Analysis
-
max time kernel
150s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe
Resource
win7-20220901-en
General
-
Target
46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe
-
Size
939KB
-
MD5
0b1a8a3af1e535c380e1e381403bdc26
-
SHA1
57a21c1a15633fccdf44e5e90586697fcf06845e
-
SHA256
46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da
-
SHA512
d046fb6e1777203ceeda01043049cc2ea0ec12b66a30a5beed3d07f8fdee697dc13099b71f9eddd9b17cd570826c0d0ce1b72be2054c2c1b94e8143f046ca6d3
-
SSDEEP
24576:qtAR6eiZjTtzR6/Hlx8rdUZYUqdmW+WxF:qtAR6/tr6/Hc5wQ6gF
Malware Config
Extracted
cybergate
2.6
vítima
longinos000.no-ip.org:880
Jackal
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
win33.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Visite mais vezes meu site e fique à vontade! Forte abraço!
-
message_box_title
Parabéns!
-
password
jmp007
-
regkey_hkcu
win33
-
regkey_hklm
win33
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run atfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\win33.exe" atfmon.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run atfmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\win33.exe" atfmon.exe -
Executes dropped EXE 6 IoCs
pid Process 2040 atfmon.exe 1812 Project1.exe 856 atfmon.exe 580 atfmon.exe 1428 win33.exe 1616 win33.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{1BNU1L86-10D3-WKIJ-31I1-MS1S05VH5XKN} atfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1BNU1L86-10D3-WKIJ-31I1-MS1S05VH5XKN}\StubPath = "C:\\Windows\\system32\\install\\win33.exe Restart" atfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{1BNU1L86-10D3-WKIJ-31I1-MS1S05VH5XKN} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1BNU1L86-10D3-WKIJ-31I1-MS1S05VH5XKN}\StubPath = "C:\\Windows\\system32\\install\\win33.exe" explorer.exe -
resource yara_rule behavioral1/files/0x000500000000b2d2-58.dat upx behavioral1/files/0x000500000000b2d2-57.dat upx behavioral1/files/0x000500000000b2d2-60.dat upx behavioral1/files/0x000500000000b2d2-66.dat upx behavioral1/files/0x000500000000b2d2-67.dat upx behavioral1/memory/2040-81-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/files/0x000500000000b2d2-79.dat upx behavioral1/memory/856-86-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/856-95-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/1640-100-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/files/0x00080000000126c8-102.dat upx behavioral1/memory/1640-103-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/856-105-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral1/files/0x000500000000b2d2-108.dat upx behavioral1/files/0x000500000000b2d2-111.dat upx behavioral1/memory/856-113-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral1/memory/580-119-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral1/memory/580-120-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral1/memory/580-121-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/files/0x00080000000126c8-122.dat upx behavioral1/files/0x00080000000126c8-123.dat upx behavioral1/files/0x00080000000126c8-125.dat upx behavioral1/files/0x00080000000126c8-138.dat upx behavioral1/memory/1428-140-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/memory/580-146-0x0000000024160000-0x00000000241C2000-memory.dmp upx -
Loads dropped DLL 8 IoCs
pid Process 1768 46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe 1768 46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe 1768 46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe 1768 46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe 2040 atfmon.exe 856 atfmon.exe 580 atfmon.exe 580 atfmon.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run atfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\win33 = "C:\\Windows\\system32\\install\\win33.exe" atfmon.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run atfmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\win33 = "C:\\Windows\\system32\\install\\win33.exe" atfmon.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2040-81-0x0000000000400000-0x00000000004A8000-memory.dmp autoit_exe behavioral1/memory/1428-140-0x0000000000400000-0x00000000004A8000-memory.dmp autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\win33.exe atfmon.exe File opened for modification C:\Windows\SysWOW64\install\win33.exe atfmon.exe File opened for modification C:\Windows\SysWOW64\install\win33.exe atfmon.exe File opened for modification C:\Windows\SysWOW64\install\ atfmon.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2040 set thread context of 856 2040 atfmon.exe 29 PID 1428 set thread context of 1616 1428 win33.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 856 atfmon.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 580 atfmon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 580 atfmon.exe Token: SeDebugPrivilege 580 atfmon.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 856 atfmon.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1768 46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2040 1768 46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe 27 PID 1768 wrote to memory of 2040 1768 46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe 27 PID 1768 wrote to memory of 2040 1768 46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe 27 PID 1768 wrote to memory of 2040 1768 46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe 27 PID 1768 wrote to memory of 1812 1768 46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe 28 PID 1768 wrote to memory of 1812 1768 46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe 28 PID 1768 wrote to memory of 1812 1768 46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe 28 PID 1768 wrote to memory of 1812 1768 46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe 28 PID 2040 wrote to memory of 856 2040 atfmon.exe 29 PID 2040 wrote to memory of 856 2040 atfmon.exe 29 PID 2040 wrote to memory of 856 2040 atfmon.exe 29 PID 2040 wrote to memory of 856 2040 atfmon.exe 29 PID 2040 wrote to memory of 856 2040 atfmon.exe 29 PID 2040 wrote to memory of 856 2040 atfmon.exe 29 PID 2040 wrote to memory of 856 2040 atfmon.exe 29 PID 2040 wrote to memory of 856 2040 atfmon.exe 29 PID 2040 wrote to memory of 856 2040 atfmon.exe 29 PID 2040 wrote to memory of 856 2040 atfmon.exe 29 PID 2040 wrote to memory of 856 2040 atfmon.exe 29 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12 PID 856 wrote to memory of 1204 856 atfmon.exe 12
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe"C:\Users\Admin\AppData\Local\Temp\46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\atfmon.exe"C:\Users\Admin\AppData\Local\Temp\atfmon.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\atfmon.exe"C:\Users\Admin\AppData\Local\Temp\atfmon.exe"4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵
- Modifies Installed Components in the registry
PID:1640
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\atfmon.exe"C:\Users\Admin\AppData\Local\Temp\atfmon.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:580 -
C:\Windows\SysWOW64\install\win33.exe"C:\Windows\system32\install\win33.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1428 -
C:\Windows\SysWOW64\install\win33.exe"C:\Windows\SysWOW64\install\win33.exe"7⤵
- Executes dropped EXE
PID:1616
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Project1.exe"C:\Users\Admin\AppData\Local\Temp\Project1.exe"3⤵
- Executes dropped EXE
PID:1812
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD57330c45953580f5c5f1370ec581d2a86
SHA18bf107bd9095250e7bdfdb3e045f4d57a1ec060e
SHA256257101420b298663a6b8bd060a08c94709d6d8ef1e59d1225b7da28cb689379d
SHA5120c454feb498a9cc5e57016c947708a19c8cb73803d66137e03b14cc31b86ae3e7055233c9bffbced35f8a441a8a4934fc7fb1e8d471d6b60d3744570dafe493e
-
Filesize
229KB
MD58971290bf33174b3f56e1b77cb594646
SHA129db22c7b1cb86edace85b01d09aba0817225be4
SHA2565b5606a080e6850193336faaa26f157edb0e1a1bb9b2b4fa4c7f2b029c2878d2
SHA51271c54e0beb798ad6056251da3ec9f31352da8c2405b7ca30cfaa41a119b00bd8408b385bcec4c604c425b0a5b0edcaec2be2df63d0f575cb77a7ebec423d4b48
-
Filesize
544KB
MD57c4a40ce4680ca75278dc9739c7325e1
SHA1361e247336a706bec835bf4246b3db134f9e30f2
SHA25653e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a
SHA512fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2
-
Filesize
544KB
MD57c4a40ce4680ca75278dc9739c7325e1
SHA1361e247336a706bec835bf4246b3db134f9e30f2
SHA25653e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a
SHA512fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2
-
Filesize
544KB
MD57c4a40ce4680ca75278dc9739c7325e1
SHA1361e247336a706bec835bf4246b3db134f9e30f2
SHA25653e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a
SHA512fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2
-
Filesize
544KB
MD57c4a40ce4680ca75278dc9739c7325e1
SHA1361e247336a706bec835bf4246b3db134f9e30f2
SHA25653e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a
SHA512fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2
-
Filesize
544KB
MD57c4a40ce4680ca75278dc9739c7325e1
SHA1361e247336a706bec835bf4246b3db134f9e30f2
SHA25653e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a
SHA512fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2
-
Filesize
544KB
MD57c4a40ce4680ca75278dc9739c7325e1
SHA1361e247336a706bec835bf4246b3db134f9e30f2
SHA25653e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a
SHA512fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2
-
Filesize
544KB
MD57c4a40ce4680ca75278dc9739c7325e1
SHA1361e247336a706bec835bf4246b3db134f9e30f2
SHA25653e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a
SHA512fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2
-
Filesize
382KB
MD57330c45953580f5c5f1370ec581d2a86
SHA18bf107bd9095250e7bdfdb3e045f4d57a1ec060e
SHA256257101420b298663a6b8bd060a08c94709d6d8ef1e59d1225b7da28cb689379d
SHA5120c454feb498a9cc5e57016c947708a19c8cb73803d66137e03b14cc31b86ae3e7055233c9bffbced35f8a441a8a4934fc7fb1e8d471d6b60d3744570dafe493e
-
Filesize
382KB
MD57330c45953580f5c5f1370ec581d2a86
SHA18bf107bd9095250e7bdfdb3e045f4d57a1ec060e
SHA256257101420b298663a6b8bd060a08c94709d6d8ef1e59d1225b7da28cb689379d
SHA5120c454feb498a9cc5e57016c947708a19c8cb73803d66137e03b14cc31b86ae3e7055233c9bffbced35f8a441a8a4934fc7fb1e8d471d6b60d3744570dafe493e
-
Filesize
544KB
MD57c4a40ce4680ca75278dc9739c7325e1
SHA1361e247336a706bec835bf4246b3db134f9e30f2
SHA25653e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a
SHA512fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2
-
Filesize
544KB
MD57c4a40ce4680ca75278dc9739c7325e1
SHA1361e247336a706bec835bf4246b3db134f9e30f2
SHA25653e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a
SHA512fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2
-
Filesize
544KB
MD57c4a40ce4680ca75278dc9739c7325e1
SHA1361e247336a706bec835bf4246b3db134f9e30f2
SHA25653e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a
SHA512fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2
-
Filesize
544KB
MD57c4a40ce4680ca75278dc9739c7325e1
SHA1361e247336a706bec835bf4246b3db134f9e30f2
SHA25653e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a
SHA512fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2
-
Filesize
544KB
MD57c4a40ce4680ca75278dc9739c7325e1
SHA1361e247336a706bec835bf4246b3db134f9e30f2
SHA25653e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a
SHA512fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2
-
Filesize
544KB
MD57c4a40ce4680ca75278dc9739c7325e1
SHA1361e247336a706bec835bf4246b3db134f9e30f2
SHA25653e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a
SHA512fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2