Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 05:32
Behavioral task
behavioral1
Sample
001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1.exe
Resource
win10v2004-20241007-en
General
-
Target
001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1.exe
-
Size
417KB
-
MD5
de41c8ac436c2ea1137e7e142fc4a9b5
-
SHA1
df58cda16f1de9ab273009d5f988c281a6650999
-
SHA256
001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1
-
SHA512
bf7c129bd27808591fcf15ed0d4cddfb22b5580b7f379be884abfc364503d1f69a218ae5adc991f0f20fece57c0a1c92a594d3a01129efa5b8aa7583d2d6dc5a
-
SSDEEP
6144:crZrqFq9eIbJdAS1nqS75MlTrPmsTg8ou0+SRBXcMf1+FnH:X7IbLqS75ozTg8odtRBtenH
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\helpme.bat
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 3 IoCs
resource yara_rule behavioral1/memory/2240-1-0x00000000013B0000-0x000000000141E000-memory.dmp family_chaos behavioral1/files/0x00080000000120fe-6.dat family_chaos behavioral1/memory/2700-8-0x0000000000BA0000-0x0000000000C0E000-memory.dmp family_chaos -
Chaos family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 3 IoCs
pid Process 792 bcdedit.exe 2504 bcdedit.exe 1540 bcdedit.exe -
Renames multiple (194) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2140 wbadmin.exe -
Disables Task Manager via registry modification
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Nexus.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\helpme.bat Nexus.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 Nexus.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\UpdateTask = "C:\\Users\\Admin\\AppData\\Roaming\\Nexus.exe" Nexus.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\RTJA0BV0\desktop.ini Nexus.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Ringtones\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Nexus.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini Nexus.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Nexus.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Nexus.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\25UY7HZX\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini Nexus.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Nexus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Nexus.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Nexus.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini Nexus.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Nexus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Nexus.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JMFEWY8E\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\386UAANV\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Nexus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Nexus.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Nexus.exe File opened for modification C:\Users\Public\Documents\desktop.ini Nexus.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Nexus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Nexus.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\CBCNU6WZ\desktop.ini Nexus.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\desktop.ini Nexus.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B329PW0O\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FXDUII3O\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Nexus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Nexus.exe File opened for modification C:\Users\Admin\Links\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3K0NZPWJ\desktop.ini Nexus.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Nexus.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini Nexus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Nexus.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\Music\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Nexus.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Nexus.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Nexus.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini Nexus.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Nexus.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\Recovery\ReAgent.xml ReAgentc.exe File opened for modification C:\Windows\system32\Recovery ReAgentc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iqkt9iam8.jpg" Nexus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 4 IoCs
pid Process 2192 timeout.exe 1092 timeout.exe 1496 timeout.exe 1864 timeout.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2712 vssadmin.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2700 Nexus.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2240 001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1.exe 2240 001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1.exe 2240 001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1.exe 2700 Nexus.exe 2700 Nexus.exe 2700 Nexus.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 2240 001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1.exe Token: SeDebugPrivilege 2700 Nexus.exe Token: SeBackupPrivilege 2548 vssvc.exe Token: SeRestorePrivilege 2548 vssvc.exe Token: SeAuditPrivilege 2548 vssvc.exe Token: SeIncreaseQuotaPrivilege 908 WMIC.exe Token: SeSecurityPrivilege 908 WMIC.exe Token: SeTakeOwnershipPrivilege 908 WMIC.exe Token: SeLoadDriverPrivilege 908 WMIC.exe Token: SeSystemProfilePrivilege 908 WMIC.exe Token: SeSystemtimePrivilege 908 WMIC.exe Token: SeProfSingleProcessPrivilege 908 WMIC.exe Token: SeIncBasePriorityPrivilege 908 WMIC.exe Token: SeCreatePagefilePrivilege 908 WMIC.exe Token: SeBackupPrivilege 908 WMIC.exe Token: SeRestorePrivilege 908 WMIC.exe Token: SeShutdownPrivilege 908 WMIC.exe Token: SeDebugPrivilege 908 WMIC.exe Token: SeSystemEnvironmentPrivilege 908 WMIC.exe Token: SeRemoteShutdownPrivilege 908 WMIC.exe Token: SeUndockPrivilege 908 WMIC.exe Token: SeManageVolumePrivilege 908 WMIC.exe Token: 33 908 WMIC.exe Token: 34 908 WMIC.exe Token: 35 908 WMIC.exe Token: SeIncreaseQuotaPrivilege 908 WMIC.exe Token: SeSecurityPrivilege 908 WMIC.exe Token: SeTakeOwnershipPrivilege 908 WMIC.exe Token: SeLoadDriverPrivilege 908 WMIC.exe Token: SeSystemProfilePrivilege 908 WMIC.exe Token: SeSystemtimePrivilege 908 WMIC.exe Token: SeProfSingleProcessPrivilege 908 WMIC.exe Token: SeIncBasePriorityPrivilege 908 WMIC.exe Token: SeCreatePagefilePrivilege 908 WMIC.exe Token: SeBackupPrivilege 908 WMIC.exe Token: SeRestorePrivilege 908 WMIC.exe Token: SeShutdownPrivilege 908 WMIC.exe Token: SeDebugPrivilege 908 WMIC.exe Token: SeSystemEnvironmentPrivilege 908 WMIC.exe Token: SeRemoteShutdownPrivilege 908 WMIC.exe Token: SeUndockPrivilege 908 WMIC.exe Token: SeManageVolumePrivilege 908 WMIC.exe Token: 33 908 WMIC.exe Token: 34 908 WMIC.exe Token: 35 908 WMIC.exe Token: SeBackupPrivilege 2212 wbengine.exe Token: SeRestorePrivilege 2212 wbengine.exe Token: SeSecurityPrivilege 2212 wbengine.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2700 2240 001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1.exe 30 PID 2240 wrote to memory of 2700 2240 001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1.exe 30 PID 2240 wrote to memory of 2700 2240 001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1.exe 30 PID 2700 wrote to memory of 2808 2700 Nexus.exe 31 PID 2700 wrote to memory of 2808 2700 Nexus.exe 31 PID 2700 wrote to memory of 2808 2700 Nexus.exe 31 PID 2808 wrote to memory of 2712 2808 cmd.exe 33 PID 2808 wrote to memory of 2712 2808 cmd.exe 33 PID 2808 wrote to memory of 2712 2808 cmd.exe 33 PID 2808 wrote to memory of 908 2808 cmd.exe 36 PID 2808 wrote to memory of 908 2808 cmd.exe 36 PID 2808 wrote to memory of 908 2808 cmd.exe 36 PID 2700 wrote to memory of 1808 2700 Nexus.exe 38 PID 2700 wrote to memory of 1808 2700 Nexus.exe 38 PID 2700 wrote to memory of 1808 2700 Nexus.exe 38 PID 1808 wrote to memory of 792 1808 cmd.exe 40 PID 1808 wrote to memory of 792 1808 cmd.exe 40 PID 1808 wrote to memory of 792 1808 cmd.exe 40 PID 1808 wrote to memory of 2504 1808 cmd.exe 41 PID 1808 wrote to memory of 2504 1808 cmd.exe 41 PID 1808 wrote to memory of 2504 1808 cmd.exe 41 PID 2700 wrote to memory of 2356 2700 Nexus.exe 42 PID 2700 wrote to memory of 2356 2700 Nexus.exe 42 PID 2700 wrote to memory of 2356 2700 Nexus.exe 42 PID 2356 wrote to memory of 2140 2356 cmd.exe 44 PID 2356 wrote to memory of 2140 2356 cmd.exe 44 PID 2356 wrote to memory of 2140 2356 cmd.exe 44 PID 2700 wrote to memory of 1676 2700 Nexus.exe 49 PID 2700 wrote to memory of 1676 2700 Nexus.exe 49 PID 2700 wrote to memory of 1676 2700 Nexus.exe 49 PID 1676 wrote to memory of 828 1676 cmd.exe 51 PID 1676 wrote to memory of 828 1676 cmd.exe 51 PID 1676 wrote to memory of 828 1676 cmd.exe 51 PID 1676 wrote to memory of 1540 1676 cmd.exe 52 PID 1676 wrote to memory of 1540 1676 cmd.exe 52 PID 1676 wrote to memory of 1540 1676 cmd.exe 52 PID 1676 wrote to memory of 2192 1676 cmd.exe 53 PID 1676 wrote to memory of 2192 1676 cmd.exe 53 PID 1676 wrote to memory of 2192 1676 cmd.exe 53 PID 1676 wrote to memory of 1092 1676 cmd.exe 54 PID 1676 wrote to memory of 1092 1676 cmd.exe 54 PID 1676 wrote to memory of 1092 1676 cmd.exe 54 PID 1676 wrote to memory of 1496 1676 cmd.exe 55 PID 1676 wrote to memory of 1496 1676 cmd.exe 55 PID 1676 wrote to memory of 1496 1676 cmd.exe 55 PID 1676 wrote to memory of 1864 1676 cmd.exe 56 PID 1676 wrote to memory of 1864 1676 cmd.exe 56 PID 1676 wrote to memory of 1864 1676 cmd.exe 56 PID 1676 wrote to memory of 2036 1676 cmd.exe 57 PID 1676 wrote to memory of 2036 1676 cmd.exe 57 PID 1676 wrote to memory of 2036 1676 cmd.exe 57 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1.exe"C:\Users\Admin\AppData\Local\Temp\001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Roaming\Nexus.exe"C:\Users\Admin\AppData\Roaming\Nexus.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2712
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:792
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:2504
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:2140
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\helpme.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\ReAgentc.exereagentc /disable4⤵
- Drops file in System32 directory
PID:828
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /delete {current}4⤵
- Modifies boot configuration data using bcdedit
PID:1540
-
-
C:\Windows\system32\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
PID:2192
-
-
C:\Windows\system32\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
PID:1092
-
-
C:\Windows\system32\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
PID:1496
-
-
C:\Windows\system32\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
PID:1864
-
-
C:\Windows\system32\mode.commode 130,304⤵PID:2036
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2928
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2904
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD57ad3c97081449794ad1c475f0fd504af
SHA1080a56cfcb25c60c420247f85913c22f80c1ff27
SHA2563f53c6b79e260789adb7f0f4c40ceb952d234fcc28c5c1544e85840a2dcf504c
SHA512f586e8cac78d4b1a4ed9e58145fbf9f5825d3f24b5490c2342622bc7413947b660a89919a0c880131fb459ac3bf43f97ab9fb9843a38c5ede5e90929d808cfe2
-
Filesize
417KB
MD5de41c8ac436c2ea1137e7e142fc4a9b5
SHA1df58cda16f1de9ab273009d5f988c281a6650999
SHA256001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1
SHA512bf7c129bd27808591fcf15ed0d4cddfb22b5580b7f379be884abfc364503d1f69a218ae5adc991f0f20fece57c0a1c92a594d3a01129efa5b8aa7583d2d6dc5a
-
Filesize
1B
MD5d1457b72c3fb323a2671125aef3eab5d
SHA15bab61eb53176449e25c2c82f172b82cb13ffb9d
SHA2568a8de823d5ed3e12746a62ef169bcf372be0ca44f0a1236abc35df05d96928e1
SHA512ca63c07ad35d8c9fb0c92d6146759b122d4ec5d3f67ebe2f30ddb69f9e6c9fd3bf31a5e408b08f1d4d9cd68120cced9e57f010bef3cde97653fed5470da7d1a0