Overview
overview
10Static
static
10706F3EEC32...39D.7z
windows11-21h2-x64
706F3EEC32...39D.7z
windows7-x64
706F3EEC32...39D.7z
windows10-2004-x64
706F3EEC32...39D.7z
windows10-ltsc_2021-x64
706F3EEC32...39D.7z
windows11-21h2-x64
706F3EEC32...9D.exe
windows7-x64
10706F3EEC32...9D.exe
windows7-x64
10706F3EEC32...9D.exe
windows10-2004-x64
10706F3EEC32...9D.exe
windows10-ltsc_2021-x64
10706F3EEC32...9D.exe
windows11-21h2-x64
10Resubmissions
25/03/2025, 13:19
250325-qkkrrszps5 1005/02/2025, 11:22
250205-ngk71strbx 1025/06/2024, 15:43
240625-s6cz6a1gnj 1025/06/2024, 15:17
240625-sn4p6axdma 10Analysis
-
max time kernel
119s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 13:19
Behavioral task
behavioral1
Sample
706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.7z
Resource
win11-20250314-en
Behavioral task
behavioral2
Sample
706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.7z
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.7z
Resource
win10v2004-20250313-en
Behavioral task
behavioral4
Sample
706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.7z
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.7z
Resource
win11-20250314-en
Behavioral task
behavioral6
Sample
706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe
Resource
win7-20241010-en
Behavioral task
behavioral7
Sample
706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe
Resource
win11-20250314-en
General
-
Target
706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe
-
Size
79KB
-
MD5
62a1b4d4b461f4eaae91c70727f71604
-
SHA1
1ced9a7e62aa65faa03eb1ad2bc786e9d9b5f6c2
-
SHA256
706f3eec328e91ff7f66c8f0a2fb9b556325c153a329a2062dc85879c540839d
-
SHA512
d14f989f5f54663c3ea63526a000e8db5d172046e37f412ed47cd31eb14db071b515b854bbb3ab3d2f41f936b6962583aaa0b3ef1236aa2506148813f66ad542
-
SSDEEP
1536:DnICS4ArFnRoHhcVyid9EZZoi+zQ95f8IwdON:QZnmqVyq9EN+M95bwE
Malware Config
Extracted
C:\yHh8Ghp8e.README.txt
blackmatter
http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/72oJjilhMD/6d067a8741848166fa2ac1e69472280c
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/X3452I2VDTHM30QX
Signatures
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Blackmatter family
-
Renames multiple (158) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\yHh8Ghp8e.bmp" 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\yHh8Ghp8e.bmp" 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Modifies Control Panel 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\WallpaperStyle = "10" 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\International 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe -
Modifies registry class 20 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg splwow64.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 splwow64.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 splwow64.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" splwow64.exe -
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2664 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2696 splwow64.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeBackupPrivilege 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Token: SeDebugPrivilege 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Token: 36 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Token: SeImpersonatePrivilege 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Token: SeIncBasePriorityPrivilege 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Token: SeIncreaseQuotaPrivilege 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Token: 33 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Token: SeManageVolumePrivilege 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Token: SeProfSingleProcessPrivilege 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Token: SeRestorePrivilege 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Token: SeSecurityPrivilege 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Token: SeSystemProfilePrivilege 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Token: SeTakeOwnershipPrivilege 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Token: SeShutdownPrivilege 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe Token: SeBackupPrivilege 2480 vssvc.exe Token: SeRestorePrivilege 2480 vssvc.exe Token: SeAuditPrivilege 2480 vssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2696 splwow64.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2664 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe 35 PID 1924 wrote to memory of 2664 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe 35 PID 1924 wrote to memory of 2664 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe 35 PID 1924 wrote to memory of 2664 1924 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe 35 PID 2664 wrote to memory of 2696 2664 NOTEPAD.EXE 36 PID 2664 wrote to memory of 2696 2664 NOTEPAD.EXE 36 PID 2664 wrote to memory of 2696 2664 NOTEPAD.EXE 36 PID 2664 wrote to memory of 2696 2664 NOTEPAD.EXE 36 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exeC:\Users\Admin\AppData\Local\Temp\706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.exe bcdedit /set shutdown /r /f /t 21⤵
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" /p C:\yHh8Ghp8e.README.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2696
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
13KB
MD565be9a6b7af87036dd52de08e00c1eff
SHA1c41a6862d8a507c51cfb89ae8d712a28bcf3c081
SHA2568a684e464c44b00c9429948794393a90c10c210abe3ee2853e0e76968d5958cc
SHA5128ae894f97b924ebc3e3ea06093b37098444aefcf8f6cde38dffa61750d723fdb37cb99f45d8fea57c9a2acd87759712a2b6505934217d0c636314ef864af695e
-
Filesize
1KB
MD51ba53a2b703aeb54647185c18cc1ddbd
SHA10bf081ef67e7c9fb4e55c53f56aa332a17740a7a
SHA25674e29716d6211d4c26ab0c3184affef6f275bfbfab2ec4dd4fb776fb76065173
SHA51215f7a5870ad2decf6b09c56a6b5e3f5803e5071749fd4638470c19e02ef1fd0c4438e8f7e62a9f7b8792cd1893e748def44a0a8026f10c4a0268feecae9cf617