Analysis
-
max time kernel
124s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 18:12
Static task
static1
Behavioral task
behavioral1
Sample
7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe
Resource
win10v2004-20241007-en
General
-
Target
7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe
-
Size
3.6MB
-
MD5
9324c48eadf64b3c9c3be1724808d47d
-
SHA1
b6f35cd27e57b39d9f25a86dd980fe44fd7576af
-
SHA256
7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951
-
SHA512
128bafe7067f24794bad68c0d7074e7759848ad50f08d2338c949663f8656d44a66ae5cbc82d942d6e69e3a37b0fdf2c3061b88dd852f1e8524d7401fe247111
-
SSDEEP
98304:SwRElZ33Li0XUU3FMi9+Q4m1PQKq39swQHZ:ufnGcUU0xm1PsmlZ
Malware Config
Signatures
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2140-60-0x0000000000400000-0x00000000004C6000-memory.dmp family_sectoprat behavioral1/memory/2140-61-0x0000000000400000-0x00000000004C6000-memory.dmp family_sectoprat -
Sectoprat family
-
Executes dropped EXE 4 IoCs
pid Process 2528 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 1344 electronics.exe 2676 electronics.exe -
Loads dropped DLL 3 IoCs
pid Process 2444 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 3032 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\afhfcca = "\"C:\\ddffhkh\\AutoIt3.exe\" C:\\ddffhkh\\afhfcca.a3x" electronics.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 5 pastebin.com 6 pastebin.com 8 pastebin.com -
Enumerates processes with tasklist 1 TTPs 6 IoCs
pid Process 2640 tasklist.exe 2668 tasklist.exe 2504 tasklist.exe 1372 tasklist.exe 1900 tasklist.exe 2124 tasklist.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2676 set thread context of 2140 2676 electronics.exe 65 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language electronics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language electronics.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1612 cmd.exe 2920 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 electronics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString electronics.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2920 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2640 tasklist.exe Token: SeDebugPrivilege 2668 tasklist.exe Token: SeDebugPrivilege 2504 tasklist.exe Token: SeDebugPrivilege 1372 tasklist.exe Token: SeDebugPrivilege 1900 tasklist.exe Token: SeDebugPrivilege 2124 tasklist.exe Token: SeDebugPrivilege 2140 MSBuild.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2528 2444 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 30 PID 2444 wrote to memory of 2528 2444 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 30 PID 2444 wrote to memory of 2528 2444 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 30 PID 2444 wrote to memory of 2528 2444 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 30 PID 2444 wrote to memory of 2528 2444 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 30 PID 2444 wrote to memory of 2528 2444 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 30 PID 2444 wrote to memory of 2528 2444 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 30 PID 2528 wrote to memory of 3032 2528 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 31 PID 2528 wrote to memory of 3032 2528 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 31 PID 2528 wrote to memory of 3032 2528 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 31 PID 2528 wrote to memory of 3032 2528 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 31 PID 3032 wrote to memory of 2320 3032 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 32 PID 3032 wrote to memory of 2320 3032 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 32 PID 3032 wrote to memory of 2320 3032 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 32 PID 3032 wrote to memory of 2320 3032 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 32 PID 3032 wrote to memory of 2320 3032 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 32 PID 3032 wrote to memory of 2320 3032 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 32 PID 3032 wrote to memory of 2320 3032 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 32 PID 2320 wrote to memory of 2740 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 34 PID 2320 wrote to memory of 2740 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 34 PID 2320 wrote to memory of 2740 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 34 PID 2320 wrote to memory of 2740 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 34 PID 2740 wrote to memory of 2640 2740 cmd.exe 36 PID 2740 wrote to memory of 2640 2740 cmd.exe 36 PID 2740 wrote to memory of 2640 2740 cmd.exe 36 PID 2740 wrote to memory of 2108 2740 cmd.exe 37 PID 2740 wrote to memory of 2108 2740 cmd.exe 37 PID 2740 wrote to memory of 2108 2740 cmd.exe 37 PID 2320 wrote to memory of 2628 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 39 PID 2320 wrote to memory of 2628 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 39 PID 2320 wrote to memory of 2628 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 39 PID 2320 wrote to memory of 2628 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 39 PID 2628 wrote to memory of 2668 2628 cmd.exe 41 PID 2628 wrote to memory of 2668 2628 cmd.exe 41 PID 2628 wrote to memory of 2668 2628 cmd.exe 41 PID 2628 wrote to memory of 2692 2628 cmd.exe 42 PID 2628 wrote to memory of 2692 2628 cmd.exe 42 PID 2628 wrote to memory of 2692 2628 cmd.exe 42 PID 2320 wrote to memory of 3064 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 43 PID 2320 wrote to memory of 3064 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 43 PID 2320 wrote to memory of 3064 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 43 PID 2320 wrote to memory of 3064 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 43 PID 3064 wrote to memory of 2504 3064 cmd.exe 45 PID 3064 wrote to memory of 2504 3064 cmd.exe 45 PID 3064 wrote to memory of 2504 3064 cmd.exe 45 PID 3064 wrote to memory of 2412 3064 cmd.exe 46 PID 3064 wrote to memory of 2412 3064 cmd.exe 46 PID 3064 wrote to memory of 2412 3064 cmd.exe 46 PID 2320 wrote to memory of 1756 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 47 PID 2320 wrote to memory of 1756 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 47 PID 2320 wrote to memory of 1756 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 47 PID 2320 wrote to memory of 1756 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 47 PID 1756 wrote to memory of 1372 1756 cmd.exe 49 PID 1756 wrote to memory of 1372 1756 cmd.exe 49 PID 1756 wrote to memory of 1372 1756 cmd.exe 49 PID 1756 wrote to memory of 848 1756 cmd.exe 50 PID 1756 wrote to memory of 848 1756 cmd.exe 50 PID 1756 wrote to memory of 848 1756 cmd.exe 50 PID 2320 wrote to memory of 1084 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 51 PID 2320 wrote to memory of 1084 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 51 PID 2320 wrote to memory of 1084 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 51 PID 2320 wrote to memory of 1084 2320 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 51 PID 1084 wrote to memory of 1900 1084 cmd.exe 53 PID 1084 wrote to memory of 1900 1084 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe"C:\Users\Admin\AppData\Local\Temp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\is-JI62J.tmp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp"C:\Users\Admin\AppData\Local\Temp\is-JI62J.tmp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp" /SL5="$4014A,1931507,845824,C:\Users\Admin\AppData\Local\Temp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe"C:\Users\Admin\AppData\Local\Temp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe" /VERYSILENT3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\is-OTN7Q.tmp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp"C:\Users\Admin\AppData\Local\Temp\is-OTN7Q.tmp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp" /SL5="$5014A,1931507,845824,C:\Users\Admin\AppData\Local\Temp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\system32\find.exefind /I "wrsa.exe"6⤵PID:2108
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\system32\find.exefind /I "opssvc.exe"6⤵PID:2692
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Windows\system32\find.exefind /I "avastui.exe"6⤵PID:2412
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\system32\find.exefind /I "avgui.exe"6⤵PID:848
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\system32\find.exefind /I "nswscsvc.exe"6⤵PID:1680
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"5⤵PID:1932
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Windows\system32\find.exefind /I "sophoshealth.exe"6⤵PID:2452
-
-
-
C:\Users\Admin\AppData\Roaming\Partition\electronics.exe"C:\Users\Admin\AppData\Roaming\Partition\\electronics.exe" "C:\Users\Admin\AppData\Roaming\Partition\\expulsionist.eml"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1344 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && electronics.exe C:\ProgramData\\25JNivj.a3x && del C:\ProgramData\\25JNivj.a3x6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1612 -
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.17⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2920
-
-
C:\Users\Admin\AppData\Roaming\Partition\electronics.exeelectronics.exe C:\ProgramData\\25JNivj.a3x7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2676 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe8⤵PID:1808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5105b3c4033a1a5b36b0d897d64d2dbc5
SHA102df0cba5c7e52e160747023b523ba511a13eca4
SHA2566871177291918fadb13bb2092c134ec849ca0fbb79289959ddfcc0857872936d
SHA512f0f915618efb70effcbe20897a67001766a74ceacee8b53234d98051c16b7b54a72e78ed1c06b4924725049301f1189f9923b919769dfa7ce48295580751748f
-
Filesize
940KB
MD50577137e38bb6ac64d302158d97e3309
SHA1cd1d921efc0d6749f1c613e6b3f58b5c1cb6d229
SHA25670bb7249d401b402c5e2a095ffc8832b36a3318f66218189ae49d072daee7208
SHA5127eda8e96d0c10eb0c21a29522d2a9d2012fc78788d5a209e9fb9ce10dc9125da6e9678e12675310c33a5dedb7973e5f04fb2e38634f51e57d72ea59fc0a8197b
-
\Users\Admin\AppData\Local\Temp\is-JI62J.tmp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp
Filesize3.2MB
MD560aeeeda4d416077aaa5c9b21e336c5a
SHA12d5e9ecec78620e6664d4828b7ee3576a660a306
SHA256c4df89c1ee343740c7a54a9afbb28c47f3cef86ad53c505553c680bc8c58b569
SHA51246c8d197635cbbdd7089a27579b6dadda1c2598aa70aad9966cfa92a57d07dc2ce91dd585270ac6d2dfac9417e2d98f486ca409cec226731784e17a4115e3c59
-
Filesize
921KB
MD53f58a517f1f4796225137e7659ad2adb
SHA1e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA2561da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634