd7