Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 18:44
Static task
static1
Behavioral task
behavioral1
Sample
DuckMatter.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
DuckMatter.exe
Resource
win10v2004-20241007-en
General
-
Target
DuckMatter.exe
-
Size
1.2MB
-
MD5
9908fef6dfd69de72ffa10ae467c2502
-
SHA1
173888707b098b976976cd1ed0f3e57905de4d4b
-
SHA256
31619be786bd17a126d0962c80871e93ea9263880cd98fad5a8aa450525e24d6
-
SHA512
2eab6699e11a3fe7ea2956dc2ff1221b001f67ee4fd08eb7140fd6dfabbeb351b61680374cc46f2f8bb07abf5d945554f84ba0dded166eb572666397ba3fdaf9
-
SSDEEP
24576:Ep5OqtY0d/FzUuYnpaoW0yVdd0NRHp7xMsO4xt/5PQhHJ:KOqtYMzOAtnditRxMsr5PsHJ
Malware Config
Signatures
-
Detect Vidar Stealer 4 IoCs
resource yara_rule behavioral1/memory/2736-75-0x0000000003450000-0x0000000003689000-memory.dmp family_vidar_v7 behavioral1/memory/2736-74-0x0000000003450000-0x0000000003689000-memory.dmp family_vidar_v7 behavioral1/memory/2736-209-0x0000000003450000-0x0000000003689000-memory.dmp family_vidar_v7 behavioral1/memory/2736-210-0x0000000003450000-0x0000000003689000-memory.dmp family_vidar_v7 -
Vidar family
-
Deletes itself 1 IoCs
pid Process 2736 Conditioning.com -
Executes dropped EXE 1 IoCs
pid Process 2736 Conditioning.com -
Loads dropped DLL 1 IoCs
pid Process 2308 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2312 tasklist.exe 2824 tasklist.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SteadySpokesman DuckMatter.exe File opened for modification C:\Windows\EndorsementHistoric DuckMatter.exe File opened for modification C:\Windows\ClassifiedsReduction DuckMatter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Conditioning.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DuckMatter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Conditioning.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Conditioning.com -
Delays execution with timeout.exe 1 IoCs
pid Process 2508 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Conditioning.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Conditioning.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Conditioning.com -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2736 Conditioning.com 2736 Conditioning.com 2736 Conditioning.com 2736 Conditioning.com 2736 Conditioning.com 2736 Conditioning.com 2736 Conditioning.com 2736 Conditioning.com 2736 Conditioning.com 2736 Conditioning.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2312 tasklist.exe Token: SeDebugPrivilege 2824 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2736 Conditioning.com 2736 Conditioning.com 2736 Conditioning.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2736 Conditioning.com 2736 Conditioning.com 2736 Conditioning.com -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2308 2596 DuckMatter.exe 30 PID 2596 wrote to memory of 2308 2596 DuckMatter.exe 30 PID 2596 wrote to memory of 2308 2596 DuckMatter.exe 30 PID 2596 wrote to memory of 2308 2596 DuckMatter.exe 30 PID 2308 wrote to memory of 2312 2308 cmd.exe 32 PID 2308 wrote to memory of 2312 2308 cmd.exe 32 PID 2308 wrote to memory of 2312 2308 cmd.exe 32 PID 2308 wrote to memory of 2312 2308 cmd.exe 32 PID 2308 wrote to memory of 2620 2308 cmd.exe 33 PID 2308 wrote to memory of 2620 2308 cmd.exe 33 PID 2308 wrote to memory of 2620 2308 cmd.exe 33 PID 2308 wrote to memory of 2620 2308 cmd.exe 33 PID 2308 wrote to memory of 2824 2308 cmd.exe 35 PID 2308 wrote to memory of 2824 2308 cmd.exe 35 PID 2308 wrote to memory of 2824 2308 cmd.exe 35 PID 2308 wrote to memory of 2824 2308 cmd.exe 35 PID 2308 wrote to memory of 2848 2308 cmd.exe 36 PID 2308 wrote to memory of 2848 2308 cmd.exe 36 PID 2308 wrote to memory of 2848 2308 cmd.exe 36 PID 2308 wrote to memory of 2848 2308 cmd.exe 36 PID 2308 wrote to memory of 2968 2308 cmd.exe 37 PID 2308 wrote to memory of 2968 2308 cmd.exe 37 PID 2308 wrote to memory of 2968 2308 cmd.exe 37 PID 2308 wrote to memory of 2968 2308 cmd.exe 37 PID 2308 wrote to memory of 2320 2308 cmd.exe 38 PID 2308 wrote to memory of 2320 2308 cmd.exe 38 PID 2308 wrote to memory of 2320 2308 cmd.exe 38 PID 2308 wrote to memory of 2320 2308 cmd.exe 38 PID 2308 wrote to memory of 2696 2308 cmd.exe 39 PID 2308 wrote to memory of 2696 2308 cmd.exe 39 PID 2308 wrote to memory of 2696 2308 cmd.exe 39 PID 2308 wrote to memory of 2696 2308 cmd.exe 39 PID 2308 wrote to memory of 2536 2308 cmd.exe 40 PID 2308 wrote to memory of 2536 2308 cmd.exe 40 PID 2308 wrote to memory of 2536 2308 cmd.exe 40 PID 2308 wrote to memory of 2536 2308 cmd.exe 40 PID 2308 wrote to memory of 2736 2308 cmd.exe 41 PID 2308 wrote to memory of 2736 2308 cmd.exe 41 PID 2308 wrote to memory of 2736 2308 cmd.exe 41 PID 2308 wrote to memory of 2736 2308 cmd.exe 41 PID 2308 wrote to memory of 1052 2308 cmd.exe 42 PID 2308 wrote to memory of 1052 2308 cmd.exe 42 PID 2308 wrote to memory of 1052 2308 cmd.exe 42 PID 2308 wrote to memory of 1052 2308 cmd.exe 42 PID 2736 wrote to memory of 2460 2736 Conditioning.com 45 PID 2736 wrote to memory of 2460 2736 Conditioning.com 45 PID 2736 wrote to memory of 2460 2736 Conditioning.com 45 PID 2736 wrote to memory of 2460 2736 Conditioning.com 45 PID 2460 wrote to memory of 2508 2460 cmd.exe 47 PID 2460 wrote to memory of 2508 2460 cmd.exe 47 PID 2460 wrote to memory of 2508 2460 cmd.exe 47 PID 2460 wrote to memory of 2508 2460 cmd.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\DuckMatter.exe"C:\Users\Admin\AppData\Local\Temp\DuckMatter.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Camcorders Camcorders.cmd & Camcorders.cmd2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1217593⤵
- System Location Discovery: System Language Discovery
PID:2968
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Including3⤵
- System Location Discovery: System Language Discovery
PID:2320
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Contracts" Food3⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Dial + ..\Reaction + ..\Rw + ..\More C3⤵
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\121759\Conditioning.comConditioning.com C3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\121759\Conditioning.com" & rd /s /q "C:\ProgramData\VAS26F37QIEU" & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2508
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:1052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc75c303ce522adf71722196bd45170
SHA122acddf8229ba06d0684ce8ed40702d14d635e96
SHA2560cf515a591f0cf489feccbc75fffffe0962ce22f848fe898882d6418e83d18bc
SHA5124ea5e69c8f2ed329deb660165ef670f0a6bd1efd073edbda7779fef71444627acfb7bb814501971fa6c321f6be72767a13fc275b32947f27160155e5aa8b3987
-
Filesize
281KB
MD53bf50099b20498ddd1ba273763a8bf2a
SHA166fb6dc9fd5c6a1945868aa57d4d85b7747de5fc
SHA256eafa6fb1e47f7ac7763d334901adf18ec11305767ef65aadb9a4b97ff322c818
SHA5123485a4dddb598629ae5d3ed91ae8b165725c434b09a31db30cecca337e98527ad5570283e97180996b1f71d11d997fb93a36a2e09cac68680054cc2e23f125dc
-
Filesize
89KB
MD5423e53801596a3754f3381b00520324d
SHA1af7edcc9397fb76ecf2565069d6a8a463aaad356
SHA2565e239df69afe95bf5f6b7f2c73734f5077f0e81e68d335d1afc8a02095a08d44
SHA512d03b2661b36575b2b7bf0973e9c7d7aef5e2bbd9cd2d5c79d387235de6705c9fc525cb4887754b7a2cde3bc6d712c51b0d400016e570ae9ccf893d8342ac6db2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
52KB
MD5beca63186b42e3bd6e4fa41c8267cafb
SHA12752ce8c9f0e4147258ad7ee353e1cb7e1f21d2a
SHA25622cabd142ba36370e14bc6e12be12447a0b6e076f5d0321af3aa03cf90535ddb
SHA5121d30809c114a2ea2d09110f1b375fbe4e571a48bc7e0a999d6ea7f65db13050275beb3468a2ecdca7fbdfaf98702c679abb5d6f5b4b0ec694b20e5cc86a9870f
-
Filesize
32KB
MD53301e26e06a9bdd9a1bc170c69e81c42
SHA1b37eee171583d38339d47ad58245a3e1995b6773
SHA25672d32e2ee62983f9a970a2c3fba99ffd16a568ecbdce30414137bccb357ddb8d
SHA512e2f396a7ea35303ca30c508360c5308f7caad4d4b0e531a8abc7d5af9c91540c3ccbd7aeffad4d16f8195789c41a882031c025e2f8040718a0fdfa4ec6a456d2
-
Filesize
70KB
MD586535bd717538f76a712051215acffe0
SHA1a35d175c770619532670489e220f7aea33e31b82
SHA256ec71593a937b600a439fedd5c08443dd33f3fff54db79cb4c2fe1e8b115304a4
SHA51205a6ede5dac033a468c19c665c8deb2ae07127548c43d1036b147ef97a660b61c91f9dcf6e11d7583fcdae9c6e1f86f91e7f6b3121be62970f1e54a158a69ec4
-
Filesize
116KB
MD51e9912d485a7aa78f66dcc4600767d05
SHA18a54fd29685f4459f560e45614fd3247d372faeb
SHA2560883bac437e48a02304fcb60f479cdddf341897f6efbff702fc97e2c62f4629b
SHA512b3fe37cbf93dcd863a594723acb26c65779c194f292262fdc5c8d869a6e77a8d041e243fbb9e982deda8db23e0872f58659269d831ccc522a76eb06e08130f4e
-
Filesize
94KB
MD56c35273608049b0a414a70922432ed56
SHA1535a9553219e4e5eda492fbcdcff3ad0dc30c014
SHA256897467d02361d67ae47453019aa1a707bdb05fe4895ff2eb0f648117e4c9a9e0
SHA512ed6bc781547695d02ac5cedff311e00cc103b9d8df9012f09ccaa2a658b388519eb49995ef67db46d2e254d90756aeba76084faa9780e534ea5bf790d20bf897
-
Filesize
75KB
MD5dd30b08b16b5673809ddcf69c9520716
SHA19bdce7a52d0ae11d3a4cb0554d468f1aee7952df
SHA256f9e21ab38541c29b29640d6065ebdb3e465c9b5c42b2c8d88930531e7ea592de
SHA512e351ca9aeda50efef57b8a497554be6a6ae2485ee06183794d5d07129dbfba2bffff64bd8563bc7994b07be2da5e4f09b55599a68b45b433875af32606d1948b
-
Filesize
495B
MD5ae9aa8b1fc2a881cc5e432fa722a123b
SHA1a72d7db7e2383bd7af65889a7480da31338a0610
SHA256970b6f2d200dfc9fa8abb9acda01adda008aef5f3056e6f9017e3582e705b229
SHA512b7ce3d36d9a5227ec1319b5b689b01e07b18f7b9cddedd114f08cac8ee15a200f007239d31a55da4bf132591a4bd18e853bb1fdd99ad35ed42532f4de64745d6
-
Filesize
477KB
MD5c91a63810cd590f88f57d0f011fff7cb
SHA11f496c923982dfd63a4621ed600aa9a1981e61ce
SHA2565beee0043fd30a3838851d29eec944b6c35675a16b8b38ddea0feab9aba40372
SHA5126135a350df50eb367b4a391ff3a819ada11dbcdc58b29eba5877da7b0bfdf4dd5f0ccf46e3b52e5b0a8e20212b02db908fed0db51d435c7af2f16571abb1d322
-
Filesize
82KB
MD532ba40029fb16a3b6501993ae7d4d6e2
SHA18a242625cfdadbb6fb87869531d74d5b3c226e6c
SHA2566b1203b0aa2d77c068474cfca065e673f63128d0d4bf680a9bce73aee8ffa70a
SHA5125c54f37773e6f965fbbf1ac4b8d294be424df389ffe195e818d99155f268775f4cf65081655d1ff119a707e5cd0a1cf47381ffbf4f51dc1c34adc0e4b0438253
-
Filesize
34KB
MD5ace4babbbfab6829c0c5f29b089eb222
SHA113bec11deab5552f45c2ed84f216254f04987eeb
SHA256074c318d048f05403861b195b3099950c528ac93edf9cae4a8a7a223ee3e771c
SHA512a7af2994ef5f1a39d2a5e42f40aa27cf19aeeb0373468e1ada58ccf75dc186fb5680ff573b8465eec010c5ee4121008f0b67fb4c2795b442c3ddb6316b8b3589
-
Filesize
99KB
MD59e60f847c8905bcea5fce1b404be787d
SHA1ccbfa12fa6521de81d135972a4fb5877f6f9876f
SHA25655fe0fce17316361a5d721db3817f49a12a468c078cf219135c2ec82a917ba9c
SHA5127d459081bc497f68a46585baff5dbf8ec9d3be5ef706637a0d6b23ae3394c2d9c0ddf46ff938f8527defa66ce248b9913c39d7ff15b95e11ea50309210f274cd
-
Filesize
54KB
MD53109da05a51e0346c944cc4d5ec69a2d
SHA1c9a6c71f0d89fba62b1b4fe071e71118977cfdb1
SHA2564f654a19fd72c48fe60976adc1f0e8836bdca05469b33c5bd879ff012b69d63f
SHA51249970654f295014a3f4c2d26b329dc4ac1db8ad1fbae58d571e3d01d5236d9d005b86e0a84d00b22500355c98e494f052cf8f31ecc973acdfcea159ff615035a
-
Filesize
62KB
MD57d9756691edb69e4770b28e179021e47
SHA13768e4f6f121cc06fc8e160c6393829ff92ea5f0
SHA256bebf4c78e85da0bff29917f1be0e72abe0a90f049d930009eae626477b15a1d4
SHA5126b5b102c65416843a7c1d726e753459cd00c868ca90bf15ccba4894ba8468f30aaa5ab477afdb88b3c89c865915fc367ec28c93d9308ed2d19fdbfd1fa08a534
-
Filesize
53KB
MD5965e96449ed6f450d230bae35f692d88
SHA15455c2def234a19429c00c1f89204122ec7d647b
SHA2565350a8e80a7319e726181b27e6de22369440dd886a03bb69789458ec4f917528
SHA51238ddfa73d757b8076aa903d0d1928c9ab75eed20df4e3965bf900d47522638c15059cc888e61890526a1eeb2449dd358e160edfe4e7d476b8cbec502b9de2375
-
Filesize
84KB
MD5e1d3296e1a37e1aa1ab6ffec411ad6bb
SHA1d9dfa685019a310206ea86a5c17770d4715ed0c3
SHA256cd653b7b6a15148b0a0a93c796549c6ef4ac6b419fe3934a202589a5e6a20402
SHA5124b49900f88146719010aae4024770e81116a88002dcaf39fb2a403fa3919a6825c80cb36a73f524851ab3d789802daee207aaa5e86027642c9f09b4be72264ad
-
Filesize
116KB
MD52517b87efca5f3bc96f8675597c8bf3a
SHA177166db5b13351515a6aff43becd1852508bab9e
SHA256e1e488a0bbdeb95b8e2a56940080f6cb42a1b24198a469f2293476324243b4f9
SHA512ed6d6ff08834e1401ec8a9eaf53626b93f38b87e1fa61e4dc31f754cadf44fcc26479d534ab95c235b593bdb597fac108a3501cf4e395c719071339305d82916
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
125KB
MD5b31da340190873e96f12aefc7ceafef8
SHA1244b0c459250ada1cae6b3604bb2508a6a9e0520
SHA256d7c247d414377f6f80bd8e5dbb7d33a39326e82114344a0c7cd37799e48f0a41
SHA512ed460c190ddef61c97a5490830042d7b35cc695a61ac79121c1e8e8397e9d773366f11086000e633a98f7126f3a97ce8b2be86801540659715b3c5ca24f6d523
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f