Analysis
-
max time kernel
161s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:59
Static task
static1
Behavioral task
behavioral1
Sample
0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe
Resource
win7-20220812-en
General
-
Target
0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe
-
Size
3.3MB
-
MD5
26a881839c80565b4687cc065cc91285
-
SHA1
20b862779f4567ee82bbddbc7269fbca23cd16b8
-
SHA256
0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6
-
SHA512
bc887ca4b1587d096acbeef6675848936e8c201d0da1daaa3dbb642a9bddfb5a4a8df7bfeb1d74085427f298b6fdd70f7d75491fb4e2a66cb51d2b90d15ea730
-
SSDEEP
49152:gJZoQrbTFZY1iaTqLERzY1VNf/X27e1IMsBFP4TawjJ05D2d/8KozwUI1VX6Af5l:gtrbTA1oEMBO7eBFDaIWTzwZ191Ue
Malware Config
Extracted
cybergate
v3.4.2.2
NEW
joujounette974.ddns.net:8027
8LO785716L517K
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
Processes:
0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exeHSCBC.EXEOPEN2C.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "%AppData%\\Microsoft\\winlogon.exe,explorer.exe" 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "%AppData%\\Microsoft\\winlogon.exe,explorer.exe" HSCBC.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "%AppData%\\Microsoft\\winlogon.exe,explorer.exe" OPEN2C.EXE -
Adds policy Run key to start application 2 TTPs 6 IoCs
Processes:
OPEN2C.EXE0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exeHSCBC.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Adobe Reader = "%AppData%\\Microsoft\\winlogon.exe" OPEN2C.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Adobe Reader = "%AppData%\\Microsoft\\winlogon.exe" 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run HSCBC.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Adobe Reader = "%AppData%\\Microsoft\\winlogon.exe" HSCBC.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run OPEN2C.EXE -
Executes dropped EXE 3 IoCs
Processes:
HSCBC.EXEOPEN2C.EXEHIDDEN SIGHT.EXEpid process 4492 HSCBC.EXE 5092 OPEN2C.EXE 4960 HIDDEN SIGHT.EXE -
Processes:
resource yara_rule behavioral2/memory/4380-133-0x0000000000400000-0x0000000000762000-memory.dmp upx behavioral2/memory/4380-135-0x0000000000400000-0x0000000000762000-memory.dmp upx behavioral2/memory/4380-136-0x0000000000400000-0x0000000000762000-memory.dmp upx behavioral2/memory/4380-137-0x0000000000400000-0x0000000000762000-memory.dmp upx behavioral2/memory/4380-144-0x0000000000400000-0x0000000000762000-memory.dmp upx behavioral2/memory/3408-147-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral2/memory/3408-151-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral2/memory/3408-152-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral2/memory/3408-154-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral2/memory/3408-160-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral2/memory/2332-164-0x0000000010410000-0x0000000010480000-memory.dmp upx behavioral2/memory/4860-167-0x0000000010410000-0x0000000010480000-memory.dmp upx behavioral2/memory/4860-169-0x0000000010410000-0x0000000010480000-memory.dmp upx behavioral2/memory/4860-177-0x0000000010410000-0x0000000010480000-memory.dmp upx -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exeHSCBC.EXEOPEN2C.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Reader = "%AppData%\\Microsoft\\winlogon.exe" 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run HSCBC.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Reader = "%AppData%\\Microsoft\\winlogon.exe" HSCBC.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run OPEN2C.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Reader = "%AppData%\\Microsoft\\winlogon.exe" OPEN2C.EXE -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4380-132-0x0000000000000000-mapping.dmp autoit_exe behavioral2/memory/4380-136-0x0000000000400000-0x0000000000762000-memory.dmp autoit_exe behavioral2/memory/4380-137-0x0000000000400000-0x0000000000762000-memory.dmp autoit_exe C:\Users\Admin\AppData\Local\Temp\HSCBC.EXE autoit_exe C:\Users\Admin\AppData\Local\Temp\HSCBC.EXE autoit_exe behavioral2/memory/4380-144-0x0000000000400000-0x0000000000762000-memory.dmp autoit_exe C:\Users\Admin\AppData\Local\Temp\OPEN2C.EXE autoit_exe C:\Users\Admin\AppData\Local\Temp\OPEN2C.EXE autoit_exe C:\Users\Admin\AppData\Roaming\Microsoft\winlogon.exe autoit_exe C:\Users\Admin\AppData\Roaming\Microsoft\winlogon.exe autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exeHSCBC.EXEOPEN2C.EXEdescription pid process target process PID 4808 set thread context of 4380 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe svchost.exe PID 4492 set thread context of 3408 4492 HSCBC.EXE svchost.exe PID 5092 set thread context of 2332 5092 OPEN2C.EXE svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exedescription pid process Token: SeDebugPrivilege 4860 svchost.exe Token: SeDebugPrivilege 4860 svchost.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
Processes:
0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exeHSCBC.EXEOPEN2C.EXEpid process 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe 4492 HSCBC.EXE 4492 HSCBC.EXE 5092 OPEN2C.EXE 5092 OPEN2C.EXE 4492 HSCBC.EXE 5092 OPEN2C.EXE 5092 OPEN2C.EXE 5092 OPEN2C.EXE 4492 HSCBC.EXE 4492 HSCBC.EXE -
Suspicious use of SendNotifyMessage 13 IoCs
Processes:
0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exeHSCBC.EXEOPEN2C.EXEpid process 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe 4492 HSCBC.EXE 4492 HSCBC.EXE 5092 OPEN2C.EXE 5092 OPEN2C.EXE 4492 HSCBC.EXE 5092 OPEN2C.EXE 5092 OPEN2C.EXE 5092 OPEN2C.EXE 4492 HSCBC.EXE 4492 HSCBC.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exesvchost.exeHSCBC.EXEOPEN2C.EXEsvchost.exesvchost.exedescription pid process target process PID 4808 wrote to memory of 4380 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe svchost.exe PID 4808 wrote to memory of 4380 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe svchost.exe PID 4808 wrote to memory of 4380 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe svchost.exe PID 4808 wrote to memory of 4380 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe svchost.exe PID 4808 wrote to memory of 4380 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe svchost.exe PID 4808 wrote to memory of 4380 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe svchost.exe PID 4808 wrote to memory of 4380 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe svchost.exe PID 4808 wrote to memory of 4380 4808 0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe svchost.exe PID 4380 wrote to memory of 4492 4380 svchost.exe HSCBC.EXE PID 4380 wrote to memory of 4492 4380 svchost.exe HSCBC.EXE PID 4380 wrote to memory of 4492 4380 svchost.exe HSCBC.EXE PID 4380 wrote to memory of 5092 4380 svchost.exe OPEN2C.EXE PID 4380 wrote to memory of 5092 4380 svchost.exe OPEN2C.EXE PID 4380 wrote to memory of 5092 4380 svchost.exe OPEN2C.EXE PID 4492 wrote to memory of 3408 4492 HSCBC.EXE svchost.exe PID 4492 wrote to memory of 3408 4492 HSCBC.EXE svchost.exe PID 4492 wrote to memory of 3408 4492 HSCBC.EXE svchost.exe PID 4492 wrote to memory of 3408 4492 HSCBC.EXE svchost.exe PID 4492 wrote to memory of 3408 4492 HSCBC.EXE svchost.exe PID 4492 wrote to memory of 3408 4492 HSCBC.EXE svchost.exe PID 4492 wrote to memory of 3408 4492 HSCBC.EXE svchost.exe PID 5092 wrote to memory of 2332 5092 OPEN2C.EXE svchost.exe PID 5092 wrote to memory of 2332 5092 OPEN2C.EXE svchost.exe PID 5092 wrote to memory of 2332 5092 OPEN2C.EXE svchost.exe PID 5092 wrote to memory of 2332 5092 OPEN2C.EXE svchost.exe PID 5092 wrote to memory of 2332 5092 OPEN2C.EXE svchost.exe PID 5092 wrote to memory of 2332 5092 OPEN2C.EXE svchost.exe PID 5092 wrote to memory of 2332 5092 OPEN2C.EXE svchost.exe PID 5092 wrote to memory of 2332 5092 OPEN2C.EXE svchost.exe PID 5092 wrote to memory of 2332 5092 OPEN2C.EXE svchost.exe PID 5092 wrote to memory of 2332 5092 OPEN2C.EXE svchost.exe PID 5092 wrote to memory of 2332 5092 OPEN2C.EXE svchost.exe PID 5092 wrote to memory of 2332 5092 OPEN2C.EXE svchost.exe PID 4492 wrote to memory of 3408 4492 HSCBC.EXE svchost.exe PID 5092 wrote to memory of 2332 5092 OPEN2C.EXE svchost.exe PID 3408 wrote to memory of 4960 3408 svchost.exe HIDDEN SIGHT.EXE PID 3408 wrote to memory of 4960 3408 svchost.exe HIDDEN SIGHT.EXE PID 3408 wrote to memory of 4960 3408 svchost.exe HIDDEN SIGHT.EXE PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe PID 2332 wrote to memory of 4860 2332 svchost.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe"C:\Users\Admin\AppData\Local\Temp\0073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6.exe"1⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\HSCBC.EXE"C:\Users\Admin\AppData\Local\Temp\HSCBC.EXE"3⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\HIDDEN SIGHT.EXE"C:\Users\Admin\AppData\Local\Temp\HIDDEN SIGHT.EXE"5⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\OPEN2C.EXE"C:\Users\Admin\AppData\Local\Temp\OPEN2C.EXE"3⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD558001f0d64026d11d7c15f3f32bdad90
SHA1c96e7df4183fb2680a8505b9de272a5ab06d2eb5
SHA2560c2b1b227736adafced90457930f189f880efa1c72828ea62c8cfbce46dc0939
SHA512164df204b773ef9befa2ab24d7f47262977652865325aea98b1d19f807d9909735059313425f465c0fd02fe6ec3bc425bd12777f0b7f91eb441926958f132cf9
-
Filesize
1.3MB
MD5d57c0b186f317542fe21e13b415afd0e
SHA1573039eab32ee2fc5e1dc7d0e49ba42599133537
SHA25615a877e08c08605b2bcb75ccb1e40d97cdbd9e10c0911e282d2637ae49793525
SHA5129efb47475bf66b6110bb8deac221212c28cac4c41f720ebfb701a2932edfbc00fb683d00bdd7c67465ad78f670dd0e8e935d1cc33c739b708bec162dda777735
-
Filesize
1.3MB
MD5d57c0b186f317542fe21e13b415afd0e
SHA1573039eab32ee2fc5e1dc7d0e49ba42599133537
SHA25615a877e08c08605b2bcb75ccb1e40d97cdbd9e10c0911e282d2637ae49793525
SHA5129efb47475bf66b6110bb8deac221212c28cac4c41f720ebfb701a2932edfbc00fb683d00bdd7c67465ad78f670dd0e8e935d1cc33c739b708bec162dda777735
-
Filesize
2.1MB
MD5f5799a961590d26685ff7be28ffdb411
SHA112ded45db4ec2842f3efb0fb66d3359100256776
SHA256a20f2f35732899467e9f8e571b19100d90c6f2de8ebeaa3d2396e43388885157
SHA51240c867eeab6f7f507b35ee91af4622019bfc2914f69ab9a202b6645486e11f2af3dc601974e2ae38d20222385d669a3983f2f4819817611d41787e02391fe2c9
-
Filesize
2.1MB
MD5f5799a961590d26685ff7be28ffdb411
SHA112ded45db4ec2842f3efb0fb66d3359100256776
SHA256a20f2f35732899467e9f8e571b19100d90c6f2de8ebeaa3d2396e43388885157
SHA51240c867eeab6f7f507b35ee91af4622019bfc2914f69ab9a202b6645486e11f2af3dc601974e2ae38d20222385d669a3983f2f4819817611d41787e02391fe2c9
-
Filesize
1.2MB
MD5da2b3550a161dccb7a7292711a76fcd4
SHA1532613af7685f3c3b476210d7d2dfa7df4ee812c
SHA2561d99f04c15bd9146ab1e576f02d3cf2483873432c493f0002e3c026592536bda
SHA5129f5d25dd44f61c4b075ac49e330e0ea9e75e41a32266087481da02bac37c383969cfe8efb99cfc12e1444b92d1eadaa81cf543395d2d62114eb82d8a1c293eb7
-
Filesize
1.2MB
MD5da2b3550a161dccb7a7292711a76fcd4
SHA1532613af7685f3c3b476210d7d2dfa7df4ee812c
SHA2561d99f04c15bd9146ab1e576f02d3cf2483873432c493f0002e3c026592536bda
SHA5129f5d25dd44f61c4b075ac49e330e0ea9e75e41a32266087481da02bac37c383969cfe8efb99cfc12e1444b92d1eadaa81cf543395d2d62114eb82d8a1c293eb7
-
Filesize
1.2MB
MD5da2b3550a161dccb7a7292711a76fcd4
SHA1532613af7685f3c3b476210d7d2dfa7df4ee812c
SHA2561d99f04c15bd9146ab1e576f02d3cf2483873432c493f0002e3c026592536bda
SHA5129f5d25dd44f61c4b075ac49e330e0ea9e75e41a32266087481da02bac37c383969cfe8efb99cfc12e1444b92d1eadaa81cf543395d2d62114eb82d8a1c293eb7
-
Filesize
3.3MB
MD526a881839c80565b4687cc065cc91285
SHA120b862779f4567ee82bbddbc7269fbca23cd16b8
SHA2560073aee29d41f741b5fd338a8781fbd1df852eaa8f1d9d49f9d036547bf068b6
SHA512bc887ca4b1587d096acbeef6675848936e8c201d0da1daaa3dbb642a9bddfb5a4a8df7bfeb1d74085427f298b6fdd70f7d75491fb4e2a66cb51d2b90d15ea730